Net It On, LLC Blog

    blog-img

    Every mobile device owner has some kind of charging cord they keep nearby. Most of us don’t think twice about our charging cord and we just use what came with the device. However, when it comes to charging our phones, we’ve got several options available that make the standard charger seem rather boring. Here are five of our favorite chargers.

    Read More
    blog-img

    Some businesses embrace Bring Your Own Device (BYOD) policies in the workplace, while others aren’t so sure. If you think that employers are the only ones worried about BYOD policies, you might be surprised to learn that employees are just as concerned about it as their employers. Of course, their reasons are entirely different, but are still valid reasons to be on edge.

    Read More
    blog-img

    It’s easy to get scatterbrained when things get busy. When this happens, you can forget important things like where you placed your keys, and where you saved your computer file. To help you out, here are some tips on how to locate a missing file. As far as your missing keys go, did you check underneath the couch?

    Read More
    blog-img

    It’s flu season, and just like office workers around the country are taking preventive health measures like stocking up on tissues and vitamin C, so too are IT technicians doing everything they can to stop the spread of computer viruses on their company’s network. Although, unlike the flu, computer viruses are more than a seasonal threat.

    Read More
    blog-img

    Before Microsoft officially releases Windows 10, beta versions are first given to select business leaders like CIOs. This is a standard practice for software manufacturers because it helps them to work out real-world bugs before publicly releasing their product. What do CIOs think of the Windows 10 technical preview? Inquiring business minds want to know.

    Read More
    blog-img

    Years and years of doing business means years and years of applications and software getting installed on your computer. Before you know it, you don't use any of them anymore, or they are outclassed by other, more useful programs. Going through each of your systems individually is time-consuming and monotonous. So, what can you do about this?

    Read More
    blog-img

    It seems as if you can't go anywhere on the Internet without encountering some security violation, and there's a lot of discussion concerning how to keep your data safe. Undoubtedly, mobile devices will surely arise in the debate. Without a doubt, mobile devices are capable of vastly improving productivity while out of the office, but is this enough to offset the incredible amount of risk which comes with hopping from network to network?

    Read More
    blog-img

    Doing business today is much different than it was in medieval times. Thanks to the Renaissance, modern businesses now have a technology-based economy, instead of one that's magic-based--this has been an especially difficult transition for wizards. Although, one medieval business practice that's still going strong is the idea behind guilds.

    Read More
    blog-img

    When’s the last time you rebooted your PC or mobile device? If you’re drawing a blank to this question, then you should take the minute or two it takes to reboot as soon as possible (or 15 minutes if you’re still using Windows XP). To a computer, rebooting can be likened to getting a full night’s sleep; without it, performance will suffer.

    Read More
    blog-img

    A while back we discussed the POODLE vulnerability found in SSL 3.0 SSL encryption technology. This vulnerability is found in all operating systems, as it is found within the web browser’s abilities to process SSL encryption. Thankfully, major companies are stepping up to tackle the issue, and Microsoft has released a basic solution to fix the vulnerability in Internet Explorer.

    Read More