Tired of Sitting in traffic?

You can have a productive home office for less than $350!

Learn More about our month-to-month StressFree IT services for small business.

Here’s your Shopping List:

Need help with setup? That’s what we do for our clients!

Get a StressFree IT Quote

Check out our other great posts…

IT network diagrams are critical for small businesses
Phishing attacks target personal financial data of you and your customers

How to Prevent Phishing Attacks: 4 Ways to Protect Your Small Business

/
Malware-packed phishing emails to small businesses are increasing…
Twin Cities small businesses and startups can get free professional research help at the James J. Hill Center
,

Twin Cities Startups and Small Businesses Can Get Free Professional Research Help

/
For an entrepreneur, a breakthrough product or service idea is…
The 11-Point IT Security Checklist for Small Businesses

The 11-Point IT Security Checklist for Small Businesses

/
Giant data breaches at giant corporations make headlines just…
Selling a Minnesota small business requires preparing your IT infrastructure
How to Share a Calendar

How to Share a Calendar in Outlook, FindTime, Calendly

/
Scheduling meetings can be tricky when you run a small business,…

Press Release: TechGen Alexa App Released

/
May 1, 2018, Minneapolis, MN We are excited to announce the…
tech gen it service logo

Productivity Boosting Apps

/
We all have favorite apps that we use every day. Here are a few that will make you more productive and efficient. Jog.ai – This is a neat web service that you can use to take meeting notes for you. Jog.ai acts as a middle-man recording your telephone calls. It not only gives you a high-quality recording, but will also transcribe your call, so it is searchable later. While you’re on a call, you can use the jog.ai web app to ‘mark’ important parts to refer back to later. Best of all, it will “listen” for keywords like “action item” and automatically highlight that part of your call. Just make sure you let the other caller know if you’re talking to someone in a state that requires that kind of notification. LastPass – Lastpass stores your passwords securely behind a super-strong “master password” and also supports multi-factor authentication to further protect your credentials.  Lastpass syncs between your different computers, and mobile devices, so you can always access your important sites.    Other really useful features;  securely sharing credentials with others, and storing credit card and bank information – automatically filling out web-forms so you don’t need to track down your wallet! Boomerang – A great plugin for Outlook or gmail.com  Boomerang reminds you to follow up on emails at some point in the future if the recipient doesn’t send you a reply.  But – one of the most powerful features is the ability to “share” preferred meeting dates with someone via email.  For example; if you’re trying to setup a conference call, you can pick a couple of dates/times that are available on your calendar and include those in the message.  Boomerang will automatically send an invite to both of you with the time-slot that the recipient selects.   I find this to be a little more personal than services like Calendly.com Calendly – This is a great service that automatically syncs with your calendar and creates a simple website that shows your availability.  You can create different “booking templates” for things like 30-minute calls, 60-minute face-to-face meetings.   Calendly will let you specify specific minimum & maximum availability ranges, as well as custom fields that are added to the meeting.    Now when someone says; “Hey are you available next week?”   You can reply with your Calendly link, and they can pick a time that you’re available – that works for them too! Interested in trying out any of these apps?  We can help you install them and integrate them with your existing systems!  Just contact us and we'll be happy to help!
TechGen is ISO 27001:2013 Certified

Understanding IT Security Acronyms

/
PCI-DSS, ISO, HIPAA; you have probably heard many acronyms like…
it-security-minneapolis

Ransomware and Disaster Recovery

/
Another large Ransomware attack this month forced an Indiana…
minnesota-it-support
,

End of Year Scams

/
It’s the end of the year, and with the holidays wrapping up…
mn-help-desk-support

Identifying a Phishing Email

/
No matter how secure your network is, the first line of defense is always your employees. They are the gatekeepers to your network – deciding which emails are opened and allowed in. Hackers know that they can’t do anything until they get inside. Just like someone who wasn’t invited to the party, they will pretend to know someone, pretend to be someone else, or make up whatever other lies they can to get inside. In the computer world, those fake and malicious emails are called “phishing emails.” Because of how dangerous they can be, the ability to recognize phishing emails is critical to network security. Here are some things to look for to help you and your employees determine if an email is legitimate, or a party crasher. Make sure the email is something you were expecting to get. Unsolicited requests, invoices, and links should be suspicious. Hover your mouse over every link before you click it. You will see a small popup that tells you where the link goes. Make sure the link goes to the correct place before you click. One way to always be safe is to navigate to the website yourself in your browser and don’t click the link at all. Double check the email address that the email is coming from. Sometimes fake emails will use addresses similar to real sites (e.g. “Techgem.com” instead of “techgen.com”) Did they misspell my company name or make other mistakes on the email? Do they use a generic name instead of mine? Do you know the person sending the email? Is this the type of email they usually send? Look at the signature of the email and make sure it matches their usual signature. If their identity is in doubt, you can always call them and verify the authenticity of the email. Phishing emails will try to make you click without reading. Check to see if the email implies urgency or extreme importance. For example: “IMMEDIATE ATTENTION – YOUR ACCOUNT WILL BE CLOSED” Look for misspellings and poor grammar. Many people who send phishing emails don’t speak English as a first language. There can be other, subtle red flags. For instance, does the email have a strange subject line, signature, or layout? Sometimes, a legitimate email may have one of the above, but by looking at a combination of the above, you can usually tell a phishing email from a normal one. Attached below is an example of a real phishing email, with the suspicious features we used to identify it pointed out. Take a look at how we applied the tips mentioned above. Stay safe out there.
managed-it-services

Multi-Factor Authentication

/
Once again high profile hacking is in the news. Accounting…