IT Consulting and Tech Support Blog

Author Archives: New River Computing

Save hard drive space with OneDrive Files On-Demand

OneDrive has just gotten better with the addition of OneDrive Files On-Demand. It allows you to see your entire OneDrive, and access all the files and folders you store there, directly from File Explorer.

Posted in Microsoft Office | Leave a comment

O365 Version History

Ever wish you could restore a previous version of a Word document or an Excel spreadsheet? Well if you are an Office 365 subscriber using SharePoint, OneDrive, and OneDrive for Business, you can!

Posted in Microsoft Office | Tagged , , | Leave a comment

The Equifax breach

I’m sure everyone is painfully aware of the recent data breach at Equifax. Industry experts are suggesting that this breach was a state-sponsored hack, and I believe them. Chances are everyone reading this newsletter has had their personal financial information compromised. You must take action….

Posted in Web Security | Leave a comment

FindTime—an awesome meeting scheduling tool

FindTime is a meeting polling add-in for Outlook that helps suggest the best meeting times. The cool thing is, of course, it is integrated with Office 365 and will suggest the best meeting times for each recipient in your organization.

Posted in Microsoft Office | Leave a comment

The Cost of “Free” Software

Have you ever been tempted to try to acquire expensive software without paying for it? It turns out that “free” software can be more expensive than one might think! Take Photoshop for example: Subscribers can sign up and start using Photoshop for as little as…

Posted in Backups, Exploits, New River Computing News, Security Products, Vulnerabilities, Web Security | Leave a comment

Top 5 Risks of Outdated Technology

Click on the image below to view Microsoft’s infographic of The Risky Business of Outdated Technology! We can help – Contact us for a free network review!

Posted in Exploits, Microsoft Windows, Technology Trends | Leave a comment

The most destructive computer viruses – infographic

Supreme Systems IT put together this infographic about the “most destructive” computer viruses of all-time. It gives a broad overview and history of computer viruses and malicious software.

Posted in Vulnerabilities, Web Security | Leave a comment

HIPAA security – keeping data secure

If you are a “covered entity” under the HIPAA Security rule, then you already know that your company (and thus your employees) collect a lot of protected health information (aka PHI). PHI is basically information about another person that is not for public knowledge but…

Posted in Exploits, Mobile Security, Technology Trends, Uncategorized, Vulnerabilities, Web Security | Leave a comment

Matt Stuart featured on WDBJ7 cyber security report

video platformvideo managementvideo solutionsvideo player NRC’s Matt Stuart was recently interviewed for a feature on Ronaoke’s WDBJ7 about cyber-security and how you can protect yourself this Cyber Monday. Matt discussed some of the recent trends in security vulnerabilities include cold-calls from scammers falsely claiming to…

Posted in Web Security | Tagged , , , , , | Leave a comment

NRC’s George Probst films first 360-degree great white shark video

NRC’s web designer, George Probst, was asked early this year to test out a new underwater camera rig that films 360° footage. George took the Kolor Abyss 360 on his recent great white shark diving trip to Isla de Guadalupe, and was able to capture…

Posted in New River Computing News | Tagged , , , , , | Leave a comment