IT consulting and tech support blog

Top 5 risks of outdated technology

Published February 16, 2016

Microsoft infographic about risks of using outdated technology.

Click on the image below to view Microsoft’s infographic of The Risky Business of Outdated Technology! We can help - contact us for a free network review. Read more


The most destructive computer viruses – infographic

Published October 05, 2015

Infographic of the most destructive computer viruses

Supreme Systems IT put together this infographic about the “most destructive” computer viruses of all-time. It gives a broad overview and history of computer viruses and malicious software.  Read more


HIPAA security – keeping data secure

Published July 24, 2015

If you are a "covered entity" under the HIPAA Security rule, then you already know that your company (and thus your employees) collect a lot of protected health information (aka PHI). PHI is basically information about another person that is not for public knowledge but needed in order to conduct business. What business? Information that insurance companies need to process claims and… Read more


How will users upgrade to Windows 10?

Published March 18, 2015

Windows 10 logo
Windows 10 upgrade path matrix

Microsoft seems to be (mostly) following Apple’s OSX strategy by making its own upcoming OS “Windows 10” a free upgrade. According to Thurrott.com, “Microsoft says it will deliver the final version of Windows 10 to 190 countries sometime between June 21 and September 23, 2015.” The update will be available to existing Windows 7, Windows 8.1 and Windows Phone 8.1 customers. Here is how… Read more


5 Ways to Avoid a Phishing Attack

Published March 05, 2015

Five ways to avoid a phishing attack infographic

Here at New River Computing, we like to share interesting infographics as we come across them. Our main goal is to try and disseminate intricate IT related information quickly and clearly, to as many users as possible. This particular one from AVNET's Behind the Firewall deals with Phishing Attacks. And offers the following five recommendations Determine who the real sender is. Check the… Read more


Get a quote!

Your request has been successfully submitted.

Thank you for contacting New River Computing. We will respond to you as soon as possible.