Stan PateyDec 15, 20212 minDouble Your Monitors, Double Your Fun!Learn how virtual desktops can make your work easier and improve your performance
Stan PateyNov 15, 20211 minShoot-Down 99.9% of Cyber-Attacks7 Simple Steps to lock down your email against cyber attacks using Multifactor Authentication - MFA.
Stan PateyNov 3, 20211 minOutlook for Old Outlooks Is Not GoodOutlook to Office 365 Connectivity Issues for older versions.
Stan PateyOct 27, 20212 minAlmost Got Phished TodayTips for avoiding phishing scams. #Phishing #TextPhishing
Stan PateyDec 4, 20201 minThis is a TestIf it's an unexpected or strange email, call (don't email) the sender to confirm before clicking any link
Stan PateyOct 12, 20202 min3 Reasons You Need a Password ManagerYou need to use a password manager to secure your network.
Stan PateySep 1, 20202 minWorried about Ransomware? Uninstall Anti-VirusOld school anti-virus depends on virus definition signatures to recognize and block malware threats. Think of signatures as wanted...
Stan PateyAug 20, 20203 minHave you been Vished?Vishing (voice phishing) is a growing threat to network security. It's highly targeted and frighteningly successful
Stan PateyJul 25, 20202 minAre You Available?Are You Available. You've likely seen this phishing attempt or one of its variations...
Stan PateyJun 20, 20203 minNot All Heroes Wear a Cape and TightsSlingshot Information Systems provides expert IT support and services to dozens of small businesses within Boston’s greater North Shore.
Stan PateyJul 16, 20192 minMicrosoft 1903 Update Blue Screens Surface LaptopsMicrosoft acknowledged that their May 29, 2019—KB4497935 update has serious compatibility issues with Surface Book Laptops
Stan PateyJun 26, 20191 minIt's time to move on from Windows 7Dump Windows 7 and upgrade to Windows 10 before the end of 2019
Stan PateySep 19, 20182 minRansomware PrimerLearn to identify and avert data hostage situations Ransomware is malware constructed by cyber-criminals to encrypt your network data and...
Stan PateyAug 21, 20183 minMessage Size Limit Exceeded – What Now?It’s late on a sunny Friday afternoon before a long weekend and the office has emptied out around you. You’ve worked frantically to...
Stan PateyJun 26, 20182 minA Tale of Two Microsoft NotificationsThe last line of defense for any Business's Computer Network is an educated end-user. Sophisticated firewalls, anti-virus software, web...
Stan PateyMay 29, 20182 minFBI Router Cyber Threat Warning - VPNFilterSlingshot Help Desk personnel monitor cyber security alerts from vendors, researchers and government agencies to respond quickly to...
Stan PateyMay 16, 20181 minMicrosoft Broke My ComputerMicrosoft recently released a "feature update" that updated Windows 10 to version 1803 which added a bunch of new features, as well as,...
Stan PateyMay 4, 20181 minTwitter Passwords & Airbnb PhishingPhishing attacks just keep coming. Cyber-criminals use the same basic methods but add new twists that leverage current events. Twitter...
Stan PateyApr 24, 20183 minWhat is Phishing?Phishing is an exploit where cyber-criminals assume the identity of a recognized company to hook recipients into revealing credentials to...