What is 2 Factor Authentication and Why Should You Use It?

What is 2 Factor Authentication and Why Should You Use It?

~ This is a cautionary tale, for those who do not know, what 2 Factor Authentication is, or the story of Grandpa Joe. Grandpa Joe was proud to say, he could use the Internet in the very same way, as all the young kids these days. He had online banking, email with...

read more
When An Organization Outgrows Their IT

When An Organization Outgrows Their IT

By: Peter Kardel Introduction: Non-profits bleed or thrive over the same issues that for-profit businesses do, they just have less room for error.  Small headwinds can have a big impact on their mission.  This is worrisome since they provide such vital community...

read more
Remembering Your I.T. Pros!

Remembering Your I.T. Pros!

IT professionals keep our business and life going, and recently CompTIA ( the global association for IT professionals) announced the week of July 25th-July 29th as IT Pro Appreciation week. CompTia issued a global "thank you" to IT professionals around the globe,...

read more
The Year’s Best Deal on an Action Camera?

The Year’s Best Deal on an Action Camera?

GoPro has created an action cam addiction among many people. With the popularity of the action cam community, many companies have come out with competitors to the famous "Hero" camera line. In addition to action sports, an action cam can be an excellent tool for...

read more
I.T. Certifications Boost Morale & Grow Revenue

I.T. Certifications Boost Morale & Grow Revenue

In a recent article with ITChannel, I had the opportunity to discuss the importance of certifications in the IT field. At Clever Ducks, we have developed a certification path for our employees that increases not only their skill set but also increases their confidence...

read more
3 Steps to Armor Your Computer Against Hackers & RansomWare

3 Steps to Armor Your Computer Against Hackers & RansomWare

By: Peter K Kardel We discussed in our last article that RansomWare has become a hugely lucrative business for hackers operating all over the globe.  The river of money flowing into their coffers has fueled a cyber security arms race, good vs. criminal, that puts you...

read more
Dropping Someone by using BCC

Dropping Someone by using BCC

By Amy Kardel Using email effectively is one of the best ways to improve office productivity.  Poor email habits are a real energy drain, chewing up your team’s time. Train your team email black-belt moves and take your productivity a few clicks higher.  Best of all,...

read more
RansomWare: A Hacker’s Cash Cow, Your Data Nightmare

RansomWare: A Hacker’s Cash Cow, Your Data Nightmare

By Peter K Kardel It’s a foggy Thursday morning, you’re in early, knocking down your first strong coffee.  You’ve got a lot to get done before Friday afternoon . . . when you hope to leave a little early for a three-day weekend backpacking trip in Yosemite with your...

read more
Brag Walls & Benjamins, 3 Steps For Continual Team Growth

Brag Walls & Benjamins, 3 Steps For Continual Team Growth

By Jill Bilich It’s a busy day at the office, as usual, with plenty of clients to serve and projects to work on when I hear a cheerful uproar coming from the morning tech standup meeting.  I peek in to see a room full of elated faces and that’s when I know that I’ll...

read more
The “Key” To Safely Transporting Your Files

The “Key” To Safely Transporting Your Files

When needing to transfer files from work to home, most of us just grab a flash drive for easy transfer and transport, but is this really safe? Take a moment and think about what happens when you do this. Most companies have invested in some level of I.T. security. So...

read more