610-288-0780

TS Tech Blog

TS Tech has been serving the Wyomissing area since 1996, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

Tip of the Week: How Using an Inconspicuous SSID for Your Wi-Fi Deters Hackers

When you turn on your device’s Wi-Fi capabilities, do you ever take the time to look at some of the names of your neighbors’ connections? You’ll see some rather boring names as well; some might just use the name of their organization or the family’s name, or even just the default SSID used by the router. The fact of the matter is that a wireless network name that’s easy to gloss over is a best practice for network security.

Continue reading

Cops Lock Up Criminals, Ransomware Locks Up Cops

Cops Lock Up Criminals, Ransomware Locks Up Cops

Society relies on law enforcement to enforce laws in a fair and just manner, but even the police have their work cut out for them when they are targeted by a cyberattack. A recent incident in Cockrell, Texas shows that not even the police are immune to the threats of ransomware--particularly the emerging brand of ransomware, Osiris.

Continue reading

What You Should Be Mindful of Before Hosting Your Software in the Cloud

What You Should Be Mindful of Before Hosting Your Software in the Cloud

Businesses have focused on efficient utility software deployment for the better part of 30 years. Today, developers are increasingly offering software titles “as-a-service”, which gives users access to these powerful tools, via the cloud, for a consistent monthly payment. Distributing solutions through cloud technologies, be they a private cloud server or a reputable public cloud provider’s platform, can give your business considerable benefits.

Continue reading

Tip of the Week: Find Your Lost Smartphone With Ease

Tip of the Week: Find Your Lost Smartphone With Ease

Oh no! You start slapping your pockets, already knowing what you’re about to confirm--your mobile device is missing. With the reliance we have on these devices, losing yours is enough to send you into a relative panic. However, this panic may be avoided by implementing a reliable solution specifically for locating a lost device.

Continue reading

Did My Samsung Device Just Wink? Is it Spying on Me?

Did My Samsung Device Just Wink? Is it Spying on Me?

Occasionally, some Samsung smartphone users might see something strange appear at the top of their device’s screen--an eyeball. It will show up for a brief second and then disappear. What gives Samsung? Are you spying on me? For this blog, we’ll get to the bottom of this, as well as go over the symptoms of a device that is compromised.

Continue reading

How a Haphazard Approach to IT Only Creates More Problems

How a Haphazard Approach to IT Only Creates More Problems

We have been very fortunate to assist many organizations, and this experience has given us a certain perspective of how many businesses approach their technology maintenance. We often work with new businesses to audit the performance of their IT. We’ve found that small businesses tend to have more issues and are susceptible to bigger vulnerabilities. These aren’t networks that go ignored either--many of them currently pay for an “expert” to support them.

Continue reading

Tip of the Week: Don’t Leave Your Chrome Extensions Behind When You Go Incognito

Tip of the Week: Don’t Leave Your Chrome Extensions Behind When You Go Incognito

With Google Chrome’s Incognito mode, you can privately browse the web, but you may have noticed that Incognito mode also disables your extensions by default. This isn’t a big deal, but it can be an annoyance that you’d prefer not to deal with. Thankfully, there’s a good way to make sure that specific extensions stay enabled, even in Incognito mode.

Continue reading

4 Money-Saving Measures Any Business Owner Can Implement

4 Money-Saving Measures Any Business Owner Can Implement

Unless you’re at the helm of a Fortune 500 company, it’s likely that you’re always on the lookout for new ways to save money by tweaking your company’s operations. When you’re in money-saving mode, you understand that even a small change can rack up a lot in savings. To help you in your quest to save money, consider implementing these four practices.

Continue reading

Make Sure Your Business Isn’t in the Headlines for the Next Big Cyber Attack

Make Sure Your Business Isn’t in the Headlines for the Next Big Cyber Attack

Based on the headlines you see today, it’s no question that cybersecurity is something that every business owner should be concerned about. As attacks become bigger and more frequent, all decision makers must ask the question: who needs to step up and ensure my IT resources are secure?

Continue reading

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Before we dive into this week’s tip, it has to be said: if you have a choice, you should probably avoid using a public computer. As a rule, these machines feature minimal security precautions, along with maximum risk to any data accessed by the PC. Although, if a situation ever arises in which you have no choice but to use a public computer, be sure to follow these security best practices.

Continue reading

Self-Driving Cars: Would You Hand the Wheel Over to a Computer?

Self-Driving Cars: Would You Hand the Wheel Over to a Computer?

Are you ready to share the road with self-driving cars? According to a recent survey by the University of Michigan, 37.2 percent of drivers are “very concerned” about riding in a self-driving car, while 66.6 percent are “very or moderately concerned.” Simply put, the public isn’t quite ready for self-driving cars. Although, the gradual adoption of vehicles equipped with assisted-driving technology is already happening.

Continue reading

The Cost of Adequate Cybersecurity is Way Less Than the Cost of a Data Breach

The Cost of Adequate Cybersecurity is Way Less Than the Cost of a Data Breach

It’s the nature of every problem relating to business to include consequences that extend far beyond the timeframe of the issue’s initial impact. This is especially true for data breaches; an all-too-common problem that hurts organizations in many more ways than one.

Continue reading

Todd Schorle Featured at Big Focus on Small Business - April 2017

Todd Schorle Featured at Big Focus on Small Business - April 2017

On April 26th, our founder and CEO, Todd Schorle, will be speaking to the Greater Reading Chamber of Commerce and our local SCORE chapter's monthly event, Big Focus on Small Business.

Continue reading

April Employee Showcase

April Employee Showcase

In the theme of celebrating our accomplishments and our staff, here's another edition of our Employee Showcase.

Continue reading

Tip of the Week: Prevent Random Restarts in Windows 10 By Setting Up an Active Hours Schedule

Tip of the Week: Prevent Random Restarts in Windows 10 By Setting Up an Active Hours Schedule

Let’s say that you get to work in the morning and you’re ready to be productive, only to be greeted by a notification that your device automatically installed Windows 10 updates and has restarted itself? Windows 10 has achieved a reputation for such occurrences, and we’re concerned about that you could lose progress made on projects due to an unexpected restart. Thankfully, you can take measures to keep this from happening.

Continue reading

March Employee Showcase

In the theme of celebrating our accomplishments and our staff, here's another edition of our Employee Showcase.

Continue reading

Who You Sit Next to Makes You More or Less Productive, Study Finds

Who You Sit Next to Makes You More or Less Productive, Study Finds

It turns out that the old adage “iron sharpens iron” is true and it applies to the modern workplace. This, according to a new study by Harvard Business Review, which found that the productivity of a worker can be enhanced by an average of ten percent simply by having them be in close proximity to someone who’s more productive than they are.

Continue reading

Is Your IT Staff Stressed? Here’s How We Can Help

Is Your IT Staff Stressed? Here’s How We Can Help

The purpose of an internal IT department is, in theory, twofold: first, they are supposed to strategize a future for the company’s information technology, with the secondary responsibility of troubleshooting and tending to the technological issues a business faces. However, the reality is that many IT departments find themselves with no time to innovate, as they are swamped under service requests for technical issues.

Continue reading

Tip of the Week: 6 Ways to Charge Your Mobile Device Battery Faster

Tip of the Week: 6 Ways to Charge Your Mobile Device Battery Faster

You only care about how long your device’s battery lasts when it’s in the red, and at that point, it’s almost too late to find somewhere to charge. In situations like this, your first thought is, “Where is the nearest outlet?” Subsequently, your next thought might be, “How can I charge the battery faster?”

Continue reading

Own a Vizio TV? You May Not Like What Vizio Knows About You

Own a Vizio TV? You May Not Like What Vizio Knows About You

What you watch on TV says a lot about you; so much so, that you might be creeped out if we told you there are others who know exactly what you watched, without your consent. Sound too invasive to be true? Well, for the 11 million owners of Vizio televisions, this practice has been going on for some time now.

Continue reading

Got Questions? We've Got Answers

*First Name
*Last Name
*Email
*Phone
*Questions

Mobile? Grab this Article!

QR-Code

Recent Comments

M Vanasek QR Codes in a Nutshell
24 January 2012
Great article, love the idea of putting a QR code on our business cards!

Blog Archive