We take health and safety very seriously. Not only the health and safety of our clients' technology systems, but also the medical health and safety of our staff, clients, and our community as a whole. Please visit http://soundit.co/?page=re-open to see the procedures we have put in place to keep our community safe.

It's free, it's easy. It's actually good. Sign up for the Sound IT Newsletter today!

Two-factor authentication adds a second level of authentication to an app's account log-in.

Read More

If you've been thinking of upgrading or refreshing some of your old computers I've got some great news! We're running a group buy on new and fast name-brand desktops and laptops.

Read More

Kids may or may not intentionally find themselves viewing inappropriate content on your work computer.

Read More

Some tips Sound IT has found useful to maintain individual sanity, keep some sense of camaraderie with coworkers, and serve our customers to the best of your ability during challenging times.

Read More

Internet speeds have always been something to gripe about. Then came the Pandemic and Lockdown.

 

Read More

Considering how many passwords we’re expected to remember and use on a daily basis, password exhaustion is a very real thing.

Read More

Here are some tips for taking your electronics in the office out of mothballs that should help you get up and running quickly.

Read More

 

Check out the procedures we have put in place to keep our community safe

Read More

Establish a sound business operations foundation to empower remote workers  

Read More

Spending more time at home means spending more time on the computer. Keep the cost of maintenance of your computers low by keeping them clean.

Read More

The quarantine could be your opportunity to reinvent how you work — for the better.

Read More

Many IT support scammers are professional organizations based around the world.

Read More
With COVID-19, we've been handling requests for remote work left and right. We have put together a "COVID-19 Remote Working Checklist" PDF to help businesses and employees understand what they need to do to make working from home work for them. This is a hard time for everyone and we want to do whatever we can to help our community's businesses survive and thrive through this crisis so this PDF is provided free of charge. (You don't even have to give us your email address) We are also providing free 30 minute technical assessment/consultation call TO EDMONDS BUSINESS OWNERS ONLY. With ... Read More
  Are Your HIPAA Compliance Efforts Healthy? Let's address the (ahem …) hippo in the room. HIPAA compliance continues to be a real challenge for small and midsized businesses. HIPAA is an acronym for the Health Insurance Portability and Accountability Act, which has very specific rules and regulations around a patient's health information. Larger healthcare organizations - hospitals and insurance companies - have in-house information technology teams, but smaller businesses don't have the same depth of IT help on hand. Yet they must abide by the same rules. Risking a ... Read More
The Advantages of Ad Blocking Unless you're in the advertising business, you probably try to avoid ads. You pay extra to stream ad-free content online. You leave the room if you are actually watching live TV shows with ads. You filter spam out of your inbox. You immediately click out of ads on the Web pages you visit. But are you actively blocking online ads? You should be. They are more than an annoyance. They could be a security risk. Cybercriminals are smart and savvy crooks. They don't advertise what they are doing, and it's not that easy to spot, but they do buy legitimate ad space to ... Read More
What's Causing Your Bandwidth Woes? Every time employees send or receive data online they need bandwidth. Like time and money, bandwidth is a scarce resource in many offices. After all, computers and digital devices rely on bandwidth to complete tasks online. Bandwidth is the amount of information that can be sent or received per second. This might be measured in Kbps (thousands of bits per second) or Mbps (millions of bits per second). Many people think having a higher bandwidth will mean a faster user experience. In fact, it's only one factor that affects response time. Bandwidth is ... Read More

7 Things You Need to Know About Ransomware
Posted on 2019-12-26 15:47:39

  <p>Ransomware is a well-named type of cyberattack. Cybercriminals taking this approach kidnap your data. After accessing your network, they encrypt files and demand payment for the passcode. Here are the top seven things you need to know about this business threat.</p> <p><strong>#1 It Can Happen to You</strong></p> <p>Cybercriminals rely on your false confidence. Don't think "it won't happen to me." Attacks on government, education, healthcare, or financial institutions get publicity. Yet organizations of all types and sizes are ... Read More

What Is a VPN and Why Do I Need One?
Posted on 2019-12-18 15:47:04

    Ever seen a thriller in which someone asks, "is this a secure line?" The good guys or villains want to be sure their conversations can't be overhead. When you get a VPN to connect to the Internet, you're signing up for the online equivalent of a secure line. VPN stands for virtual private network. Put simply, a VPN connects your computer, smartphone, or tablet to a shared or public network as if you're connecting to a private network. Banks, governments, and companies use VPNs to connect to their networks remotely. Now, it's becoming more common for the general public to use ... Read More

Do You Copy? What Can Go Wrong with BCC
Posted on 2019-12-11 15:47:12

Try to find someone who has not "replied all" when meaning to send to only one individual. It's embarrassing and can aggravate those people with more emails flooding their box. Another common email gaffe is misusing the CC and BCC fields in outgoing messages. This mistake can prove costly for business. You'll have noticed those extra fields below the "To" field in your email client. CC stands for carbon copy, and BCC for blind carbon copy. When you use CC, it's like you've imprinted your message on an old blue sheet of carbon paper. The email copy sends to your To recipients as well as ... Read More

Are You Banking Online Safely?
Posted on 2019-12-04 15:47:21

    Banks and credit card companies are making it easier for us to get money on the go. We can check account balances, pay bills, and transfer funds online. We no longer even have to go into a bank or visit an ATM to deposit checks. But are you banking online safely? In the past, all we had to do was protect our PIN number (and remember it). Now, we need a mobile account password, too. The first precaution you can take is to have a strong, unique password. Can you believe that "password," "123456," and "letmein" remain common access credentials? Don't do it! Also, avoid using ... Read More
  Locking your front door after a burglar has already ransacked your house doesn't do much, and the same is true of cybersecurity. With the help of a managed service provider, you can stay ahead of security threats with well-tested, leading-edge technologies. Ransomware, Trojans, crypto mining, and more make the news regularly these days. Businesses and consumers are both aware of the threats. Yet there is no single vaccine that can keep you safe. The volume of threats is growing. Cybercriminals are mixing up their tactics to outwit their targets, and the result is increasingly ... Read More
"Why is this computer running so slow?" It's a common complaint. The question is whether it's your computer or your internet connection. You may feel your computer is moving at a snail's pace, but it used to be cheetah-fast! You're going to want to identify and address the issue to get back up to speed. Yet it's hard to know whether to blame your computer or the internet, especially now that so many computer applications rely on internet connectivity. So, how do you determine whether it's your computer or connectivity that's the problem? If you are having the problem only on one device in ... Read More

The Trouble with Trusting Your Online Friends
Posted on 2019-11-06 17:40:33

  Trust is the foundation of a good relationship - you trust friends to be loyal, sincere, and honest. But when you blindly trust online friends, you could be opening yourself up to cyberattack. When you hear about a big data breach on the news, you may think you don't need to worry. You may think, "I don't do business with that company, so the crooks can't steal my identity." Or "my email address and password weren't involved, so it's not my problem." Yet it could be. One of your friends or family members' personally identifying information may be hacked. Then, cybercriminals could use ... Read More

Online Scheduling Solves Calendar Challenges
Posted on 2019-10-30 17:40:26

Online Scheduling Solves Calendar Challenges Setting up a meeting or training can be such a headache. You send an email or leave a voicemail with some suggested times, and the other participants respond with completely different times, often within the time window you identified as unavailable. Sigh! The possibilities go back and forth until finally at least a few of you agree. The more people you want to get to the table (or an online meeting) the more layers of complexity: "Does this work for you?" "No, how about Tuesday?" "Sorry, Jim can't meet then." "Same time Wednesday?" "Mel and Jo ... Read More
Buying technology for personal use can be exciting once you get past the price tag. Yet there are many factors to consider when investing in technology for employee use. There are many digital tools available to improve the day-to-day way people do their jobs. Providing the right tech can increase productivity, streamline processes, and improve employee engagement. Yet determining which solutions are smartest for your team takes work. Investing in a technology that doesn't suit the needs of your staff can hurt your business: Learning a new technology takes time away from other ... Read More
    Why can't we all just get along? You've probably thought that before. But the sentiment is also one that goes through our heads when we're trying to set up home networking. When cables and passwords abound, we can't help but wish it was easier to get all our devices to play nicely together. Here's help. Desktop computers. Laptops. Tablets. Network printers. Routers. Modems. Smartphones. Smart speakers. Media players. Gaming systems. Homes today have many, if not all of these. Each has all sorts of features, and they'd be even more useful if they connected to one another. If ... Read More

Are You Doing Your IT Due Diligence?
Posted on 2019-10-09 17:40:06

The words "due diligence" may make you think of a courtroom drama on television. Surely, that's something only lawyers have to worry about? Not so fast. Due diligence is something your business can be doing, too. Are you covering the basics? Due diligence is about taking care and being cautious in doing business. It extends to how you manage your technology, too. You may think you're immune to a data breach or cyberattack, but cybercriminals can target you regardless of business size or industry sector. Depending on your industry, you may even have compliance or regulatory laws to follow. ... Read More

LetMeIn101: How the Bad Guys Get Your Password
Posted on 2019-10-02 17:39:44

Passwords are essential to your cybersafety. You know it, but if you're like the rest of the digital society, you probably have dozens of passwords to remember. It's a lot. So, you might take shortcuts. Taking advantage of your laissez-faire attitude is one way bad guys access your passwords. Incredibly, there are still people out there using "password" or "123456" in their access credentials. Some people don't change the default passwords on their devices. So, anyone can pick up a router, look at the sticker identifying the password, and access that network. Tip: Avoid the obvious ... Read More