Blog

Premium Passwords: Your Guide To Keeping Your Accounts Safe

Premium Passwords: Your Guide To Keeping Your Accounts Safe

Crafting useful passwords requires the use of obscure topics, characters in place of numbers, constant variation, and other tactics Cybersecurity is so often described as an automated process that we forget the human element. Even the most sophisticated security program…

Read more 

Doctor & Patient Apps: Apple CareKit

Doctor & Patient Apps: Apple CareKit

A look at Apple CareKit and how it helps patients monitor their health. Since mobile devices are becoming a huge part of our everyday lives, it should come as no shock that an app would come along and change how…

Read more 

Wisdom Wednesday: Twelve Shortcuts Saving Maximum Time Using Microsoft Outlook

Wisdom Wednesday: Twelve Shortcuts Saving Maximum Time Using Microsoft Outlook

The latest version of Microsoft Outlook is designed to be a personal information manager, not just email. Learn the shortcut tricks and a user can become a power communicator very quickly.   While many wish there might be another choice,…

Read more 

House IT Staff Investigated for Unauthorized Access

House IT Staff Investigated for Unauthorized Access

Five IT staff members used their access to the House of Representative’s computer network to skim sensitive information, gain unauthorized access to the system and purchase unapproved items for unsuspecting members of Congress.   A small staff that provides IT…

Read more 

Wisdom Wednesday: Out Of Office In Microsoft Outlook

Wisdom Wednesday: Out Of Office In Microsoft Outlook

How Do I Set My Out Of Office In Microsoft Outlook To Only Send From One Date To Another? For more help with this and other IT services in Akron, contact QualityIP today. Call Us Now! (330) 931-4141. Save

Read more 

Cops and Hackers: Disappearing Evidence and Disrupted Systems

Cops and Hackers: Disappearing Evidence and Disrupted Systems

Hackers go after money, information, elections — and even evidence. Learn more about how one police department lost 8 years worth of information all because of one idle click of a mouse. The more of our lives we put on…

Read more 

No Business Is Immune To The Devastation Of Data Loss

No Business Is Immune To The Devastation Of Data Loss

Data is your business’ most valuable asset, which makes protecting it a critical piece of your business’ IT security measures. Data loss can happen as result of a wide range of causes, some preventable, and some completely unexpected. Having reliable…

Read more 

How a Fake Battery App Demonstrates the Spreading Risk of Ransomware

A fake battery life boosting app available through the Google Play store distributed a newly-emerged ransomware, highlighting the threat that ransomware poses even on official app stores. A number of users of the official Google Play store were unpleasantly surprised…

Read more 

Is Your Home Really Secure?

Is Your Home Really Secure?

Don’t take your home security for granted. Burglars are not only incredibly fast but also tend not to leave fingerprints or other clues to their identity, which means that the chances are very small that you will ever see your valuables again.…

Read more 

97% of Your Emails Are Spam: What You Should Be Doing With Them

97% of Your Emails Are Spam: What You Should Be Doing With Them

With 60 billion emails being sent out a day, it should come as no surprise that not all of them are legitimate messages. Find out more about the story behind the spam, and what you can do to stop yourself…

Read more