707-258-1492    Get SUPPORT

FormaTech IT Services Blog

FormaTech IT Services has been serving the Napa area since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Are Smartphones Getting Any Smarter? Not Really.

Are Smartphones Getting Any Smarter? Not Really.

Have you noticed that the difference between this year’s latest and greatest smartphone isn’t much different than the one you shelled out big bucks for last year? You aren’t alone.

0 Comments
Continue reading

Tip of the Week: Adding a Watermark to a Word Document

Tip of the Week: Adding a Watermark to a Word Document

If you need to make something very clear about a document, adding a watermark to it is an excellent route to take. Microsoft Word 2016 (if you have Office 365, this applies too) makes it especially easy to do so. For this week’s tip, we’ll review the process of adding a watermark to your Word documents.

0 Comments
Continue reading

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

The Nigelthorn Malware is a Lot Less Friendly than its Namesake

You can never be too careful about what you install on your computers. In this most recent example, Google Chrome users are finding themselves targeted by a new type of malware called Nigelthorn.

0 Comments
Continue reading

Businesses Thrive with Dedicated Proactive Maintenance

Businesses Thrive with Dedicated Proactive Maintenance

Managed IT service is a great way for the small business to save money on their IT support costs while still getting the coverage they need. One of the ways that an MSP is able to keep their costs down is by proactive maintenance. If an MSP had to fix every computer problem a company had after it became a problem, the service would largely be untenable for the small business. Today, we look at the proactive maintenance feature of our IT management strategy and how our clients save a lot of money as a result.

0 Comments
Continue reading

Intro to Your Tech: Plug-In

Intro to Your Tech: Plug-In

Ahh, the Internet. It’s an incredible tool that helps people all over the world get work done on a daily basis. It’s often thought of as a tool to achieve a means, but like any other tool, it works best alongside others just like it. Plug-ins are additional ways that web-based applications and software solutions help make your use of them even better.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite

Tag Cloud

Security Tip of the Week Best Practices Business Computing Cybersecurity Privacy Managed IT Services Communications VoIP Network Security Tech Term Technology Email Cloud Small Business Malware Backup Hardware Communication Save Money Internet Wi-Fi Data Software Productivity Patch Management Business Intelligence IT Services Outsourced IT IT Support Employer-Employee Relationship Business Management Gmail Computers Cybercrime BDR Microsoft Managed IT Service Data Management Passwords Efficiency Cloud Computing Virus Gadgets Internet of Things Hackers Collaboration Ransomware Remote Computing VPN Office Cost Management Tech Terms Innovation Network Data Backup Remote Monitoring Saving Money Smartphones Google Social Media Business Data Recovery Vulnerability Server Management Downloads Spam Blocking HIPAA Inventory Smartphone Amazon Knowledge Ink Server Hybrid Cloud Router Maintenance Applications Computer Antivirus Hosted Solutions Printers Microsoft Teams Paperless Office disposal Physical Security User Tip Artificial Intelligence Trends Email Management Hard Drive Mobile Security Workplace Tips IT budget Government PowerPoint Technology Tips Internet Explorer Password Licensing Telephony Staff Alert Company Culture Safety Digital Value Tip of the week Machine Learning BYOD Processors Plug-In IT Management Sports Backup and Disaster Recovery Voice over Internet Protocol Business Technology Microsoft Office Threat Voice over IP Websites Managing Stress Access Control Browser Big Data Analytics Remote Support Spyware Twitter Proactive IT Conferencing Connectivity Telephone Systems Users Virtual Assistant SSD Printing Hosted Solution Networking Automation G Suite Data Breach User Tips Database Remote Monitoring and Management Telecommuting Telecommute Unified Communications Entertainment HP Environment Content Filtering Network Attached Storage Telephone System Facebook Information Tactics Paper Spam Dongle Virtualization Bring Your Own Device Data Protection Wireless Blockchain IT Support Data loss Hard Drives Printer Server RAM Mobile Device Management Document Management e-waste Phishing Bandwidth Public Speaking Mobile Devices Search Biometrics Authentication Cleaning Cryptocurrency Phone System Wearables How To Storage Paste Live Streaming Personal Information Two-factor Authentication Online Shopping Google Maps Help Desk File Sharing Hard Disk Drive Presentation Regulation Emergency Outlook Apple Employee-Employer Relationship Lithium-ion battery CrashOverride Comparison Augmented Reality Access Authorization Botnet Windows 7 VoIP Healthcare Error WhatsApp E-Commerce Tech Support Wireless Charging Cortana Staffing Cables Certification Settings User Security Video Wireless Technology 5G Business Continuity Reporting IBM Managed Service Google Drive iPhone Electronic Health Records Apps App Specifications The Internet of Things Managed Service Provider A.I. Quick Tips Time Management Marketing Hacker Operating System Gadget Data Security Politics Mobile Device Payment Budget Lead Generation Managed IT Services Mobility Law Enforcement Recovery Medical IT Scam Customer Relationship Management Hiring/Firing Profitability WiFi Health Competition Edge Files Movies Disaster Recovery Chrome OS IP Address Office 365 Fun Touchscreen News instant Messaging Smart Technology Retail Training Dark Web Sales Website Information Technology SaaS Travel Customer Service Holiday Eliminating Downtime Multi-Factor Security Employees Miscellaneous Laptop Battery Upgrade Windows Troubleshooting Chrome Net Neutrality Mobile Office Shortcut Domains Streaming Media Microsoft Office 365 Remote Control Vulnerabilities WannaCry Workers Excel Security Cameras Word Tablet Productivity Windows 10 GDPR Copy Education eCommerce Automobile Wireless Internet Solid State Drive Compliance Windows 10 Millennials Update Android Human Resources