Blog

Join our newsletter for IT industry news and updates!

Select list(s) to subscribe to


By submitting this form, you are consenting to receive marketing emails from: Vintage IT Services, 1210 W. 5th Street, Austin, TX, 78703, https://www.vintageits.com. You can revoke your consent to receive emails at any time by using the SafeUnsubscribe® link, found at the bottom of every email. Emails are serviced by Constant Contact

Blog

Beware of Phishing Scams

Phishing scams are email messages appearing to come from legitimate sources (credit card company, Internet service provider, bank, etc.). These messages usually direct you to a fake (spoofed) website or otherwise get you to enter private information (secret answers, credit card #, passwords, etc.). The criminals then use this private information to commit identity theft. …

Beware of Phishing Scams Read More »

Outlook Tips & Tricks

Outlook Tips & Tricks Part 3 It is time for the final chapter of our Outlook Tips and Tricks series. Below are a few more items that we hope you find useful! Set an Automatic Reply for your vacation Call it what you will: “Vacation reply,” “Out of office” message, or “Automatic reply” – here’s …

Outlook Tips & Tricks Read More »

OneNote Tips & Tricks Part 1

For our next round of “Tips & Tricks”, we will be focusing on Microsoft OneNote 2016. OneNote is used for free-form information gathering and multi-user collaboration. It gathers users’ notes (handwritten or typed), drawings, screen clippings and audio commentaries. These notes can then be shared with other OneNote users over the Internet or a network. This series will …

OneNote Tips & Tricks Part 1 Read More »

Compliance and the Cloud

Companies in highly regulated industries, such as financial services and healthcare, must comply with numerous regulations related to privacy and sensitive data, including PCI DSS, SOX, GLBA, HIPAA and HITECH, along with others. These regulations have specific guidelines on handling personal information and sensitive data. Companies are bound to ensure that their information security policies and IT …

Compliance and the Cloud Read More »

Myth-busting Cloud Computing

Many business owners are concerned that cloud computing is not secure and costs too much. Compared to most onsite solutions, hosting with a cloud provider is both more secure and closely monitored.  Another myth – high cost – can be addressed by looking at IT from a broad perspective, as part of your overall business picture. …

Myth-busting Cloud Computing Read More »