31478 Industrial Road Suite 200, Livonia, Michigan 48150 sales@xfer.com

XFER Blog

XFER Blog

XFER has been serving the Livonia area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

XFER has not set their biography yet

What Does the Future of Cloud Computing Hold?

b2ap3_thumbnail_future_of_cloud_400.jpg
New technology brings all sorts of changes to the business world, and the modern business has to take advantage of these changes in order to stay competitive. One of these revolutions is cloud computing. While every professional has their own opinion of the cloud, Greg Walters of Walters & Shutwell Inc. has some interesting theories about how the business cloud will develop.

Continue reading

Technology, the Bane of Productivity: Distractions at Every Turn

b2ap3_thumbnail_distracted_at_work_400.jpg
Technology is a wondrous thing, capable of granting our every wish with a simple query… well, sort of. It depends on how you use it. Today’s technology is capable of expanding our productivity through the roof, or sending it to live in squalor deep in the gutters of the Internet. What can your company do to take advantage of this wondrous innovation, and avoid the pitfalls of wasteful distractions?

Continue reading

Tip of the Week: 13 Time-Saving Shortcuts for Microsoft Outlook

b2ap3_thumbnail_outlook_logo_400.jpg
Microsoft Outlook is a common mail solution for businesses, but it can be tricky to use without utilizing keyboard shortcuts. Just like Microsoft Word, Outlook has several key commands that can be used to jumpstart your productivity and save time, which can be better spent on other activities, like training exercises or more important tasks.

Continue reading

How to Protect Yourself from a Haunted Computer

b2ap3_thumbnail_halloween_pc_haunting_400.jpg
Naturally, if you saw your lamp levitate, you would believe it to be the work of a ghoul and you would cry out in terror. What then would you believe if you saw your PC’s cursor begin to move on its own? In a spooky scenario like this, your computer isn’t haunted. It’s hacked. In the real world, the latter is the scarier of the two.

Continue reading

Tip of the Week: 8 Tips to be an Expert Googler

b2ap3_thumbnail_search_tips_to_win_400.jpg
Have you ever tried to search for something on Google, only to be disappointed that you couldn't find what you were looking for? You might think you're being extremely specific, but in reality, you're not doing anything different from the average joe. Googling is an art lost to the ages, a secret technique of legend. But, not really. Here are some tips to help you get more out of the world's most popular search engine.

Continue reading

Zero Trust: Is this a Wise Data Security Policy?

b2ap3_thumbnail_no_trust_data_protection_400.jpg
Sometimes it seems like the Internet is plotting against you, and nothing is safe, ever. Even if you don't have any thugs waiting to steal your data, there are hackers - thieves - who will steal it anyway, waiting to take it when you least expect it. One of the most secure ways to protect your company's digital assets is to enact a "zero trust" policy for your network.

Continue reading

Tip of the Week: How to Use Technology in a Sanitary Fashion

b2ap3_thumbnail_sanitary_practices_400.jpg
These days, with the Ebola virus on everyone's mind, sanitation is a major issue. Enacting proper sanitation procedures is a must for any public place, especially in the office. Unbeknownst to most office workers, one of the biggest transmitters of germs is frequently-handled technology. Therefore, it's imperative that you properly use your technology in a sanitary fashion. Here's how.

Continue reading

Warning: Cryptowall 2.0 Ransomware is as Bad as They Come

b2ap3_thumbnail_ransomware_cryptowall_400.jpg
Be advised, there's a new digital threat on the scene that you and your employees need to be aware of. Known as Cryptowall 2.0, it's a wicked virus that has the potential to encrypt and steal your files, making it the scariest thing to hit your front door this Halloween season.

Continue reading

Grading the New iPhone 6 and 6+ On a Curve

b2ap3_thumbnail_iphone_six_and_six_plus_400.jpg
The Apple iPhone 6 and 6+ are here! Are you enough of an Apple fan to have waited in line for hours to get your very own? To date, the new iPhone is so popular that it's on backorder and difficult to get a hold of. Is the latest iPhone worth the hype? Let's take a look at the specs and find out.

Continue reading

Russian “Sandworm” Hack Reveals 5-Year Cyber Espionage Campaign

b2ap3_thumbnail_watch_out_for_sandworms_400.jpg
A cyber espionage campaign called "Sandworm" has been discovered recently. The hacking attack, said to be based in Russia, has been targeting government leaders and organizations since as early as 2009. The researchers responsible for the discovery, iSight Partners, came to this conclusion after examining the code used in the campaign.

Continue reading

Tip of the Week: How to Decide on a VoIP Plan to Fit Your Business

b2ap3_thumbnail_voice_over_internet_protocol_400.jpg
More businesses are switching to Voice over Internet Protocol (VoIP) in order to consolidate their communication tools and save money on their phone bill. Before you make the switch, you will first want to understand your different VoIP options so that you will have a plan that fits your company's communication needs. Here are some tips to get you started with VoIP.

Continue reading

Will the Internet of Things Grow More Deadly in the Future?

b2ap3_thumbnail_can_internet_of_things_kill_400.jpg
The Internet of Things is on its way, and more devices are connecting to the Internet than ever before. Unfortunately, this also means that more devices are vulnerable to the threats that cybercrime poses. Some professionals believe that, despite the obvious benefits that the Internet of Things provides (i.e. big data analytics) some cyber criminals might turn to more nefarious schemes.

Continue reading

The Files are IN the Computer [VIDEO]

b2ap3_thumbnail_files_are_in_the_computer_400.jpg
When it comes to IT support, communication is key. The parties giving and receiving support must absolutely be on the same page. If not, then a PC disaster is imminent. Sometimes, IT support miscommunications can be so bad that they're funny, as seen in the 2001 movie "Zoolander." Thankfully, nobody is really this detached when it comes to computers, right?

Continue reading

What Do You Look for in a Cloud Service Provider?

b2ap3_thumbnail_cloud_computing_400.jpg
The cloud is the next big thing for some businesses, but a lot of the time, there are too many options thrown at them all at once. They aren’t sure what the best path is for their business. A cloud solution can provide your company with a lot of benefits, but you want only the best for your business.

Continue reading

Small Businesses Need an Intranet

b2ap3_thumbnail_intranet_400.jpg
As a small business owner, you enjoy the ability to operate quickly when action is needed. You appreciate the ease of communication within your office, and you can get things accomplished simply and efficiently. At least, that's the goal; maybe things aren't so smooth. One way to fix that is by integrating an intranet into your workplace.

Continue reading

Just 28% of Organizational Data Stored Has a Clear Business Value

b2ap3_thumbnail_dark_data_400.jpg
According to a recent survey by IDG Research Services of business and technology leaders, on average, only 28 percent of data stored and maintained has value to the day-to-day operations of a business. Translation: a whopping 72 percent of files stored by a business are useless.

Continue reading

BYOD Might Not Be a Good Fit for Every Business

b2ap3_thumbnail_bring_your_own_device_400.jpg
The concept behind BYOD seems really good--employees bring their personal devices to work and use them to accomplish company projects. Initially, BYOD was well received, but after reviewing the security risks, more companies are opting out of it. Is there another way to use mobile devices at work without all the hassle and risks of BYOD?

Continue reading

Tip of the Week: How to Recover Lost Microsoft Office Files

b2ap3_thumbnail_microsoft_office_400.jpg
Losing files can be devastating, not just for your business, but for your clients. While most cloud services save document changes automatically after edits have been made, Microsoft Office 365 doesn't. This can potentially lead to lost files. But fear not; there is a way to recover these files in case the worst happens.

Continue reading

3 Ways that Server Virtualization Can Benefit Your Business

b2ap3_thumbnail_server_virtualization_400.jpg
Virtualization isn’t a new topic, but it sure is a hot one. Virtual servers are almost omnipresent in today’s technological world, and for good reason. They provide businesses with several benefits that help expand and preserve both a business’s data and vision, improving efficiency and productivity.

Continue reading

Why Did Microsoft Skip Windows 9? Because Seven Eight Nine! (Get it?)

b2ap3_thumbnail_windows_10_400.jpg
The news is out; what was previously thought to be Windows 9, codenamed “Threshold,” has been revealed to be Windows 10. While leaks have already shown us quite a bit of what the latest installment of Windows can do, the official reveal goes into more detail about the nature of Windows 10 for enterprises and even common users. First, let’s go over what we already know about the enigmatic new operating system, then we’ll get into the juicy new details.

Continue reading