Blog

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your End Users From Contributing to Security Issues

Keep Your End Users From Contributing to Security Issues

Insider threats contribute to a significant number of data breaches. These cases of data exposure are enabled by a member of your staff, whether they intended to harm your business or simply made an honest mistake. With so much focus directed toward the threats out in the world, sometimes we forget that the biggest dangers can be among our ranks. To make up for this, we’ll discuss a few ways to keep insider threats from doing your business too much harm.

0 Comments
Continue reading

Tip of the Week: Need to Write an Email? Keep These 5 Steps in Mind

Tip of the Week: Need to Write an Email? Keep These 5 Steps in Mind

There are good emails, and there are bad emails. You know them when you see them, but can you write an email that’s more likely to be read and acted upon? There are a few key steps to writing them more effectively. For this week’s tip, we’ll walk you through five steps to improving your emails.

0 Comments
Continue reading

Tip of the Week: We All Make Mistakes, but Try To Avoid These Computing Ones

Tip of the Week: We All Make Mistakes, but Try To Avoid These Computing Ones

Mistakes happen, especially where technology is involved. There are plenty of ways that user error can occur when using a computer--many of which are avoidable through simple preventative measures. For our tip this week, we’ll go over some behaviors to avoid when using a computer.

0 Comments
Continue reading

Scammers and Skimmers Are a Bad Combination

Scammers and Skimmers Are a Bad Combination

Considering how often hackers target financial credentials like credit card numbers and expiration dates, it’s not surprising that ATMs can provide a wealth of information to them. Hackers are willing to go exceedingly far just to get their hands on these credentials--including physically altering the devices themselves to install skimmers and other technology on them. Unless you know what to look for, it can be difficult to tell if a machine has been tampered with.

0 Comments
Continue reading

Tip of the Week: 10 Tech Practices That Make Work Better

Tip of the Week: 10 Tech Practices That Make Work Better

Each worker within an organization is delegated some sort of responsibility based on their role. Managers are responsible for managing, while human resources keep all workers accountable for their responsibilities. Yet, there are multiple responsibilities designated to all employees who use technology for their everyday duties.

0 Comments
Continue reading

Protect Your Business with Strong Network Security Practices

Protect Your Business with Strong Network Security Practices

With the surge in the number of small and medium businesses that have fallen prey to malware and cyber criminals, there is a lot of focus of what an organization can do to prevent being a victim and how the company should handle themselves after an attack. There is another key factor to preventing cyber criminals from penetrating into your network: your employees.

0 Comments
Continue reading

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Keep Bring Your Own Device From Becoming Bring Your Own Disaster

Do you let your employees bring their own devices in for use on your company network or Wi-Fi connection? If so, we’re sure that they love the freedom that you provide for them, but we must warn you of the dangers that this can bring to an otherwise careful business. We’ll discuss some of the benefits, as well as the pitfalls, of allowing your employees to use personal devices in the workplace.

0 Comments
Continue reading

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

Tip of the Week: How to Set Your Windows Apps to Automatically Open in Full Screen

Here’s something that you might have noticed about opening Windows applications on your desktop; by default, they will generally open in a smaller window, giving you the ability to customize their size as you see fit. If you want a full size Window, it’s as easy as clicking on the maximize button in the top-right corner, but what if you didn’t want to go through this every time you open the app? There’s a solution for this, and we’ll help you find it.

0 Comments
Continue reading

Your Employees are Your Most Important Security Feature, and Biggest Risk

Your Employees are Your Most Important Security Feature, and Biggest Risk

Here’s a question: on a scale of one to ten, how confident are you that your employees are acting in the best interests of your organization’s network security? How confident are you that you’re setting a good example when it comes to handling your business’ security? Unfortunately, any confidence you have on this matter may be misplaced.

0 Comments
Continue reading

Common Misconceptions Concerning Business Cybersecurity

Common Misconceptions Concerning Business Cybersecurity

Today, we want to talk about something that not a lot of businesses would want to think about. What would happen to your organization if it were to suddenly experience a hacking attack? While security solutions can go a long way toward protecting your organization, you still want to make sure that you’re not relying solely on your security tools for protection. Rather, you should always stay vigilant, even if you don’t think something could go wrong.

0 Comments
Continue reading

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Tip of the Week: 2 Ways to Ensure Privacy When Using a Public PC

Before we dive into this week’s tip, it has to be said: if you have a choice, you should probably avoid using a public computer. As a rule, these machines feature minimal security precautions, along with maximum risk to any data accessed by the PC. Although, if a situation ever arises in which you have no choice but to use a public computer, be sure to follow these security best practices.

0 Comments
Continue reading

Over 75% of Organizations Are Vulnerable to Hackers, Study Finds

Over 75% of Organizations Are Vulnerable to Hackers, Study Finds

Is your business prepared to handle all kind of online threats? A recent study shows that it probably isn’t. According to the think tank Ponemon Institute, four out of five businesses don’t have the infrastructure or security experts they need to spot and prevent incoming cyber attacks from succeeding. This is a significant statistic that can’t be ignored, especially if you want to secure your business.

0 Comments
Continue reading

Tip of the Week: 5 PC Maintenance Tips in Honor of National Clean Out Your Computer Day

Tip of the Week: 5 PC Maintenance Tips in Honor of National Clean Out Your Computer Day

Guess what? Today is National Clean Out Your Computer Day, and we know the perfect way to celebrate! Go grab yourself a can of compressed air and your trusted IT technician, because it would be a shame if you were to miss out on this annual opportunity to improve your computer’s performance.

0 Comments
Continue reading

Tip of the Week: How You Can Beat These 4 Common Scams

Tip of the Week: How You Can Beat These 4 Common Scams

b2ap3_thumbnail_basic_security_tips_400.jpgCybersecurity is one of the most important aspects of running a business. Therefore, here are some of the best ways that your employees can contribute to your company’s technology security practices.

0 Comments
Continue reading

Tip of the Week: 3 Exercises to Offset the Pain of Working From a Desk

Tip of the Week: 3 Exercises to Offset the Pain of Working From a Desk

Welp, we’re all doomed. It turns out that sitting all day at your desk is one of the worst things you can do for your health. Alternatively, numerous studies have shown the health benefits of trading your traditional desk in for a standing desk. One study even goes so far as to claim that standing at work is the best anti-aging technique you can do!

0 Comments
Continue reading

Tip of the Week: How to Craft an Irresistible Email Subject Line

Tip of the Week: How to Craft an Irresistible Email Subject Line

We think that it’s safe to say that nobody enjoys their inbox receiving incredulous amounts of emails on a regular basis. Yet, the business owner must maintain their inbox every day, and if a message doesn’t strike them as important, they’ll probably either ignore it or delete it completely. Here’s how you can prevent this from happening.

0 Comments
Continue reading

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

Couple Exploits Vulnerability With IRS Filing System, Steals $1M, Goes to Jail

The Internal Revenue Service is one organization that you don’t want to mess with. Thanks to their antics filing fraudulent tax returns through the often-exploited Get Transcript site managed by the IRS, Anthony and Sonia Alika have to do some time in the slammer; and that’s not even mentioning what they have to pay the IRS in restitution.

0 Comments
Continue reading

Tip of the Week: 4 Ways to Avoid Buying a Lemon of a Used PC

Tip of the Week: 4 Ways to Avoid Buying a Lemon of a Used PC

Every budget-minded business owner is always on the lookout for deals, especially when it comes to technology. The quest to save money might cause one to consider buying used computer equipment, which could work out great, or it could be disastrous, depending on a multitude of factors. If you’re serious about purchasing used computer equipment, then take into consideration these four tips.

0 Comments
Continue reading

Tip of the Week: 6 PC Troubleshooting Guidelines that Every User Should Know

Tip of the Week: 6 PC Troubleshooting Guidelines that Every User Should Know

When was the last time that you ran into a problem that was easily solvable, simply by restarting your computer or unplugging a device from the wall, then plugging it back in? Often times, simple troubleshooting tactics can be enough to resolve a problem, but more often than not, there are issues that can’t be easily resolved. It’s these ones that hold businesses back, and we’re here to help.

0 Comments
Continue reading

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Tip of the Week: 4 Ways to Get a Handle on Social Media in the Workplace

Social media may be a great way to connect with other professionals and communicate with your friends, but it can be dangerous if you have poor posting habits. Before you share something, think twice about whether it contains any sensitive information that could be risky to yourself and your business.

0 Comments
Continue reading

Customer Login

News & Updates

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Contact us

Learn more about what Argentum IT can do for your business.

Argentum IT
8914 Stone Green Way
Louisville, Kentucky 40220-4072

Copyright Argentum IT. All Rights Reserved.