PremierePC was losing money on credit card fees every month. The client pays their invoice, credit card company takes a percentage for themselves, and PPC gets the rest.
We were faced with having to punish the client by raising costs or adding additional processing fees, or finding an alternative.
We found, with GoCardless, how to get easy-to-use, seamless ACH Direct Debit capabilities for our clients, at a MUCH lower fee per transaction. PremierePC is saving $1,200 in fees each month.
See our co-founder, Matthew Rydzfski, discuss the benefits to partnering with GoCardless.
GoCardless has saved us about $1,200 a month in fees, and that money can be reused to better support staff, our services, and our clients.
Did you know you can customize your Google Searches?
Here are five tips to help you improve your search engine skills.
Filter search results by date. Type your phrase and search. Then click TOOLS (below the search bar), change ANY TIME to CUSTOM RANGE. Insert your dates and filter.
Exclude keywords you don’t need. Place a MINUS SIGN (-) in front of any words you don’t want included in your search. Emphasize important search terms by placing a PLUG SIGN (+) in front of it.
Search for files. Type FILETYPE:_____ at the beginning of your search. Fill the blank with the type of file you’re looking for. Ex. filetype:pdf for pdf files and filetyps:xlsx for Excel spreadsheet.
Use Advanced Search. Click SETTINGS and look for ADVANCED SEARCH; there are multiple ways you can further specify your search.
Quick tips. Type exact searches in QUOTES. Search a specific site by placing SITE:____ directly in front of URL. (site:premierepc.net “computer and network support”)
Happy searching!
https://www.premierepc.net/wp-content/uploads/search-google-tips-5-e1639405768941.png17321839Geena Hammondhttps://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.pngGeena Hammond2021-12-13 09:31:412021-12-13 09:31:41Did You Know… (5 Google Tips)
Hackers and cybercriminals launch attacks every 39 seconds, which is an average of 2,244 times per day.
More than 8 Billion records were confirmed to be compromised in the last year alone.
By now I’m sure you’ve read or heard about our Dark Web Monitoring solution, combining human and sophisticated Dark Web intelligence with search capabilities to identify, analyze and proactively monitor for an organization’s compromised or stolen employee and customer data. Well, Dark Web ID just got an upgrade!
With the new release, PII Data capabilities have been enhanced. Dark Web ID now displays non-sensitive PII (Personal Identifiable Information) values when they available.
What does this mean for you?
Not only can you know the type of information the bad guys know, you can know what the bad guys know.
For example, you would previously be alerted of the email address, and type of PII (such as First Name Last Name and Address.)
Now, you will be alerted of the email address and PII values (such as John Smith 345 Main Street, Greenville, SC.)
Ever open your email and immediately get a sinking feeling in your gut?
“WHAT‽ How do I have 37 messages from that one company‽ I want to keep these but I definitely don’t need to read them all. What do I do‽”
Introducing Sweep.
Here’s how it works:
Go to your Inbox, select a message.
On the menu bar, select Sweep.
Choose how you would like to handle the email messages from that sender.
Select OK.
Easy enough.
Stay tuned for more cool features to improve your daily workflow.
https://www.premierepc.net/wp-content/uploads/microsoft-to-ditch-nokia-e1619541991640.jpg333333Geena Hammondhttps://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.pngGeena Hammond2021-07-22 11:37:322021-07-22 11:37:32Outlook: Cool Features For This Hot Summer
Have you ever thought about the health of your computer?
If not, it may be time to start!
There are preventative measures you can take to prolong the life of your machine.
Here are a few of the highlights:
Stay up to date
PremierePC handles this. Windows updates are pushed from us to make sure security updates are always current.
Scans/Anti-virus
We also handle this. Webroot anti-virus is pushed to all service plan computers, running regular scans.
Clean computer physically
This can be useful. Make sure that computers don’t sit in places that accumulate dust or dirt, as an abundance of dust inside a computer and prevent it from cooling itself effectively. Computers also have built in fail-safes to slow down if they get too hot so the machine doesn’t completely break.
Clean up files
Saving files to the desktop is convenient and useful, but the operating system has to load additional resources when there are more files visible on the desktop. Additionally, files piling up in the recycling bin generally won’t have an adverse effect on computer speeds, but it doesn’t hurt to clean it out every once in a while.
Close out programs not in use
This is two-fold. One, it allows other programs on the computer to use more resources, and generally, run faster. Two, without getting overly technical, when a program is open for a long time, resources in memory can get “lost.” Closing or restarting a program can help flush out the system.
Restart the computer
It can be beneficial to turn off, and/or restart computers from time to time. Not necessarily every day, but once a week is a good time frame. This, similar to the previous tip, helps to clean things out that are stuck or wasting space in the background of the computers resources.
https://www.premierepc.net/wp-content/uploads/orange-computer-e1622229958815.png491498Geena Hammondhttps://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.pngGeena Hammond2021-05-28 15:33:232021-05-28 15:31:11Tips on Computer Health
Let’s face it. We are all extremely busy all the time; or so it seems.
So we LOVE shortcuts. Anything that can maximize efficiency and multi-tasking gets my vote.
Here’s a review some of the most commonly used Windows keyboard shortcuts. This can increase productivity and offer a smoother workflow in day to day computing.
Note: ‘Win’ refers to the Windows Logo Key pictured below
Microsoft Edge is the internet browser that was created to replace Internet Explorer. Edge runs faster and has more features than Internet Explorer, and comes preinstalled on all Windows computers. This browser is also offers faster performance speeds than every other browser.
Edge is a Chromium browser, meaning it can run hundreds of extensions that were meant for Google Chrome users in addition to the extensions in the Microsoft Store.
This browser uses the OS default account to auto sign into the browser. This may not sound like a big deal, but with necessary security measures you may find yourself signing in to different many websites each day, multiple times a day, slowing you down.
This option saves you the trouble of reentering your credentials to access your work websites and increases productivity.
For the techies: Edge supports signing in with Active Directory Domain Services, Azure Active Directory, and Microsoft accounts.
This is one of my personal favorites – by signing into my Microsoft account in my Edge browser, I can sync all bookmarks, history, passwords, etc. across devices.
This feature copies over the rich web format of selected text instead of reformatting the text from your browser into an ugly mess. Right click, choose “smart copy,” then paste – it’s that simple!
Edge offers three options for tracking: basic, balanced, and strict. Depending on which is selected, Microsoft will adjust the types of third-party trackers blocked.
Edge’s private browsing will delete history, cookies, and site data upon closing the tab.
Increased security, increased productivity, and increased performance? Sounds like a good deal to me.
https://www.premierepc.net/wp-content/uploads/Edge-Logo-e1619528799116.jpg800802Geena Hammondhttps://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.pngGeena Hammond2021-04-29 11:00:082021-04-27 09:48:41Let’s Chat About Microsoft Edge
Unfortunately, malware is a hot topic these days. SMBs are a target for the bad guys, and your data could be at risk.
So let’s make sure we know what malware is, what forms it can take, and how to mitigate these risks.
Malware is a piece of software designed to cause damage to a computer, server, or network of computers – this is the umbrella term for malicious software.
Virus
A computer virus modifies the system files of the host computer to execute malicious code and infect other files. This is the only form of malware that modifies other files on a computer. Viruses can be attached to emails and then downloaded by the end user.
Ransomware
This type of malware encrypts data in an information system and demands payment in exchange for regaining access. These types of attacks have increased drastically during the COVID-19 pandemic, think 72% or more. However, many ransomware variants refuse to unencrypt data and some even delete the files after ransom is paid. Ransomware is often spread through spam emails.
Trojans
This malicious software looks and behaves like legitimate software but contains malicious code. The most common entry point of a trojan is from pop-up banners on websites that indicate that the user’s computer is infected with viruses and needs antivirus software to clean it up. The “antivirus software” user download contains malicious code designed to gain backdoor access to systems, steal sensitive data, or spy on user or network activities. The important thing to remember about trojans is that the user must take some action for this to take root in the computer.
Spyware
Spyware tracks the activities of the user on the infected computer including keystrokes, passwords, pin codes, payment-related information, personal messages, and other identifiable information. This can come in the form of adware – a malicious advertisement designed to force clicks from users – spoofing emails, and freeware – bundled with other software. Spyware can infect a device when a user agrees to the terms and conditions of a legitimate software program – so always read the fine print!
Worms
Worms are able to replicate themselves in different computers in the same network as the infected computer. Software backdoors, vulnerabilities in operating systems, and flash drives all provide opportunities for worms to gain access. Once a worm has gained access, it will replicate itself, spreading from device to device, with no action from the end user. These worms can then be used to initiate a DDoS attack, steal data, or give attackers control over the system.
Bots
Bots are hybrid forms of malware, often originating in spam messages, than can execute automated tasks through remote instruction. Many bots are used for legitimate purposes, but can also be appropriated for nefarious actions. A large set of these bots creates a botnet, a swarm of bots, attacking a number of systems in sync, making them capable of large-scale attacks.
Now what
Understand the risks
Educate yourself and employees on malware and prevention strategies
Build your security stack
Stay up to date on cyber criminal’s attack methods
https://www.premierepc.net/wp-content/uploads/malware-sign.jpg600600Geena Hammondhttps://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.pngGeena Hammond2021-02-17 14:18:402021-02-17 14:18:40What is Malware? Am I at Risk?
Ever experience a client call running over and you need to get on the road?
Have you taken a call in your car on the way to work and need to transfer to your desk phone when you get there?
GoTo offers three ways to answer any call: the desktop app, mobile app, and the physical desk phone. This can be extremely convenient for you if you move around the office, take calls on the road, work remotely, etc. A useful feature many users are unaware of is the ability to switch active calls between devices.
Calls can be flipped that are active, waiting in queue, in the process of being transferred, or even calls that have not yet been answered.
Currently, there are no permission checks. Keep in mind if there are multiple active calls, you can’t pick which one flips.
Follow these steps to flip a call:
GoToConnect Desktop
While on an active call on another device, open GoToConnect desktop or web.
Hover over Your active call on another device in the left sidebar and then click to complete the switch to the desktop app.
The call will be automatically ended on the original device. This change will be transparent to the other party.
GoToConnect Mobile
While on an active call on another device, open GoToConnect mobile.
Tap Active Call at the top of your screen.
Tap Take the call to complete the switch to the mobile app.
Desk phone
While on an active call, dial *77 from the desk phone.
The call will automatically end on the original device. This change will be transparent to the other party.
Want another pro tip? When a colleague’s phone is ringing, you can pick up the call by dialing *97 from your phone then entering the colleague’s extension.
https://www.premierepc.net/wp-content/uploads/logo_circle-1.png192192Geena Hammondhttps://www.premierepc.net/wp-content/uploads/premierepc_business_it_solutions_greenville_sc.pngGeena Hammond2021-02-12 14:55:082021-02-12 14:55:08GoTo: Switch a Call Between Devices