Seamróg Technology Solutions Blog

Seamrog Technology Solutions has been serving the Pennsylvania area since 2001, providing IT Support such as technical helpdesk support, computer support and consulting to small and medium-sized businesses.

Tip of the Week: What’s the Point of CC and BCC in My Email?

Tip of the Week: What’s the Point of CC and BCC in My Email?

We’ve all seen the fields in our email, CC and BCC, and most of us have probably used them before. Let’s consider where we get those terms, and how each of them is properly used.

0 Comments
Continue reading

Is Discord a Viable Choice for Your Business?

Is Discord a Viable Choice for Your Business?

While it isn’t officially a business solution, per se, the collaboration platform known as Discord has seen some popularity as a means of facilitating a business’ internal communications. Let’s go over some handy tips to improve your use of the platform, in case you are part of an organization that does so. Who knows… this might inspire you to give it a chance for yourself.

0 Comments
Continue reading

The Federal Communications Commission is Evaluating Mobile Broadband

The Federal Communications Commission is Evaluating Mobile Broadband

Broadband Internet access is a critical consideration for today’s world, considering how much of daily life and business is now conducted online. Having said that, Internet access is still far from a given. In the United States, the Federal Communications Commission wants to work to fix this—but to do so, they need data. To help collect this data, the FCC wants you to install a speed test application on your smartphone.

0 Comments
Continue reading

How to Compose Emails More Quickly with Gmail Templates

How to Compose Emails More Quickly with Gmail Templates

With so much time being spent in email, and Gmail holding a 33.7 percent market share, it should come as no surprise that many businesses wouldn’t mind it if a little less time were spent in Gmail if possible. As it happens, one of the most frustrating expenditures of your time—rewriting similar emails repeatedly—can be eliminated by creating Gmail templates.

0 Comments
Continue reading

Let’s Look at a Few Collaboration-Themed Applications

Let’s Look at a Few Collaboration-Themed Applications

Boosting collaboration is a central theme to many companies' operational strategies. The more that people can do as a team, the less costly operations have to be. That is a sound business strategy. Today, many businesses are looking to software to build a successful collaborative situation. Let’s take a look at three such apps that, if used properly, will help any business boost their team’s ability to work together. 

0 Comments
Continue reading

VoIP is Probably Right for Your Business

VoIP is Probably Right for Your Business

VoIP (Voice over Internet Protocol) telephony is a common technology amongst modern businesses for their communication needs. Let’s go over how VoIP functions and how it can benefit your company.

0 Comments
Continue reading

Collaboration Spans Multiple Apps

Collaboration Spans Multiple Apps

The improvement in technology directly contributes to the amount of productivity business sees. One place this is evident is in the way in which businesses use collaboration tools to move business forward. Let’s take a brief look at what exactly we mean by collaboration tools and how they benefit the businesses that use them. 

0 Comments
Continue reading

VoIP Is a Complete Game Changer

VoIP Is a Complete Game Changer

Businesses of all types rely on their telephone systems. Today, there is an option that can revolutionize any business’ communications platform, and do so for a fraction of the cost of a traditional telephone system. Today, we’ll take a look at VoiP and why it’s such a good option for your business.

0 Comments
Continue reading

The Importance of Secure Conferencing

The Importance of Secure Conferencing

Conferencing has been an important tool for businesses as stay-at-home orders have moved their operations out of the office and into worker’s homes. While there are dozens of video conferencing solutions on the market, businesses should consider security just as much as they consider functionality. Today, we’ll take a look at security for your company’s conferencing solutions.

0 Comments
Continue reading

Any Business Can Benefit from Digital Signage

Any Business Can Benefit from Digital Signage

While there are definitely gimmicks when it comes to technology in the small business (for instance, USB-powered staplers) there are many devices and technologies that have far more utility, although they may not seem to be applicable to all industries. One example would be the digital signage solutions that have grown in popularity. While they may seem to have limited uses outside of retail, there are plenty of ways to use them to your advantage.

0 Comments
Continue reading

A Brief Review of (Some) VoIP Features

A Brief Review of (Some) VoIP Features

VoIP (Voice over Internet Protocol) solutions famously offer businesses some significant cost savings. While this may be the extent of many people’s understanding of its value, VoIP actually has a lot more to offer. That’s why we wanted to go over just a few of its benefits - to provide a bit of insight into what makes VoIP such a great choice for today’s organizations.

0 Comments
Continue reading

Are You Providing Internal Communication Capabilities?

Are You Providing Internal Communication Capabilities?

Businesses have a variety of communications to manage, including their internal ones. For many, this may be put on the back burner, as they prioritize their operational and sales-encouraging communications. However, internal communications are just as crucial, which is why we’re going over some of your options here - and how you need to use them.

0 Comments
Continue reading

New T-Mobile Data Breach Compromised Customer Info

T-mobile-12-4

Recently the US branch of the global telecom company T-Mobile disclosed a security breach that impacted a small percentage of its customer base. Specifically, the breach revealed certain information belonging to a small number of the company's prepaid cellphone users. The exposed data included customer names, billing addresses, account numbers, rate plans, plan features and user phone numbers. The company stressed that no payment card information or passwords were compromised.

0 Comments
Continue reading

Twitter Making Changes To Their Political Ad Rules

twitter-11-30

Social media has been at the center of several high-profile political dramas of late. The major platforms came under fire for not doing enough to monitor political ads and other content. The major players on the social media landscape are all responding in different ways to the backlash. Recently, Twitter announced some new policies that will likely be in place before the time you read these words. Beginning on November 22nd on Twitter, the company's new political content and cause-based advertising policies will forbid the paid promotion of certain content.

0 Comments
Continue reading

Which Email Platform is Better for You, Outlook or Gmail?

Which Email Platform is Better for You, Outlook or Gmail?

Email remains an incredibly useful tool in the business setting, assisting with a wide variety of communication needs. However, in order to make the most of your emails, you need to have an email client that permits you to do so. Here, we’re pitting two major email clients against each other to see which one offers the features that best suit your business and its needs.

0 Comments
Continue reading

Android Devices Using Qualcomm Chips Can Be Hacked

android-11-25

Do you have an Android device? Is it built around a Qualcomm chipset? If so, be advised that you may be at risk. According to a report recently published by security firm CheckPoint, a recently discovered flaw could allow hackers to steal a variety of sensitive information on your phone or tablet.

0 Comments
Continue reading

Public Chargers Can Expose Your Device To Hacking And Malware

airport-11-23

On paper, it seems like a lovely idea to use a public charger. Airports, hotels, and other high traffic areas have begun to increasingly offer public USB power charging stations to give people a convenient means of recharging their favorite devices. Unfortunately, things are not working out quite according to plan. Naturally, hackers around the world have taken note, and regard such easily accessed terminals as juicy targets and low hanging fruit. According to a security alert published by the Los Angeles District Attorney's office, many of these stations have been compromised, and using them could expose you to malware.

0 Comments
Continue reading

Hackers Are Imitating Government Agencies To Spread Malware

government-11-22

Researchers at Proofpoint have found evidence of a new threat actor who has been sending out convincing looking emails. They are claiming to come from several government agencies. These include the Italian Revenue Agency, the German Federal Ministry of Finance, and the United States Postal Service. This is all part of a malicious campaign designed to infect targeted recipients with a variety of malware.

0 Comments
Continue reading

Another WhatsApp Vulnerability Has Been Found

whatsapp-11-21

WhatsApp is the most popular messaging platform in the world. Unfortunately, that means it's got a giant bullseye on it where hackers are concerned. In recent months, the company has faced no end of troubles as a raft of vulnerabilities have been exposed and exploited by hackers from every corner of the globe. The company is still reeling from the blowback associated with these various issues, but their troubles don't seem to be over yet.

0 Comments
Continue reading

Fake Voicemail Messages Tricking People Into Opening Malicious Content

voicemail-11-19

Office 365 has been the target of an increasing number of ongoing phishing scams. The latest scam involves using fake voicemail messages to convince targets that they need to log in to hear the full recording. Researchers at McAfee Labs had this to say about the matter:"Over the past few weeks McAfee Labs has been observing a new phishing campaign using a fake voicemail message to lure victims into entering their Office 365 email credentials. At first, we believed that only one phishing kit was being used to harvest the user's credentials. However, during our investigation, we found three different malicious kits and evidence of several high-profile companies being targeted."

0 Comments
Continue reading

Customer Login

News & Updates

Seamróg Technology Solutions is proud to announce the launch of our new website at www.seamrogtech.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact us

Learn more about what Seamróg Technology Solutions can do for your business.

Seamróg Technology Solutions
PO Box 60174
Harrisburg, Pennsylvania 17106