Blog

Dresner Group Blog

Our technology blogs feature IT tips and best practices for businesses in Columbia, Baltimore, and Bel Air.

Apple Users Hit with Rare Cyberattack: What Can We Learn?

Apple Users Hit with Rare Cyberattack: What Can We Learn?

On Wednesday, April 10, 2024, Apple deemed it necessary to send a rare alert to certain users via email, spread out across 92 nations. As Apple’s website states, these threat notifications “are designed to inform and assist users who may have been individually targeted by mercenary spyware attacks.” Let’s review these attacks so we all understand this threat better.

0 Comments
Continue reading

Actions to Take When Your Phone Goes Missing

Actions to Take When Your Phone Goes Missing

If you are like many of the rest of us, the thought of losing your phone is a situation that brings on anger and fear. If your phone has been stolen, there are several steps you have to take to mitigate potential risks and increase the chances of recovering your device. Here's a general guide.

0 Comments
Continue reading

Four Useful Productivity Tips for Mobile

Four Useful Productivity Tips for Mobile

The smartphone has become the go-to device for most people’s personal computing. With the aid of well-developed mobile applications, people are able to manage their digital lives, while also accessing resources that make managing all other aspects of their lives easier. Below are four tips to help you make the most of your smartphone.

0 Comments
Continue reading

Tip of the Week: Implement Android Archiving to Free Up Storage Space

Tip of the Week: Implement Android Archiving to Free Up Storage Space

In April 2023, Google made a statement claiming that the Android platform would be able to archive unused applications with the intention of preserving storage space on the device. This came with a caveat: it would only do so if the device was almost out of available space. This auto-archiving feature, however, was released to a pleasant little surprise; it is available to all users, regardless of how much storage space is left on the device.

0 Comments
Continue reading

Cybercriminals are Using QR Codes to Infiltrate Businesses

Cybercriminals are Using QR Codes to Infiltrate Businesses

QR codes have become a popular tool for businesses to quickly and easily share information with customers. However, cybercriminals have found a way to exploit this technology for their own malicious purposes. In recent years, there has been a rise in QR code scams and vulnerabilities in businesses, making it crucial for companies to understand the risks and take necessary precautions to protect themselves and their customers.

In this article, we will explore the use of QR codes by cybercriminals, the potential vulnerabilities they pose for businesses, and how companies can improve their QR code security.

0 Comments
Continue reading

Tip of the Week: Stop Apps from Draining Your Android’s Battery Life

Tip of the Week: Stop Apps from Draining Your Android’s Battery Life

It’s natural for your mobile device’s battery to drain over time, especially as it gets a bit on the older side, but there are also applications that are notorious for causing faster battery drainage than you might prefer. Today, we’re going to help you identify the problem apps on your devices and provide opportunities to address them.

0 Comments
Continue reading

How Can You Improve Your Android Device’s Autocorrect?

How Can You Improve Your Android Device’s Autocorrect?

Autocorrect is one of those things that you either love or hate, depending on how many times it has saved you from embarrassment or been a source of embarrassment. Without appropriate context, it can sometimes struggle to offer you appropriate suggestions. Thankfully, you can make autocorrect work a bit better for you, and if you are just sick of it altogether, you can disable it.

0 Comments
Continue reading

Frustrated by Your Android Device Lately? A Bad Update Might be Why

Frustrated by Your Android Device Lately? A Bad Update Might be Why

With a global market share of 71.9 percent, the Android operating system that Google provides is well and away the most utilized there is today. Despite the fact that different phone manufacturers will fiddle with the OS to fit into the devices they create, Android tends to be pretty stable—which is part of the reason why many users were surprised around March 22nd, 2021. This is when these users discovered that their applications were crashing incessantly.

0 Comments
Continue reading

What to Do Immediately If You’ve Lost Your Phone

What to Do Immediately If You’ve Lost Your Phone

In our last blog we gave you some advice on what to do if your phone has gone missing, but if it has been stolen or lost for good, there are more pressing issues than the anger and loss you feel; you need to ensure that you and the people you do business with are protected. Let’s take a look at what you need to do to make that happen.

0 Comments
Continue reading

How to Find Your Lost iPhone or Android Smartphone

How to Find Your Lost iPhone or Android Smartphone

Imagine for a second you are out to a socially distant dinner date with the friends that you barely get to see. You wrap up dinner and say your goodbyes and when you get to your car you realize that you don’t have your phone. COMPLETE PANIC! Your whole life is on your phone. Now imagine that when you went back to the restaurant to get your phone, it wasn't anywhere to be found. We’ll talk you through how to proceed. 

0 Comments
Continue reading

Tip of the Week: Simple Solutions to a Few Android Problems

Tip of the Week: Simple Solutions to a Few Android Problems

While the Android platform is a highly capable mobile platform, there are a few oddities baked in that can create some annoyances for the user. To help you out, we’ve assembled a few tips to help you prevent these annoyances from impacting your use of your mobile device.

0 Comments
Continue reading

How to Make the Most of Mobile Device Management

How to Make the Most of Mobile Device Management

The concept of remote work is closely tied to mobility, which means that solutions and strategies that promote this mobility are particularly important for businesses to adopt if they are interested in benefiting from remote operations. Mobile device management is one such solution.

0 Comments
Continue reading

Create a Comprehensive Mobile Policy

Create a Comprehensive Mobile Policy

With mobile devices so ingrained into modern culture, the fact is that your employees are going to bring them to work. Most of them will use them for work. This can be beneficial, of course, but it can also cause problems. This month we’ll discuss what your company’s mobile policy should cover.

0 Comments
Continue reading

What’s the Best Way to Secure Your Mobile Device?

What’s the Best Way to Secure Your Mobile Device?

Smartphones now come with a variety of ways that users can elect to unlock their device, from biometrics to tactile patterns to good, relatively old-fashioned personal identification numbers. Of course, not all these authentication measures secure your phone equally well. Let’s consider some of these measures to determine which one is best for your device’s security.

0 Comments
Continue reading

Tip of the Week: Warning Signs of a Mobile Malware Infection

Tip of the Week: Warning Signs of a Mobile Malware Infection

If you’re the average business user today, you probably rely on a smartphone to manage much of your life, both personally and in the professional sense. As our phones have become so central to our lives, hackers now have the opportunity to attack through malicious applications. For this week’s tip, we wanted to go over a few ways to tell that an app might be an attack in disguise.

0 Comments
Continue reading

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

0 Comments
Continue reading

Tip of the Week: Locating a Misplaced Smartphone

Tip of the Week: Locating a Misplaced Smartphone

The great thing about smartphones, in a business sense, is how portable they are - you can literally be productive almost anywhere. Unfortunately, this also means that they can be lost almost anywhere. Luckily, there just so happens to be a feature built into Android that can help you find yours.

0 Comments
Continue reading

Powerful Smartphones That are Currently On the Market

Powerful Smartphones That are Currently On the Market

With the new innovations made to smartphones every year, you’d be hard-pressed to understand how the global smartphone has hit the skid. While Apple and Samsung sit pretty with large market shares, manufacturers that we’ve come to expect near the top of the smartphone market: Blackberry, HTC, and Nokia are but bit players. Their largest competition is now coming from Chinese companies Xiaomi, Huawei, and OnePlus.

0 Comments
Continue reading

Fingers Crossed! The Robocalls May Soon Stop

Fingers Crossed! The Robocalls May Soon Stop

While many of us rely on phones to remain productive during the day, too often are we now picking up the phone to a spammer’s snake-oil sale: “Hello, we are reaching out to inform you that there has been an issue with your account” or similar nonsense. While this is enough of an irritant in our daily lives, it isn’t as though a business can wait for a call to go to voicemail to find out if it was legitimate or not.

0 Comments
Continue reading

Encryption Helps Keep your Smartphone Secure

Encryption Helps Keep your Smartphone Secure

These days everyone has a smartphone; and, they can do some pretty incredible things. One place that the average smartphone may seem to be a little loose is in the arena of data security. Today’s smartphones do, in fact, come with encryption by default, so there is some semblance of device security on every device. What does this mean? We’ll break it down.

0 Comments
Continue reading

Client Service Login

Latest News & Events

Annual Channel Futures MSP 501 Identifies Best of the Best in the Managed Services Industry Dresner Group has been named as one of the world’s top-performing managed service providers in the prestigious 2024 Channel Futures MSP 501 rankings. The Chan...

Contact Us

Learn more about what Dresner Group can do for your business.

Copyright Dresner Group. All Rights Reserved.