IT Empowerment Blog
ONE 2 ONE participates in The Extraordinary Give 2015
ONE 2 ONE employees were proud to participate in the 2015 Extraordinary Give – Lancaster County’s Largest Day  of Online Giving! A compilation of $1000 was matched by ONE 2 ONE to the following organizations: Children’s Miracle Network Milagro House…
Cryptolocker de-mystified!
Cryptolocker Over the past month, the ONE 2 ONE team has seen an increase in the Cryptolocker virus. Our technicians have spent over 50 hours working towards recovering data, backup restores, and working with vendors on recreating system files and…
United Airlines, NY Stock Exchange experience massive computer issues
Earlier today (Wednesday) United Airlines reported that a network connectivity issue affected about 4,900 flights. Even though the issue seems to have been resolved, ramifications are expected to last through Wednesday and even into Thursday. In an unrelated issue, the…
Social Media Privacy Tips
by Abraham Casallas Facebook, Twitter, Instagram, and LinkedIn are among the most popular social networking sites used by millions of people worldwide. They provide a medium over which one can share and exchange information with virtual communities. As virtual communities…
Ransomware and lessons learned
“Ransomware” is the latest type of virus or malware to hit computers on a massive scale. What’s most frightening about this type of attack is that many variations are nearly impossible to remove. Ransomware takes over your files on your…
The Internet of Things (IoT)
by Abraham Casallas When we look back at history we can pinpoint to certain epochs that have caused massive shifts in the way people behaved, thought about things and interacted with the world. Epochs such as the Renaissance, where the…
ONE 2 ONE supports the Lancaster Barnstormers
ONE 2 ONE is proud to be the new IT provider for the Lancaster Barnstormers! To help kick off the start of the 2015 season, ONE 2 ONE team members attended the home game opener last night, which ended with…
Instantly turn your TV into a PC
Portable devices have been without a doubt rapidly climbing in popularity in place of traditional desktop computers. Just as quickly, finding means of streaming TV, movies, and other internet content has been on the rise. Now many tech companies are…
Tax season phishing and what you should know
With it being tax season, some of the biggest online threats to keep an eye out for are those in the form of spam emails appearing to be from the IRS. While you’ve most likely seen the news reports regarding…
US Government to start enforcing HTTPS-only policy on publicly accessible government websites
The US Government is pushing to have all publicly accessible government websites using HTTPS (hypertext transfer protocol secure) to secure website connections. The proposal, referred to as The HTTPS-Only Standard by the White House Office of Management and Budget, pushes…
How to take a screenshot (Windows)
There may be many times when you need to quickly capture what is on your screen. Whether it’s to show technical support an issue, or to grab something on a website so you can refer to it later, this is…
Tips for securing your information in 2015
In 2014, over 85 MILLION records were reported as compromised, according to the Identity Theft Resource Center (ITRC). These records were the result of only 783 breaches. These figures should be alarming for both individuals and businesses, as this shows…