Google Titan Security Key Adding an extra layer of security to your devices when you log in Gmail – Computer -Mobile Phone Passkeys are appearing more and more in tech news, with support for them increasing. Since many administrators test out new technologies themselves first, we embarked on a short project to see what happened...Read More
How to Backup G Suite Emails Google ended 2018 with 5 million paying businesses and the number has only grown since then. With Google G Suite / Google Workspace, one can access their emails anytime and anywhere. With cloud technology and an advanced set of productivity apps, it is among the top enterprise-level applications. But...Read More
Gmail Advanced Protection Program Guard against targeted attacks Protect users with the Advanced Protection Program from Google Next: Enable user enrollment in the Advanced Protection Program Advanced Protection helps you protect users who are at risk for a targeted attack, such as: Google Workspace and Cloud Identity super admins or delegated admins Political campaigns Activist groups...Read More
What is SSH? SSH, also known as Secure Shell or Secure Socket Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. SSH also refers to the suite of utilities that implement the SSH protocol. Secure Shell provides strong password authentication and public key authentication, as well...Read More
Google Ranking Factors for 2024 You might already know that Google uses over 200 ranking factors in their algorithm… But what are they, exactly? Well, you’re in for a treat because I’ve put together a complete list. Some are proven. Some are controversial. Others are SEO nerd speculation. But they’re all here. And I recently updated this...Read More
IP V4 – IP V6 IPv4 vs. IPv6 What is IPv6? IPv6 is the next-generation Internet Protocol (IP) address standard intended to supplement and eventually replace IPv4, the protocol many Internet services still use today. Every computer, mobile phone, home automation component, IoT sensor, and any other device connected to the Internet needs a numerical...Read More
How DNSSEC Works The domain name system (DNS) is the phone book of the Internet: it tells computers where to send and retrieve information. Unfortunately, it also accepts any address given to it, no questions asked. Email servers use DNS to route their messages, which means they’re vulnerable to security issues in the DNS infrastructure....Read More
Registry – Registrar – Registrant What is the difference between a registry, registrar and registrant? There are three different roles that participate in the domain name registration process: The registry, registrar, and registrant. The following information breaks down each role and how they work with one another: Registry: A domain name registry is an organization that manages...Read More
Fifteen Questions for Web Designers Fifteen Questions for Web Designers If you are looking for a web designer to help you with your next small business website project, ask the following questions before you start your project. Take the time to conduct a phone interview or meet in person with the designer and ask the...Read More