RCS Professional Services Blog

RCS Professional Services has been serving the New York area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

There’s Nothing “Smashing” About the Nigelthorn Malware

There’s Nothing “Smashing” About the Nigelthorn Malware

Once again, there is an example of why all users need to be careful about what they install. This time, however, users of the Google Chrome browser are the ones being specifically targeted by a particularly nasty attack known as “Nigelthorn.”

Continue reading
0 Comments

Considering the Future of Wireless Charging

Considering the Future of Wireless Charging

There is a lot of demand for perfected wireless charging. If this could happen, it’s possible to think about a world where no devices ever ran out of juice. Though there is a major push to make this happen, it’s clear that there are some people out there who don’t think that wireless charging will have as drastic an effect as it would seem.

Continue reading
0 Comments

Tip of the Week: Removing the Temptation of Distracting Websites

Tip of the Week: Removing the Temptation of Distracting Websites

The Internet might be an incredible tool to get lots of work done, but it can also be a major detriment in the form of workplace distractions. It’s true that your employees might feel tempted to visit these websites when left be, but what if you were to remove these websites as possibilities entirely? This week’s tip is about blocking certain websites that can be problematic for productivity.

Continue reading
0 Comments

Why Break/Fix Gives Business Owners Nightmares

Why Break/Fix Gives Business Owners Nightmares

Like cars and industrial equipment, computers are complex machines. To function properly they will need to be maintained, and sometimes fixed. Components inevitably fail, users (very) often make mistakes, and sometimes other people deliberately break things out of a litany of emotions. If your computer has seen better days, and you’ve done all you can, seeing if you can get it repaired will involve unhooking it and bringing to your local computer guy.

Continue reading
0 Comments

A Brief Introduction to .NET Framework

A Brief Introduction to .NET Framework

You may have heard of .NET framework before, or if you routinely use a Microsoft Windows operating system you’ve probably been prompted to install it at some point. Pronounced “dot net”, it is the predominant software framework of Windows, the most used non-mobile operating system in the world. Today we will introduce some software terms, go into what a software framework is, and how .NET framework is unique.

Continue reading
0 Comments

Tip of the Week: How to Cut Back on Your Mobile Data Use

Tip of the Week: How to Cut Back on Your Mobile Data Use

One of the biggest benefits of mobile data is how useful it is to business users for networking and productivity while they’re on-the-go. However, one of the biggest drawbacks to mobile data is how easy it is to use up while networking and being productive, and how expensive this can be. Fortunately, there are some ways to reduce the amount of data an Android device uses, as we’ll discuss in this tip.

Continue reading
0 Comments

A Case in Support of Managed Services

A Case in Support of Managed Services

Thanks to what’s become known as the “as a service” business model, organizations of all sizes can take advantage of great services that once may not have been as accessible. Even better is that they are often provided at an even more affordable rate than ever before. We’ll walk you through the specifics of what you can expect to receive from a using an “as a service” model.

Continue reading
0 Comments

Stress is a Killer - Especially to Your Business’ Operations

Stress is a Killer - Especially to Your Business’ Operations

There are situations that happen every day that can be extraordinarily stressful for people. Some people are better under duress, while some people fold like origami, but no matter what type of person you are, the workplace is one of the biggest stressors for human beings. Today, we’ll review some sources of stress and how people react to it.

Continue reading
0 Comments

Tech Terminology: Processor

Tech Terminology: Processor

The word “computer” actually originated in the 1600s, when it was used to describe a person who carries out calculations and the requisite processes. Today, those processes are carried out mechanically. Let’s examine the piece of the computer that allows it to do so, the CPU.

Continue reading
0 Comments

FinTech Has a Daily Impact on Our Lives

FinTech Has a Daily Impact on Our Lives

Money is what makes the world go around, or so they say. Everyone is in business to make money, but the degree to which the organization deals with it might vary. For example, some companies, like banks, are designed to make money by helping others manage theirs. Banks and marketplace lenders take advantage of what is called financial technology, or FinTech, to more effectively provide services to individuals or organizations that want to manage, borrow, pay, see, or use their money in more efficient ways.

Continue reading
0 Comments

Upcoming Events

No events

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Best Practices Technology microsoft Privacy Internet Software Tip of the Week Business Management workplace tips Tip of the Week Small Business Email Backup gadgets Mobile Office Managed Service Provider Hackers Cloud hardware Productivity Saving Money Quick Tips Google Data Malware Business COmputing Social Media Business Smartphones Mobile Devices Microsoft Office User Tips Computer Users Android Hosted Solutions Innovation Efficiency IT Services Virtualization IT Support Upgrade Windows WiFi Smartphone Miscellaneous Passwords Business Continuity Network Security Operating System VoIP Holiday Communication Disaster Recovery Mobile Computing Apple Server Unified Threat Management The Internet of Things Marketing Facebook Alert Mobile Device Management Ransomware Windows 8 Gmail Apps IT Support Antivirus Windows 10 Analytics Network Remote Computing Tech Term Content Filtering History IT Consultant Cybersecurity Outlook Remote Monitoring Money Browser Artificial Intelligence Data Recovery Health Big data Excel Vendor Management Going Green communications Office Virus Data Management Hacking Maintenance Collaboration Search Phishing Bandwidth App Cybercrime Employer-Employee Relationship Printer Tutorials Windows 10 Firewall Data Backup Current Events Website Mobile Device Managed IT Services Productivity Lithium-ion Battery Humor Spam PowerPoint Business Intelligence Proactive IT Hard Drives Tech Support Automation Managed IT Services Word iPhone BDR Internet of Things Downtime Laptop Data Security Applications BYOD Company Culture Best Practice Comparison Networking Avoiding Downtime Bluetooth Chrome eWaste Wireless Technology Update Social Networking Cost Management VPN Augmented Reality Office 365 Social Save Time Document Management Data loss Websites Safety Gaming Console Specifications Scam SaaS Robot DDoS Government IBM Computers Tech Terms Net Neutrality Lifestyle Access Control Social Engineering Cortana Touchscreen USB Data Breach Administration Compliance Presentation Computer Repair Patch Management Information Technology Wireless Running Cable Saving Time Bitcoin Digital Payment Phone System Encryption Unified Communications Blockchain Save Money Law Enforcement Retail Project Management Education Computer Accessories Vulnerabilities Cryptocurrency Experience Bring Your Own Device YouTube Tablet IT Management Mouse Cleaning User Error Customer Relationship Management Data storage Two-factor Authentication Pain Points Hiring/Firing Vulnerability Disaster Inbound Marketing User Help Desk Google Docs Sports Business Technology Recycling Television Piracy Google Maps Recovery Virtual Desktop Product Reviews Hackeres Office Tips Text Messaging Identity Theft Display Conferencing intranet Continuity SharePoint Hiring/Firing Trending Software License Music Documents Public Speaking Phone Systems Devices Software as a Service Ebay Virtual Reality Entertainment Backup and Disaster Recovery Knowledge Solar Freedom of Information Statistics Mobile Technology Black Market Securty Heating/Cooling Analytic Point of Sale Regulations Deep Learning Pirating Information Chromebook LiFi Value Managing Stress News Desktop Business Growth Hacker Media Streaming Accountants Managed IT Monitors Professional Services Visible Light Communication Password Printer Server Entrepreneur Cables Fake News Start Menu Google Wallet Displays Customer Service HIPAA Equifax Zero-Day Threat Debate Budget Advertising Processors GPS Electronic Payment Router LinkedIn Wires Microsoft Excel Data Protection Hosted Solution End of Support IP Address Harddrive Get More Done Startup Dongle Audit Hard Drive 3D Webinar Voice over Internet Protocol Teamwork Mobile Security Drones Writing Storage File Sharing Legislation Redundancy Service Level Agreement Printing email scam Distributed Denial of Service Manages Service Provider Keyboard FinTech Multi-factor Authentication Digital Leadership Domains Emails Smart Office Downloads Shortcut Fax Server MSP Virtual Assistant Twitter Device security Network Congestion Memory Troubleshooting Trojan Wireless Headphones Emergency Environment Work Mobility Programming Computing Infrastructure Computer Care Staffing Streaming Media Competition External Harddrive Skype Development Hard Drive Disposal Co-Managed IT Time Management Wearable Technology Nanotechnology Online Currency Optimization Google Calendar Read Business Cards Training Society Windows XP Application Smart Phones Travel Charging HTML Unified Threat Management Legal Upselling Business Owner Screen Reader