Get Started Today!  (954) 834-2800

croom new

KB Technologies Managed IT Blog

KB Technologies has been serving the Deerfield Beach area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Internet Images, Part 2: Resizing Images

Internet Images, Part 2: Resizing Images

In part one of this tutorial we discussed the types of images you will encounter online and how they can be used. Today, we will go a little bit further and talk about how to best alter your images without sacrificing quality. Let’s dive right into it. We will be using Adobe Photoshop, but there are several image editors that you can utilize to edit images for online publication.

0 Comments
Continue reading

Internet Images, Part 1: Image Formats

Internet Images, Part 1: Image Formats

They say a picture is worth 1,000 words. If that is true (or even close to true), images can do a lot for what you are trying to accomplish online. We thought it would be useful to put together a little tutorial about the use of images online and provide some useful information about the types of images you’ll encounter there. 

0 Comments
Continue reading

Could Windows Soon Be Even More Optimized for Your Intended Use?

Could Windows Soon Be Even More Optimized for Your Intended Use?

With so many users worldwide embracing Windows as their chosen operating system for all kinds of purposes, there are many different settings that can be customized to best fit the different needs of a workplace as compared to a gamer’s or a family’s setup. Microsoft understands this, and so is testing out a new feature to help a user quickly personalize a device to its predominant use.

0 Comments
Continue reading

Tip of the Week: Keeping Track of Your Chrome Tabs

Tip of the Week: Keeping Track of Your Chrome Tabs

Google Chrome is by far the most utilized browser on PC and mobile, meaning that most people use Chrome for a majority of their jobs, their finances, and just about anything else you could use a browser for. Since it’s so widely utilized, we thought it would be good to give our readers a few tips on how to get the most out of their Chrome experience. Today, we provide a few tips on how to best utilize the tab feature in Chrome. 

0 Comments
Continue reading

How to Strategically Scale Back Your IT and Do More

How to Strategically Scale Back Your IT and Do More

Businesses have always needed to use their available resources efficiently, but it has perhaps never been as important for them to squeeze as much value out of what they have. To further this end, let’s go over a few ways that you can more intelligently reduce your IT budget in the short-term.

0 Comments
Continue reading

Reconsidering What Your Workstation’s Power Button Can Do

Reconsidering What Your Workstation’s Power Button Can Do

We’re all familiar with what the power button looks like, and what it’s supposed to do. What fewer people are familiar with is what the image on the button really means, and the different things that the power button can be used for.

0 Comments
Continue reading

Tip of the Week: How to Easily Reorder Your Gmail Messages

Tip of the Week: How to Easily Reorder Your Gmail Messages

Regardless of how well you try to maintain your email inbox, there will most likely be some messages floating around after some amount of time—especially when you have a lot of emails coming in at once. When there’s one or two that you really need to keep track of, one of Gmail’s features provides a handy cheat to make this much simpler.

0 Comments
Continue reading

Destigmatizing Some Popular IT Buzzwords

Destigmatizing Some Popular IT Buzzwords

Even the most seasoned technology professional—the most gung-ho person about the technology—probably thinks that there’s too much IT-related jargon and buzzwords now floating around. There is a good reason for this: analogies and euphemisms are effective ways to communicate concepts and ideas that would otherwise require technical experience.

However, there is such a thing as too much.

0 Comments
Continue reading

What Are the Differences Between Compliance and Security?

What Are the Differences Between Compliance and Security?

Most businesses fall under some type of regulation that demands compliance. This will be especially true as data privacy concerns turn into further regulations. Most of today’s compliance standards are centered around data security, so you’d figure that if a company is compliant with the regulations their operations fall under, that would mean their business is secure. Unfortunately, the two terms aren’t always synonymous. Today, we will discuss the difference between security and compliance. 

0 Comments
Continue reading

An Introduction to Working With Google Drive

An Introduction to Working With Google Drive

In the nearly ten years it has been available, Google Drive has firmly established itself as one of the best cloud platforms for businesses to use. In case you’re just getting started with it, we’ve put together a cheat sheet to help you out with a few processes.

0 Comments
Continue reading

Determining the Most Effective Ways to Come Up with Secure Passwords

Determining the Most Effective Ways to Come Up with Secure Passwords

Passwords are a crucial element of your online security in terms of keeping threats from being able to access your accounts and resources. Unfortunately, for fear of accidentally locking themselves out of their accounts, many users have gotten into the unfortunate habit of taking shortcuts when it comes to their use of passwords. Let’s try to fix this by going over a few ways to design a password that is both memorable and sufficiently secure.

0 Comments
Continue reading

Improve Your Business with Workflow Automation

Improve Your Business with Workflow Automation

Technology is a big part of the front end of almost every business. This is doubly true today as most businesses have built—and actively support—a robust web presence. Technology, however, is also used to power a business on the back end. Today, we’ll discuss a couple ways that today’s businesses are benefiting from automation behind the scenes, as well.

0 Comments
Continue reading

Some of Our Favorite Google Docs Features

Some of Our Favorite Google Docs Features

Google Workspace is one of the most utilized productivity suites in business. Within the useful suite of productivity apps is Google Docs, Google’s word processor. Today, we thought we would take you through Google Docs to show you some of the features you can expect. 

0 Comments
Continue reading

How the Democratic Republic of Congo Provided a Security Case Study

How the Democratic Republic of Congo Provided a Security Case Study

Preserving cybersecurity requires the person responsible for doing so to consider every component and connection associated with their technology, down to the smallest minutiae. Let’s consider a sizable example that comes from a narrowly avoided disaster in the Democratic Republic of Congo, that could have potentially left millions of Internet users exposed to serious threats.

0 Comments
Continue reading

Why a BDR is Essential for Any Business

Why a BDR is Essential for Any Business

While nobody likes to presume the worst will happen in their business, it must be a point that comes into consideration. Statistics are statistics, as they are, and as such there is always the chance—a considerable chance, in fact—that your business will suffer from some form of disaster. Due to this, we always recommend that you have some means of protecting your data throughout, with a plan to respond to such events accordingly.

0 Comments
Continue reading

Tip of the Week: Key Questions to Ask While Prioritizing Tasks

Tip of the Week: Key Questions to Ask While Prioritizing Tasks

During the workday, many of us have tasks that just seem to pile up and all seem to be given the same level of priority. However, if you want to accomplish anything effectively, you need to be able to identify the importance of your tasks and prioritize them accordingly. Let’s go over some tips to keep in mind as you do so.

0 Comments
Continue reading

Tip of the Week: 5 Critical Software Varieties for Your Business

Tip of the Week: 5 Critical Software Varieties for Your Business

Meaningful business productivity requires a lot of elements to line up, particularly when remote operations and mobility enter the picture. This week, we wanted to offer a few tips pertaining to the kinds of applications that could prove beneficial to your operations.

0 Comments
Continue reading

A Lesson from The Lego Group About Building Up IT’s Capabilities

A Lesson from The Lego Group About Building Up IT’s Capabilities

Technology has helped countless businesses, big and small, approach their operational challenges and overcome them. As an example, let’s look to what global toy producer The Lego Group did to resolve some of the technical hurdles they were encountering with improved IT solutions, before we consider how your business could do the same to scale.

0 Comments
Continue reading

Privacy and Security Are Major Considerations When Choosing Messaging Apps

Privacy and Security Are Major Considerations When Choosing Messaging Apps

While many people seem to have little problem sharing their data with social media platforms, there is definite pushback against sharing the personal data generated by a messaging platform. This can be witnessed in WhatsApp, the cross-platform messaging application whose main selling point has been its end-to-end encryption, and its announcement that its users will soon be forced to share their personal data with Facebook (which acquired WhatsApp in 2014).

0 Comments
Continue reading

How 5G Could Shape the IoT

How 5G Could Shape the IoT

The fifth generation of wireless communications—5G—has been hotly anticipated, already appearing in advertisements for cellular connectivity and set to expand the potential of automated processes. One particularly pertinent application is to the smart devices and services that make up the Internet of Things. Let’s consider where 5G currently stands, and how its capabilities could impact the IoT.

0 Comments
Continue reading

Reach Out Today!

Mobile? Grab this Article!

QR-Code dieser Seite

Latest Blog

In part one of this tutorial we discussed the types of images you will encounter online and how they can be used. Today, we will go a little bit further and talk about how to best alter your images without sacrificing quality. Let’s dive right into it. We will be using Adobe...

Latest News

KB Technologies Managed IT is proud to announce the launch of our new website at http://www.kb-it.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...