CR-T Blog

This is some blog description about this site

  • Home
    Home This is where you can find all the blog posts throughout the site.
  • Tags
    Tags Displays a list of tags that has been used in the blog.
  • Archives
    Archives Contains a list of blog posts that were created previously.
Recent blog posts

b2ap3_thumbnail_touch_screen_devices_400.jpgFor the past decade, touch-screens have changed the way that we as a society touch technology, and have greatly increased the mobility of business in that short time. This trend started with the smartphone, then spread to the 10-inch tablet and larger tablets - perfect for watching YouTube videos, Netflix, or other media consumption.

Last modified on

The Joys of Server Migration

Posted by on in IT Blog

b2ap3_thumbnail_server_migration_400.jpgThere are times when a specific task is asked of a server requiring all of its data to be moved. When this happens, all the files and applications are transferred to another server unit in a fascinating procedure called server migration.

Last modified on

Don’t Be Neutral about Net Neutrality!

Posted by on in IT Blog

b2ap3_thumbnail_how_big_is_your_piece_400.jpgLighting up the airwaves in the United States is the issue of net neutrality. It's a complex and technical topic regarding Internet regulations, but don't let the fine print keep you from caring. This is an important topic that could affect how the Internet is consumed around the globe!

Last modified on

b2ap3_thumbnail_gameover_zeus_and_cryptolocker_400.jpgIt has been two weeks since the National Communications Association warned the world about the GameOver Zeus and Cryptolocker ransomware, and if you haven't taken steps to avoid these threats, it's not too late - if you haven't been infected yet, do so as soon as possible. Otherwise, your network will be vulnerable, and so will your banking credentials.

Tagged in: Alert Malware Security
Last modified on

b2ap3_thumbnail_do_not_remove_antivirus_400.jpgDoes your company have dedicated antivirus software to protect it against the annoying threats on the Internet? Sometimes, a computer virus can weasel its way past your software, but there's no greater frustration than when you realize that the reason you contracted a virus is because an employee disabled your software. Don't let this happen to you!

Last modified on



Tag Cloud

Java Thank You Technology Print Server IBM Microsoft LinkedIn Health Administration Wireless Technology The Internet of Things BYOD Innovation Office Excel Mobile File Sharing Customer Relationship Management Virus Admistrator Keyboard Shortcuts Remote Computing Small Business Saving Time History Gadget Recycling Congratulations Skype Social Networking Windows Remote Monitoring Application Content Filtering Company Culture Social Conferencing Wearable Technology Internet Alerts Augmented Reality Facebook Mobile Devices Router Document Management Mobile Computing Backup Digital Payment Marketing Business Computing Phone System Artificial Intelligence Best Available Computer Accessories Unified Threat Management Save Money Users Computer Repair Alert Proactive IT Upgrade Touchscreen Virtualization Law Firm IT Browser Value Net Neutrality Communication Miscellaneous Antivirus Disaster Recovery Email Work Station Hosted Solutions Business Intelligence Privacy Software Maintenance Fax Server Video Surveillance Going Green Tools Vendor Management IT Support Social Media Workplace Tips Display Apple Mouse Best Practice Gaming Console Leadership Webinar Hardware IT Consultant Firewall VPN It Issues Lithium-ion Battery Cloud Scam Tech Support App Mobile Device Bring Your Own Device Current Events Web Marketing Sports Managed Service Provider Microsoft Office Mobile Office VOIP Gadgets Smartphones User Error Android Macro Streaming Media IT Solutions Piracy Smartphone Business Management Managed Service Providers ebay Operating System Co-managed IT Network Trojan Security Windows 8 Google Productivity Hard Drives Spam 3D Help Desk Computer Saving Money Holiday Online Currency IT Services Windows 8.1 Update Text Messaging Tablet PowerPoint Humor iPhone Phone Systems Trending Analytics Printer Best Practices Intranet PC Care Hackers Server Tutorials Avoiding Downtime Data Samsung Training Malware Point of Sale Twitter Information Technology Apps Efficiency Outlook Webcam Bluetooth Inbound Marketing The Cloud User Tips Remote Support Outsourcing Mobile Device Management WiFi Passwords Scheduling Quick Tips Business Continuity


Latest Blog Entry

How an Intimate Selfie That’s Deleted Can Be Recovered and Used for Blackmail
When it comes time to upgrade, many smartphone users will sell off their old device in hopes of making extra cash. However, if the phone's memory is improperly wiped, an experienced hacker can use adv...
Continue Reading...

Latest News

Our Site Has Launched!


Welcome to Our New Site!
We are proud to announce the unveiling of our new website at CR-T!


Contact Us

Learn more about what CR-T can do for your business.


Call us today    801.222.0930

116 South Mountain Way Drive
Orem, Utah 84058

facebook twitter linkedin#