Contact Us Today! (215) 853-2266

Bardissi Enterprises Blog

Bardissi Enterprises has been serving the Hatfield area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Deciphering Your Computer’s Power Options

Tip of the Week: Deciphering Your Computer’s Power Options

Granted, you’re probably most interested in your computer when you’re using it. However, it is very important to consider what you do when you walk away based on the list found in the Power section of the Start menu. Let’s go over what each of these options actually does.

Continue reading
0 Comments

Windows 10’s Over 70% Market Share is Still Too Low

Windows 10’s Over 70% Market Share is Still Too Low

Windows 10 has seen a slow growth in its market share since it first appeared in July 2015, still rising throughout 2020 to now. As of this October, the operating system had finally reached a 72.2 percent market share. Let’s discuss why this benchmark matters, and why you need to update any devices in your organization to bring that share up even more.

Continue reading
0 Comments

The Four Corners Your Network Security Needs to Cover

The Four Corners Your Network Security Needs to Cover

Network security is paramount to a business’ success with the number of security incidents and data breaches that could potentially upend it. While this sounds like a task of marginally epic proportions, managing your security can be greatly simplified via a few basic activities. Let’s go over four such security-boosting actions that you should direct your attention to.

Continue reading
0 Comments

Many Businesses are Still Using Windows 7...

Many Businesses are Still Using Windows 7...

So many organizations continue to use a decade-old operating system, and they really, really shouldn’t.

Here’s the thing: Windows 7 is dead and gone… and yet, as of July, it still had a market share of about 23 percent, making it the second-most-popular operating system. Here, we’ll be going over just why it is—if your company is still using Windows 7—that you need to update to Windows 10 immediately (if not sooner).

Continue reading
0 Comments

Tip of the Week: Speed Up Your Computing with Windows Shortcuts

Tip of the Week: Speed Up Your Computing with Windows Shortcuts

The Windows operating system has quite a few shortcuts baked in, each offering a user quicker access to the utility they are seeking out. It may sound crazy, but using these keyboard shortcuts can actually eliminate the eight days the average employee accumulates every year by just moving their hand from their keyboard to their mouse. 

Continue reading
0 Comments

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

Tip of the Week: Dynamic Lock Isn’t Perfect, But It’s A Start

You’ve been told that it’s a best practice to ensure that you never leave your workstation without locking it first. Yet, if you’re only stepping away for a few minutes, it might be tempting to just allow it to remain unlocked. But what happens when you step away for longer than expected? You leave your computer exposed to all manners of threats. Thankfully, a new solution allows for a fix with a device that most are never without: the smartphone.

Continue reading
0 Comments

Tip of the Week: How to Encrypt Files on Your Windows PC

Tip of the Week: How to Encrypt Files on Your Windows PC

Encryption is one of the most effective ways to secure a file, and even the average user can take full advantage of it on their Windows PC. In essence, you can arrange for your files to appear as random numbers, letters, and special characters in the event that an unauthorized user accesses them.You might be surprised to learn that even your  Windows PC has encryption options so that you can protect your sensitive information if so desired.

Continue reading
0 Comments

Tip of the Week: Find Out When Microsoft Will End Support for Your Operating System

b2ap3_thumbnail_windows_for_life_400.jpgAs time goes on, operating systems grow old and eventually reach their end-of-support date that’s designated by Microsoft. When this fated day comes, patches and security updates are no longer applied to the expired operating system. To help you better plan for the future, we've compiled a list of various expiration dates for many Windows operating systems.

Continue reading
0 Comments

Is Windows 10 Living Up to the Expectations of Microsoft?

b2ap3_thumbnail_windows_10_400.jpgThe hype train keeps chugging along for Windows 10, and it’s obvious why. It’s a great operating system that’s changing the way that businesses handle their daily tasks. But is Windows 10 doing as well as it lets on? According to desktop operating system usage statistics from NetMarketShare, Windows 10’s adoption rate has significantly slowed down in recent months, while more people continue to take advantage of Windows 7 and 8.x. Why?

Continue reading
0 Comments

Windows Server 2003 End of Life Set to Hit Medium-Sized Businesses Hard

b2ap3_thumbnail_server_os_losing_support_400.jpgIs your business prepared for July 14th? No, we’re not referring to Bastille Day, although, you can’t go wrong with celebrating the French Revolution. Instead, we’re referring to Microsoft’s plans to end support for Windows Server 2003 on this quickly-approaching date. Being unprepared for July 14th will put your company’s data at serious risk.

Continue reading
0 Comments

Tip of the Week: How to Locate a Lost File

b2ap3_thumbnail_find_a_file_400.jpgIt’s easy to get scatterbrained when things get busy. When this happens, you can forget important things like where you placed your keys, and where you saved your computer file. To help you out, here are some tips on how to locate a missing file. As far as your missing keys go, did you check underneath the couch?

Continue reading
0 Comments

Real-World CIOs Share Their Thoughts about Windows 10

b2ap3_thumbnail_windows_10_cios_400.jpgBefore Microsoft officially releases Windows 10, beta versions are first given to select business leaders like CIOs. This is a standard practice for software manufacturers because it helps them to work out real-world bugs before publicly releasing their product. What do CIOs think of the Windows 10 technical preview? Inquiring business minds want to know.

Continue reading
0 Comments

Microsoft Unveils Windows 10: “One Product Family, One Platform, One Store”

b2ap3_thumbnail_microsoft_logo_400.jpgWhat we expected to be Windows 9 has been gradually revealed through leaks over the past several weeks, but Microsoft has thrown a curveball into the mix with Windows 10. The latest information, revealed during a public Microsoft Windows event, has gone into much detail concerning the nature of the newest incarnation of Windows, including its focus on enterprise and cloud-centric policy.

Continue reading
0 Comments

Bardissi Enterprises: WatchGuard LiveSecurity Attackers Target Zero Day PowerPoint Vulnerability

Attackers Target Zero Day PowerPoint Vulnerability
Severity: High

3 April, 2009
Summary:
  • This vulnerability affects: All current versions of Microsoft PowerPoint for Windows and Mac computers (also affects PowerPoint Viewer and Office Compatibility Packs)
  • How an attacker exploits it: By enticing your users into opening a maliciously crafted PowerPoint presentation
  • Impact: An attacker can execute code on your computer, potentially gaining control of it
  • What to do: Implement the workarounds described in the Solution Path section of this alert
Continue reading
0 Comments

Windows GDI+ Vulnerability Affects Many MS Products

Severity: High

9 September, 2008


Summary:

§ These vulnerabilities affect: Recent versions of Windows and many other Microsoft products (see “Exposure” section for full details)

§ How an attacker exploits them: By enticing your users into viewing malicious images or graphical content, including content hosted on a malicious Web site

§ Impact: Remote attacker can execute code, potentially gaining complete control of your computers

§ What to do: Install the appropriate Microsoft patches immediately

Continue reading
0 Comments

Mozilla Stomps Out Ten Security Vulnerabilities with Firefox 2.0.0.13

Severity: Medium

27 March, 2008

Summary:

  • This vulnerability affects: Firefox 2.0.0.x for Windows, Linux, and Macintosh
  • How an attacker exploits it: Multiple vectors of attack, including enticing one of your users to visit a malicious web page
  • Impact: Various results; in the worst case, attacker executes code on your user’s computer, gaining complete control of it
  • What to do: Upgrade to Firefox 2.0.0.13
Continue reading
0 Comments

Thirteen Security Flaws Plague Safari 3 for OS X and Windows

Severity: Medium

18 March, 2008

Summary:

  • These vulnerabilities affect: Safari 3 for OS X and Windows
  • How an attacker exploits them: By enticing one of your users into visiting a malicious web site
  • Impact: Various results; in the worst case, attacker executes code on your user’s computer, with your user’s privileges
  • What to do: Install Safari 3.1
Continue reading
0 Comments

Microsoft Overhauls Office; Fixes a Dozen Vulnerabilities

Severity: High

11 March, 2008

Summary:

  • These vulnerabilities affect: Most current versions of Microsoft Office for Windows, and in some cases for Mac (and some other Office-related programs)
  • How an attacker exploits them: By enticing you to open maliciously crafted Office documents, visit a malicious web site, or click a malicious link
  • Impact: An attacker can execute code, potentially gaining complete control of your computer
  • What to do: Install the appropriate Office or Office related patches immediately
Continue reading
0 Comments

Multiple Vulnerabilities in Sun Java for Windows, Solaris, Linux

Severity: Medium

7 March 2008

Summary:

  • These vulnerabilities affect: All versions of Sun Java Runtime Environment (JRE) released before 4 March, on Windows, Solaris, and Linux platforms
  • How an attacker exploits them: By enticing your users to a malicious web page that contains a specially crafted Java applet or application
  • Impact: Various results; in the worst case, attacker can gain complete control of your computer
  • What to do: Install the appropriate JRE update as soon as possible
Linux
Continue reading
0 Comments

Critical Internet Explorer Patch Cures Memory Corruption Flaws

Severity: High

12 February, 2008

Summary:

  • This vulnerability affects: Internet Explorer 7 and earlier versions
  • How an attacker exploits it: By enticing one of your users to visit a malicious Web page
  • Impact: In the worst case, the attacker an execute code on your user’s computer, gaining complete control of it
  • What to do: Deploy the appropriate Internet Explorer patches immediately
Continue reading
0 Comments

Mobile? Grab this Article!

QR-Code dieser Seite

Blog Archive

Recent Comments

Tip of the Week: Which Headphones are Right for Your Needs?
23 April 2018
I will recommend Plantronics Backbeat Pro 2 SE Noise cancelling Headset with it's Great features.
Gamification: Make Business Fun for Everyone
27 January 2017
The world is based on the games. There are many types of games as per the aussie essay writing servi...
Let's Talk Tablets
12 January 2017
The concept of tablet is far better than that of PC because you can bring them with you everywhere a...
Tip of the Week: Tweak Your Workday in These 4 Ways and See Major Results
12 January 2017
The only thing will I will say regarding this blog is that it is very helpful at least for me. As I ...
WatchGuard Releases Version 10.2.7 for WSM, Edge, Fireware, and Fireware Pro
23 December 2016
I really needed to know about the fireware but i was confused that where can i find information abou...