(509) 534-1530    Get SUPPORT

SCW Blog

SCW has been serving the Spokane Valley area since 1997, providing IT Support such as helpdesk support, computer support, and technical consulting to small and medium-sized businesses.

Sam is a network engineer with a broad range of experience spanning more than 35 years. He wrote is first piece of code in 1979 and has been involved with the industry ever since. For the last 20 years, he has worked for SCW Consulting where he has embraced his passion for network technology and security.

5 Questions to Ask When Selecting a Cloud Solution

5 Questions to Ask When Selecting a Cloud Solution

The cloud is swiftly becoming the method by which most computing is done, especially as far as businesses are concerned. You may have been considering adding the cloud to your own IT strategy. However, in order to make your best decision, there are a few questions you need to ask

0 Comments
Continue reading

Outsourcing Your Email Management Can Help in Many Ways

Outsourcing Your Email Management Can Help in Many Ways

How much time does your business waste on a daily basis managing and maintaining its email? Chances are that you spend far too much time on this task, even though it is a necessary function that only serves to enhance the way your business operates. How can you make sure that email management and maintenance happens, even if you don’t have time to make it happen?

0 Comments
Continue reading

Tip of the Week: This App Allows Your Phone and Computer to Work Together

Tip of the Week: This App Allows Your Phone and Computer to Work Together

Think about how many of your electronics have a remote. Isn’t it odd that your desktop (arguably your primary device) lacks a remote? Well, if you’ve got a smartphone, then you can easily turn it into a remote for your computer!

0 Comments
Continue reading

VoIP Lets You Take Your Office Phone With You

VoIP Lets You Take Your Office Phone With You

Not too long ago, in order to answer your work phone or check the messages you had received from callers while you were away from your desk, you had to be in the workplace, at your desk. This is no longer the case, thanks to the proliferation of VoIP (Voice over Internet Protocol), and a particular ability that it gives businesses.

0 Comments
Continue reading

Boost Efficiency With Business Intelligence

Boost Efficiency With Business Intelligence

As your business grows, understanding how it runs may not be as simple it once was. There was a point where you may have known everything there was to know about it. You knew the vendors and the first name of every sales rep. You knew who were buying your goods from, you knew who made them, and how much they cost to make, package, and distribute. This is the story of business in the 21st century; and the shift that is making businesses run better: business intelligence.

0 Comments
Continue reading

Tip of the Week: The Inner Workings of Copy/Pasting

Tip of the Week: The Inner Workings of Copy/Pasting

Copying and pasting is possibly one of the most used utilities that the computer has to offer a user. However, this function relies on a very specific piece of your operating system: the clipboard. For this week’s tip, we’ll examine how the clipboard works.

0 Comments
Continue reading

The Cloud Makes Computing Easier

The Cloud Makes Computing Easier

One of the biggest problems a business has with its IT infrastructure is the lack of funds a business has to commit to obtaining and maintaining the necessary computing infrastructure. Whether they’re trying to run resource-intensive application, or simply need more storage space than they can manage independently, the cloud can provide them with the means to do so.

0 Comments
Continue reading

Use Collaboration Technology to Support Human Processes, Not the Other Way Around

Use Collaboration Technology to Support Human Processes, Not the Other Way Around

When an employee is using technology designed to make their jobs easier, it’s natural that they will enjoy their work more. If they are more engaged in their work, it becomes beneficial for your organization that your employees feel like you support their success. This is where collaborative technology solutions that are conducive to the success of your organization can thrive.

0 Comments
Continue reading

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

b2ap3_large_Alert_59619335

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

0 Comments
Continue reading

These Collaboration Technologies Create Opportunities for Growth

These Collaboration Technologies Create Opportunities for Growth

Today’s business environment is more competitive than ever before, and one of the ways that organizations are attempting to overtake others in their industry is through the use of dynamic technology solutions. By effectively leveraging productivity tools, employees can collaborate in never before seen ways and exceed all expectations.

0 Comments
Continue reading

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

Ransomware Use Increased By 752% in 2016. Trend Continues in 2017

Looking back over the events of 2016, one thing was made very clear by cybercriminals: ransomware is a rising star in their arsenal. In order to continue to remain protected against these threats, it is critical to have a clear understanding of them.

0 Comments
Continue reading

Tip of the Week: Prevent Others From Messing With Your PC’s Settings By Locking the Control Panel

Tip of the Week: Prevent Others From Messing With Your PC’s Settings By Locking the Control Panel

Let’s say that you don’t want someone else accessing the Control Panel on your Windows desktop or laptop. That’s perfectly reasonable, but you might not know how you can prevent them from doing so. Thankfully, Windows is flexible enough to allow this function, and with a little know-how, you can implement it without a hitch.

0 Comments
Continue reading

Don’t Let These 3 Challenges Stand in the Way of Making a Business Continuity Plan

Don’t Let These 3 Challenges Stand in the Way of Making a Business Continuity Plan

2017 has already seen its fair share of cybersecurity threats, and when paired with the events of 2016, it’s clear that implementing a business continuity plan is more important than ever. Today, we’ll discuss what businesses need to do to ] ensure their continuity based on this year’s IT trends, as well as the challenges many faces as they try to implement a strong continuity strategy.

0 Comments
Continue reading

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

Alert: Homeland Security Finds U.S. Power Grid Vulnerable to CrashOverride Malware

On June 12th, the U.S. Department of Homeland Security issued a warning to power grid operators and electric utilities concerning a newly surfaced malware called CrashOverride (aka Industroyer). Only, it’s not entirely new. The world has seen this before and the fallout from it is concerning.

0 Comments
Continue reading

SCW launches new website!

SCW is proud to announce the launch of our new website at http://www.scwitservices.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for prospective clients.

0 Comments
Continue reading

Obama and Trump Agree on One Thing: Cybercrime Needs to Be Dealt With

Obama and Trump Agree on One Thing: Cybercrime Needs to Be Dealt With

Executive Order 13694 will be around for another year, as the current administration has elected to extend it. This document provides the government with the power necessary to retaliate against cyber attacks of various kinds through the use of sanctions. Let’s take a look at what this means.

0 Comments
Continue reading

How to Foil the Plans of Cybercriminals

How to Foil the Plans of Cybercriminals

We all understand that there are things we need to lock up in order to protect them. Houses, cars, businesses, all are protected with locks to keep those who shouldn’t be in them, out. Shouldn’t your network receive the same consideration?

0 Comments
Continue reading

Tip of the Week: Tackle Any Problem in 7 Simple Steps

Tip of the Week: Tackle Any Problem in 7 Simple Steps

Problem solving is a major aspect of managing a company, as well as managing pretty much all other aspects of life. The key to successful problem solving is having a plan and taking it one step at a time. For this week’s tip, we’ll look at a popular problem solving plan developed by the UK’s Behavioral Insights Team. It’s a plan so simple that anyone can do it!

0 Comments
Continue reading

UTM, BDR, RMM: How Can These Tech Acronyms Help Your Business?

UTM, BDR, RMM: How Can These Tech Acronyms Help Your Business?

The IT industry is filled with acronyms. We use plenty of them because it’s more efficient. However, if you’re looking for technical assistance, it would be beneficial to know exactly what we are talking about and why it’s so important. Here are three common phrases that you’ll hear in the world of IT, and what each of them means for the small business owner.

0 Comments
Continue reading

10 Cybersecurity Threats Every Business Owner Must Protect Themselves From

10 Cybersecurity Threats Every Business Owner Must Protect Themselves From

It’s an unfortunate fact that cyber security threats are everywhere, and it doesn’t help that there are multiple kinds of threats to contend with out there. Here’s a quick runthrough of the different malwares and threats you may encounter, and the sort of damage they can cause.

0 Comments
Continue reading

Mobile? Grab this Article!

QR-Code dieser Seite
SCW