ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

Making the Switch from Apple to Android? Be Prepared!

Making the Switch from Apple to Android? Be Prepared!

With so many options that don’t cost $800, the Android mobile OS gains more customers every day. If you were a dedicated iPhone user that is looking to switch to Android, you have to be cognizant of the things you will need to ensure that you are able to transfer the information you need, and be able to seamlessly pick up your new device without missing a beat. Here are some issues you should consider:

Continue reading
0 Comments

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Two of the primary developers of tablets--Apple and Samsung--have created two of the most popular devices out there: the iPad Pro and the Galaxy Tab S3. If you’re in need of a tablet, we can help you go over your options so that you choose the one that best suits your needs.

Continue reading
0 Comments

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

Continue reading
0 Comments

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Microsoft Office Upgrade Smartphones Small Business Network Mobile Devices Data Recovery Communication Managed IT Services Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Facebook Business Continuity Windows 10 Disaster Recovery Passwords Holiday Covid-19 Windows 10 Apps IT Support Browser Managed Service Miscellaneous Cloud Computing Outsourced IT Data Management Internet of Things Managed Service Provider Remote Work Government Saving Money Operating System Gadgets Artificial Intelligence Managed IT services Networking Workplace Strategy Windows Spam Business Technology Blockchain Bandwidth Encryption WiFi Server Mobile Device Management Information Remote App Virtualization Two-factor Authentication Information Technology Office 365 History Budget Gmail Employee/Employer Relationship Office Apple BDR Health Analytics Cybercrime Wi-Fi Conferencing Access Control Data Security Big Data Remote Monitoring Employer-Employee Relationship Voice over Internet Protocol Document Management Hacker IT Management Save Money Training Remote Computing Compliance Patch Management Help Desk Vendor Hacking Cost Management Project Management Vulnerabilities Search... Best Practice Legal Mobile Office Retail Data storage Money Alert Managed Services Customer Service Unified Threat Management Hiring/Firing Firewall Data loss Outlook Password Augmented Reality Word BYOD IBM Website Computing Vendor Management Hard Drive Applications Windows 11 Running Cable Law Enforcement Monitoring Laptop End of Support Healthcare Printer Storage Websites Remote Workers Mobility Meetings Windows 7 Free Resource Google Maps Sports Travel Scam Social SaaS DDoS Virtual Reality Social Engineering User How To Cryptocurrency Black Market VPN iPhone Cleaning Cortana Education Robot Update Chrome Content Filtering Router Data Breach Paperless Office Mobile Computing Antivirus The Internet of Things Maintenance YouTube Marketing Twitter Virtual Machines Computer Repair How To Customer Relationship Management Wireless Technology Microchip Co-Managed IT Multi-factor Authentication Start Menu Entertainment Professional Services Flexibility eWaste Downloads Computer Care Downtime Vulnerability Saving Time Hack Safety Identity Theft Notifications Software as a Service Managed Services Provider Data Protection Computers Bitcoin Unified Communications Virtual Private Network Virtual Desktop Experience Google Docs Telephone Bluetooth Current Events Distributed Denial of Service HIPAA Office Tips Excel Solutions Private Cloud Memory Disaster Integration Tech Terms Images 101 Display Politics Managed IT Lithium-ion battery Digital Virtual Assistant Machine Learning Settings Employees Taxes Avoiding Downtime Solid State Drive Processors PowerPoint Holidays Administration Processor Chromebook Drones Presentation Specifications Cooperation Video Conferencing IT Consultant Physical Security Automobile Legislation News Medical IT Relocation Public Speaking Displays User Tip Shopping Advertising Printing Evernote Paperless Tech Support Network Management CCTV SQL Server Streaming Media Work/Life Balance Keyboard Touchscreen PCI DSS Licensing Emails Humor Computer Malfunction Fake News Supply Chain Computer Accessories Hard Drives Emergency Proxy Server Gig Economy Business Communications intranet Vendor Mangement Service Level Agreement Internet Service Provider Computing Infrastructure Azure In Internet of Things Wireless Hacks Shortcut Network Congestion Management Regulations Compliance Samsung Device security Managed IT Service Uninterrupted Power Supply Wireless Headphones Memes Webcam Microsoft Excel Workplace Reliable Computing Heating/Cooling Writing Environment Tech Human Resources Social Networking Business Mangement Going Green Net Neutrality Business Cards Windows XP Error Financial Data Tablets IT Scams Scalability Bookmark Risk Management Google Calendar Term Google Apps Proactive IT Download Supercomputer Piracy Administrator Text Messaging Troubleshooting Bring Your Own Device Virus Telework HTML Nanotechnology Communitications Motion Sickness Microsoft 365 Cables Browsers Smartwatch Comparison Google Play Music Google Drive Upload Procurement Software License Staffing Social Network FinTech Corporate Profile Screen Reader IT Assessment Point of Sale IP Address Knowledge Data Analysis CES Television Security Cameras Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Botnet Business Owner Shortcuts Rental Service Micrsooft Customer Resource management Organization Cabling Devices Cyber security Tablet Smart Devices G Suite Tip of the week Flash Fileless Malware Telephone Systems Mouse Business Growth VoIP Gamification Remote Working Tracking Company Culture Be Proactive Recovery Competition Telephone System AI Regulations Trend Micro Backup and Disaster Recovery Electronic Health Records Web Server Transportation Directions Digital Security Cameras Banking SharePoint Entrepreneur Google Wallet Content Digital Payment Desktop Wasting Time LiFi Inbound Marketing Modem Workplace Strategies Documents Messenger Application Deep Learning Electronic Medical Records Worker Accountants eCommerce Videos Business Intelligence Access Database Surveillance Business Metrics Hosted Solution Time Management Public Cloud Managing Costs Equifax SSID Securty Books Health IT Audit Media Society Spyware Tactics Development Electronic Payment Hard Drive Disposal Employer/Employee Relationships Domains Language Username File Sharing Virtual Machine Startup Optimization Freedom of Information Smart Technology Reading Monitors Redundancy Reviews Visible Light Communication Navigation 2FA Windows 8 Cache Addiction email scam Teamwork Phone System Unified Threat Management Data Storage Workers Mobile Security Hypervisor

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?