ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

An iPhone Christmas Story

An iPhone Christmas Story

In recognition of the holiday this year, we’ve decided to adapt a famous tale to a more contemporary setting, and create a parody of the holiday classic, A Christmas Story. We hope you enjoy this retelling, as much as we enjoyed writing it!

Continue reading
0 Comments

Tip of the Week: How To Delete All Those Recordings Siri Has of You

Tip of the Week: How To Delete All Those Recordings Siri Has of You

With personal privacy being a major public topic, Apple decided to give users more control over their data. 

Back in July, Apple had admitted that it was holding and listening to recordings of iOS users who use Siri. This wasn’t much of a surprise, since we know that Amazon and Google do the same with their digital assistants. Apple now lets you delete the conversations you’ve had with Siri.

Continue reading
0 Comments

Tip of the Week: Avoid Facetime Spying

Tip of the Week: Avoid Facetime Spying

Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a new bug found in Apple’s FaceTime app that allowed users to spy on others without their consent through group FaceTime calls. Thankfully, a patch has been issued that resolves it, but perhaps the way that it was implemented is the most interesting of all.

Continue reading
0 Comments

Making the Switch from Apple to Android? Be Prepared!

Making the Switch from Apple to Android? Be Prepared!

With so many options that don’t cost $800, the Android mobile OS gains more customers every day. If you were a dedicated iPhone user that is looking to switch to Android, you have to be cognizant of the things you will need to ensure that you are able to transfer the information you need, and be able to seamlessly pick up your new device without missing a beat. Here are some issues you should consider:

Continue reading
0 Comments

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Tablet Battle: Galaxy Tab S3 vs iPad Pro

Two of the primary developers of tablets--Apple and Samsung--have created two of the most popular devices out there: the iPad Pro and the Galaxy Tab S3. If you’re in need of a tablet, we can help you go over your options so that you choose the one that best suits your needs.

Continue reading
0 Comments

Alert: Apple OS X Now at Risk of Ransomware

b2ap3_thumbnail_ransomware_now_affecting_apple_400.jpgRansomware is a major problem in both the personal and private sectors of computing, but up until very recently, Apple users had little to fear from potential ransomware hacks. Security researchers at Palo Alto Networks have discovered what’s known to be the first completed ransomware on an Apple device. The threat, called KeRanger, is officially “in the wild,” and is a danger to any Mac user.

Continue reading
0 Comments

Apple Stands Up to the FBI: Legal Battle Ensues

b2ap3_thumbnail_fbi_and_apple_400.jpgThere’s no questioning Apple’s dedication to the advancement of technology, especially over the past few decades. With the iPhone being the first of many commercially available smartphones, Apple has always been at the forefront of exciting consumer technology developments. Now, however, their most important decision yet may come in the form of a face-off with the FBI.

Continue reading
0 Comments

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Microsoft Google Collaboration Android Cybersecurity Phishing Business Management IT Services Backup Ransomware Data Backup communications Smartphone Small Business Upgrade Smartphones Microsoft Office Network Mobile Devices Data Recovery Communication Managed IT Services Quick Tips Productivity Social Media VoIP Users Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Passwords Holiday Covid-19 Disaster Recovery IT Support Browser Apps Managed Service Windows 10 Cloud Computing Outsourced IT Miscellaneous Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Gadgets Artificial Intelligence Managed IT services Networking Workplace Strategy Windows App Virtualization WiFi Business Technology Spam Blockchain Mobile Device Management Remote Bandwidth Server Information Encryption Office Budget Two-factor Authentication Office 365 Employee/Employer Relationship Apple Information Technology History Gmail BDR Analytics Wi-Fi Conferencing Access Control Cybercrime Data Security Health Big Data Help Desk Hacking Remote Computing IT Management Training Hacker Cost Management Compliance Employer-Employee Relationship Patch Management Voice over Internet Protocol Document Management Vendor Save Money Remote Monitoring Hiring/Firing Outlook Password BYOD Computing Data loss Vendor Management Money Hard Drive Customer Service Unified Threat Management Firewall Search... Augmented Reality Legal Best Practice Word Mobile Office IBM Applications Data storage Retail Website Alert Managed Services Project Management Vulnerabilities User Monitoring Social Engineering How To Cryptocurrency The Internet of Things Black Market Healthcare YouTube Websites Windows 11 Cleaning Meetings Mobility Robot Chrome Laptop Google Maps Scam Mobile Computing VPN Social Sports SaaS DDoS Twitter Marketing Update Running Cable Law Enforcement End of Support iPhone Printer Education Cortana Data Breach Storage Remote Workers Content Filtering Paperless Office Antivirus Windows 7 Free Resource Maintenance Router Travel Virtual Reality Multi-factor Authentication Office Tips Memory Solutions Start Menu Private Cloud Computer Care Downloads Integration Vulnerability Images 101 Saving Time Display Software as a Service Wireless Technology Politics Settings Bitcoin eWaste Data Protection Machine Learning Computers Employees Telephone Avoiding Downtime Downtime Solid State Drive Safety PowerPoint Holidays Administration Excel Chromebook Drones Presentation Virtual Desktop Experience Cooperation Specifications IT Consultant Tech Terms Automobile Video Conferencing Managed IT Virtual Machines Virtual Assistant Customer Relationship Management Digital How To Computer Repair Co-Managed IT Microchip Entertainment Disaster Flexibility Professional Services Taxes Identity Theft Lithium-ion battery Processor Hack Notifications Managed Services Provider Unified Communications Virtual Private Network Physical Security Processors Google Docs Bluetooth Distributed Denial of Service Current Events HIPAA Touchscreen FinTech Fake News Smart Technology Emergency CES Proxy Server IT Assessment Emails Computer Malfunction Botnet Supply Chain Management Service Level Agreement Value Computing Infrastructure Vendor Mangement Organization Management Samsung Rental Service Cyber security Device security Micrsooft Business Owner Flash Microsoft Excel Uninterrupted Power Supply Smart Devices Wireless Headphones Public Speaking Webcam Remote Working Going Green Telephone Systems Business Cards Business Growth Tech Streaming Media Business Mangement AI Error Tablets Trend Micro Keyboard Transportation Supply Chain Digital Security Cameras Bookmark Electronic Health Records Hard Drives Download Supercomputer Banking Wasting Time Piracy intranet Google Wallet Google Calendar Term Virus Wireless Messenger eCommerce HTML Shortcut Deep Learning Modem Inbound Marketing Motion Sickness Environment Workplace Videos Browsers Surveillance Nanotechnology Heating/Cooling Google Drive Upload Business Metrics Managing Costs Software License Social Networking Hosted Solution Comparison Google Play Windows XP Social Network Books SSID Language Employer/Employee Relationships Scams Electronic Payment Society Knowledge Media Data Analysis Corporate Profile Development Screen Reader Telephony Trends Employer Employee Relationship Virtual Machine Mobile Technology Television Security Cameras Visible Light Communication Reviews Customer Resource management Cabling Reading Optimization Devices Monitors G Suite Teamwork Tip of the week Cables Windows 8 Phone System 2FA Fileless Malware Tablet VoIP Data Storage Gamification Tracking Hypervisor Company Culture Mouse Advertising Shopping Telephone System Staffing Relocation Regulations Displays Medical IT IP Address Web Server Work/Life Balance SQL Server Point of Sale Tech Support Paperless Directions Backup and Disaster Recovery PCI DSS Content Digital Payment Licensing Desktop SharePoint Shortcuts Computer Accessories Gig Economy Electronic Medical Records Worker Humor Accountants Database Azure Business Communications Access In Internet of Things Internet Service Provider Time Management Regulations Compliance Public Cloud Hacks Managed IT Service Network Congestion Be Proactive Health IT Recovery Reliable Computing Memes Equifax Competition Writing Net Neutrality Tactics Hard Drive Disposal Audit Human Resources Spyware LiFi Financial Data Username File Sharing Entrepreneur Freedom of Information Workplace Strategies Redundancy Risk Management Documents Scalability IT Startup Application Addiction Text Messaging email scam Business Intelligence Proactive IT Google Apps Navigation Cache Administrator Unified Threat Management Telework Workers Bring Your Own Device Mobile Security Troubleshooting Microsoft 365 News Smartwatch User Tip Securty Communitications Legislation Procurement Network Management Domains CCTV Music Printing Evernote

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?