When your Tech Support Team includes those who Love Technology!

So what does it mean, when you have a problem, to be on the phone, or in an online conversation, or face to face with someone who loves technology?

First, realize that we who love technology have probably taken apart our own computers, laptops, phones, tablets to see how everything fitted together.  We are the ones who have pushed our computers to the ultimate performance.  We are the ones who crave to find just how much more we can get out of any technology platform, application, or program.

Second, realize that we who love technology have, in our explorations and tinkering, run into the same problems, made the same mistakes as you.  But because we love technology, we have worked and worked until we found the solutions to the many problems we had; and can share that experience to help address your problems.

Last, when you invite someone who loves technology in to help you with your technology issue, concern or problem, you are inviting that person to once again engage in the subject, the actions that they dearly love and over which they are passionate.

Think about this the next time you need tech support.  Do you want a person just holding down a job or just answering a phone; or do you want someone who loves technology and just waits for the opportunity to make that technology work better for you?

ZenIT loves Technology and we love seeing our customers succeed.

My Bank Never Asks for my Password! What's Up?

Spoofing an email address is pretty easy, and there are multiple ways to do this that require little to no technological savvy.

That email you got last week from BillMasterson@mybank.com most likely wasn’t from Bill the Bank Manager himself, more than likely the email address was spoofed. Since the most common vector for malware infection is now a carefully crafted, spoofed phishing email, how is a user to spot these fake email threats?

Resort to common sense first. Often a spoofed email will contain a request for a wire transfer, or an ‘unpaid invoice’ of some sort. Many times it is just a seemingly harmless link to a Dropbox file with a funny name.

Is your bank really going to send you an attached PDF transfer order when you don't usually transfer money? Of course not – resist opening the attachment!

 Is your Facebook friend with the hotmail address really going to send you an urgent appeal with a goofy link that doesn't seem to go to a relevant website? Maybe so – refrain from clicking the link and double-check with your friend! 

Other signs to look out for include different reply-to addresses, attachments with strange names, links in an email you weren’t expecting, and in general, anything that seems even slightly odd, including bad grammar and misspellings.

Another way to see if an email address is being spoofed is to check the header of the email itself. The header contains vital information that ensures the email gets where it needs to go successfully, as well as other components of the email.

Instructions for checking the email header in Google Webmail are here, for Microsoft Outlook click here; or you can analyze any email header here.

Are you worried about your employees’ email habits creating security risks for your business?  ZenIT can eliminate that worry.  We offer managed Network Security solutions starting at as little as $149 a month for up to 5 computers.  We also offer comprehensive managed service solutions including automated backup and workstation management as well as server maintenance.  We work with small and medium-sized businesses in the greater Austin area to eliminate security risks, optimize IT infrastructure and in general, build technology solutions for business harmony.

Contact us today for a free consultation and quote. www.myzenit.com.




Do you run WordPress? If so, you better run to Update it!

Millions of websites running WordPress are being strongly urged to update to the latest version of the popular content management system as soon as possible, after a serious security vulnerability was uncovered.  The vulnerability is a SQL-Injection is still an issue for all versions of Wordpress 4.8.2 and older.   

The newest version 4.8.3 plugs that SQL-Injection hole.

Do not assume that since your website is signed up for automatic updates that is indeed has been updated to the latest and the greatest.

If you are in doubt, contact your hosting company and ask; or if you host yourself, here is how to find out:

1.  Login to your admin area of your WordPress Site.

2. Look for the "Thanks for creating with Wordpress" line and next to it you will see the Wordpress version number.

Screen Shot 2017-11-28 at 2.00.09 PM.jpg

You can also go to your website and look at the "readme.html" page.  This should also show your version number.




If you need additional instructions on how to install a new update for Wordpress, you can find it here.


Are you worried about your network security or data storage solutions? ZenIT Offers file management and data security plans that flex to accommodate business growth. Contact us to learn more.


What is wrong with this picture?

Sometimes security isn't about just how data is stored, backed up, transmitted or received.  In fact the majority of data breaches happen because the worker does not follow their security policies in their offices and cubicles and common work areas.

The most common points of physical data security failure include the following:

1.  Having passwords written and posted somewhere in a personal or public workspace.

2.  Having physical business mail accessible to the public.

3.  Client data left on fax machines, copiers, and printers which are accessible to the public.

So with this in mind, when you look at the picture below, you tell us what is wrong with this picture.

What is Wrong with this Picture.jpg

ZenIT offers managed, automated, secure file backup for small businesses starting at as little as $150 per month for up to 5 machines.  We offer file management and data security plans that flex to accommodate business growth and infrastructure changes.  Contact us to learn more:




Reducing the Risk of File Loss

When working on files, especially in a Server environment, it’s not uncommon to open the file you’re working on directly from the server. This is not always the best practice if the file server is overburdened, or if the document is prone to instability, as this increases the risk for file loss or corruption.

If you are working on large design files of more than several hundred megabytes in a Adobe InDesign, Adobe Illustrator, Adobe Photoshop, Quark Xpress, Microsoft Powerpoint, Microsoft Publisher, Autodesk AutoCAD, Autodesk Revit, or other disk intensive software, working on a local copy is recommended. Indesign, AutoCAD, Powerpoint and other complex document creators can build a file that is “unstable,” and a font, linked or embedded graphic can cause the document to crash frequently, leading to corruption and lost work. Saving multiple revisions locally allows you to “wind back the clock” and discover what the bad element could be. 

While working on your local copy, we recommend saving every 15 minutes during periods of heavy productivity. This means you will have the most current copy on your machine, and an older known good copy on the server. Working this way reduces the I/O load on the server and the network as a whole, and gives the program the fastest performance possible.

Rename the file every few saves using filename shorthand so you can keep track, and save the end of the day’s version the server so nightly server backups will capture daily versions.



Big_Client_Project_110817_v3 ->Save to server


Big_Client_Project_110917_v2 ->Save to server


Big_Client_Project_111117_v2, etc.

Of course, saving files locally does present risk if you don’t put versions back on the server and don’t have a local backup, but such limitations should be taken into account for any and all workflows.

ZenIT offers managed, automated, secure document backup for small businesses starting at as little as $150 per month for up to 5 machines.  We offer file management and data security plans that flex to accommodate business growth and infrastructure changes.  Contact us to learn more: