• HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

Mobile Menu

Call us today!

(614) 784-9738

  • Menu
  • Skip to right header navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Before Header

Call us today:  (614)784-9738

Client Login

Free Risk Report

Protected Documents

Download Your Cyber Security Guide

Singlesource IT

Your Central Ohio IT Provider. Specializing in small and mid-sized business.

  • HOME
  • WHAT WE DO
    • Flat Rate Managed IT Services and Support
    • Cloud Solutions
    • Technology Consulting
    • Hardware and Software
    • Phone Systems
  • ABOUT
    • Why Singlesource IT?
    • News
    • Technology Partners
  • CONTACT US
  • Search

News & Updates

Latest news from our law firm and the community we represent.

silver laptop computer on black table

8 Considerations Before Buying Used Technology

We use our devices every day, so they need to work well for our needs. A device that’s slow or broken is inconvenient and can affect productivity for day-to-day tasks. But buying a brand new phone or laptop isn’t always the best option. We’ll cover eight things you should consider before making the purchase of …

8 Considerations Before Buying Used TechnologyRead More

Free cybersecurity security authentication vector

All About the New U.S. Cyber Trust Mark

The Cyber Trust Mark is a new smart device label created by the US government to prove that a device is safe. Internet of Things (IOT) devices have risen in popularity recently. Devices like smart thermostats and baby monitors make our lives easier, but also open us up to cyber threats.  There were over 112 …

All About the New U.S. Cyber Trust MarkRead More

Free cyber security phone login vector

Top 10 Security Tips for Mobile App Users

Mobile applications have become an integral part of our lives. We use them to browse the internet, network, communicate, and much more. But they open us up to risks caused by fraudsters who may steal information or damage our phones.  According to 2024 data from Asee, over 75% of published apps have at least one …

Top 10 Security Tips for Mobile App UsersRead More

How the 2025 Tariffs Impact MSPs and Computer Hardware

In case you missed it, new tariffs are here and they’re already impacting the market. Here’s a quick update and what to expect:  What we’re seeing:  What Singlesource IT is doing to prepare:  Any questions? Let us know! Singlesource IT is always committed to bringing you the right technology, with the best options for your …

How the 2025 Tariffs Impact MSPs and Computer HardwareRead More

Free Aerial view of a sleek laptop keyboard on a clean, white surface, ideal for tech backgrounds. Stock Photo

Is It Time for a Device Upgrade? Check for These 7 Signs

Technology is fast, and in no time, our gadgets get outdated. According to data from Statista, consumers replace their devices about every 2-3 years. Still, it can be tricky to determine when an upgrade is needed.  Upgrading your device isn’t just about having the latest gadget. An up-to-date device is safer and more efficient. This …

Is It Time for a Device Upgrade? Check for These 7 SignsRead More

A man sitting at a table using a laptop computer

How Much Device Storage You Need: A Comprehensive Guide

Device storage decides how many applications, photos, and files you can retain on your device. When you run out of storage, it can affect your productivity and device performance. But finding the right storage amount isn’t always easy.  We can underestimate what we need or get too much storage. This guide will help you figure …

How Much Device Storage You Need: A Comprehensive GuideRead More

Windows 11 - EOS

Heads up! End of Support for Windows 10 is Approaching!

After October 14, 2025, Microsoft will no longer provide free software updates from Windows Update, technical assistance, or security fixes for Windows 10. Microsoft’s End of Support announcements often have little impact on the average user, but this one is different. While the Windows 11 has been available since 2021, approximately 60% of PC users …

Heads up! End of Support for Windows 10 is Approaching!Read More

MDR

Managed Detection and Response: The Next Step in Protection

As cybercriminals get more advanced in their tactics, traditional 9-to-5 security technologies are becoming less effective at stopping them. What does that mean for your business? It means offering a 24×7 proactive cybersecurity solution is crucial. To combat today’s cybercriminal advances, our team recommends Managed Detection and Response.Managed Detection and Response (MDR) is a holistic …

Managed Detection and Response: The Next Step in ProtectionRead More

easydmarc

Protect Your Email with EasyDMARC

Email-based scams are everywhere, and with “domain spoofing” a talented hacker can make it look like the scam is coming from inside the building. To stop these bad guys, a protocol has been rolled out called DMARC, which stands for “Domain-based Message Authentication Reporting & Conformance.” Basically, this is a double-check handled by email servers …

Protect Your Email with EasyDMARCRead More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Go to Next Page »

Primary Sidebar

Need IT?

We’ve partnered with the best. Find out why Singlesource IT should be your one source, one call technology solution.

GET IN TOUCH TODAY.

LATEST NEWS

Get Your Orders In Now! Hardware Prices Continue To Climb in 2026

We don't like this news any more than you do, but the reality is that we are seeing price increases …

scrabble-letters-spelling-saas-on-a-wooden-tabl

The Smarter Way to Vet Your SaaS Integrations

Your business runs on a SaaS (software-as-a-service) application stack, and you learn about a new …

shallow-focus-photography-of-macbook

How to Use Conditional Access to Grant and Revoke Contractor Access in 60 Minutes

Managing contractor logins can be a real headache. You need to grant access quickly so work can …

Free button icon symbol vector

How to Implement Zero Trust for Your Office Guest Wi-Fi Network

Guest Wi-Fi is a convenience your visitors expect and a hallmark of good customer service. But it’s …

a computer keyboard with a blue light on it

6 Ways to Prevent Leaking Private Data Through Public AI Tools

We all agree that public AI tools are fantastic for general tasks such as brainstorming ideas and …

Footer

Contact Us

Singlesource IT
(614) 784-9738

148 N. High St.
Gahanna, OH 43230

Newsletter

Sign up to get free resources, tips, and news from Singlesource IT.

Thanks for signing up!

Copyright © 2026 · Singlesource IT