Get Started

Articles

Since 2002, SafePoint IT has been providing Managed IT services across the Chicago Area, Illinois.

How and Why SafePoint IT Performs Vulnerability Assessments for Our Clients

We at SafePoint IT began performing vulnerability assessments to assist our clients in detecting and...
Read More

Update and Concerns on the Recent LastPass Security Incident

We have been keeping users up to date on the recent LastPass security incident that...
Read More

Why We No Longer Use Hard Drives at SafePoint IT  

Comparing capacity and price is only one aspect of selecting the best storage. Your computer's...
Read More

FBI Warns of Malicious Search Engine Advertisements

On December 21, 2022, The Federal Bureau of Investigation (FBI) issued a public service announcement...
Read More

A Malicious Copy of SentinelOne that Steals Sensitive Information

Con artists have created a malicious package on Python Package Index (PyPI), that impersonates the...
Read More

OpenAI: Accessing Answers Rapidly with Advance Technology

If you haven't heard about the commotion over the new and innovative artificial intelligence, Open...
Read More

New Team Member On Board: Meet Casey!

SafePoint IT is investing a lot of effort to make sure that all your IT...
Read More

Cloud vs On-prem: Why Cloud Services is Beneficial to Your Work Processes

As technology continues to evolve and businesses become more knowledgeable about the versatility of each...
Read More

Why it Makes Sense to Purchase Equipment Through SafePoint IT

While we notify clients via email or phone about the products we need to acquire...
Read More

Here Are Four Ways to Protect Yourself From PDF Scams

When we discuss phishing emails, we consider the issues of a deceived user clicking malicious...
Read More

ChatBot: An AI Tool to Assist You with Customer Service

Last week, one of our engineers assisted a company in developing an automated chat flow...
Read More

Why SafePoint IT Advises Against Using Personal Laptops for Work

  Recently, there was a request from one of our client’s employees who worked from...
Read More

Man In the Middle (MITM) Attack: The Dangers of Public Wi-Fi

Public Wi-Fi might seem useful because it allows you to not only avoid using your...
Read More
1 14 15 16 17 18 29
chevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram