Crown Logo

Technology Support For San Diego Since 1996

Click here for 60 minute consultation858-483-8770

Tech News Blog

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.

Latest news

Saying Goodbye to Active Directory and Hello to Entra ID?

Saying Goodbye to Active Directory and Hello to Entra ID?

Back in July, Microsoft announced that Azure Active Directory would become Entra ID. While the change was mostly just a rebranding, it still sparks the question: is Microsoft moving on from Active Directory? And should your business move on too? It’s an interesting...

3 More Apps and Marketplaces to Start your AI Era

3 More Apps and Marketplaces to Start your AI Era

The newest breakthroughs in “AI” have created a lot of new downstream developments in software. If you look around, everything is becoming AI-driven; in this way, though, it really is just a marketing term that’s replacing the more accurately termed method called...

Why Is IT Security Important: 8 Reasons

Why Is IT Security Important: 8 Reasons

You're the proud owner of a thriving business that is growing in leaps and bounds. Your employees are dedicated, your products or services are top-notch, and your customer base continues to expand. But one morning, you wake up to the devastating news that your...

Leverage AI for Better Meetings and Notetaking

Leverage AI for Better Meetings and Notetaking

A few weeks ago on this blog, we talked about the advantages and limitations of Large Language Model chatbots like ChatGPT. There’s another way that AI tools can help you with your efficiency and streamline your work: taking notes for you in a business meeting. There...

Health Data Breaches: What you Should Know

Health Data Breaches: What you Should Know

A recent data breach at Blue Shield of California has us revisiting the topic of personal data and security. It’s a reminder that a lot of our data is stored by other people and reminds us that sometimes there’s not a lot we can do to protect all of our data. While...

Crown’s Holiday Tech and Gadget Guide

Crown’s Holiday Tech and Gadget Guide

It’s that time of year again… what one of our team members at Crown Computers referred to as “Marketing Season.” Instead of marketing—which you get enough of—we’ll share with you what our team thinks is fun, cool, and interesting, regardless of the season (but also,...

What is Network Security Monitoring? A Definitive Guide!

What is Network Security Monitoring? A Definitive Guide!

A network security monitoring system (NSM) protects digital assets and data against cyber threats. But what is network security monitoring? Simply put, it involves continuously surveilling network traffic and devices to detect potential vulnerabilities or suspicious...

Don’t Fall for the Clickbait!

Don’t Fall for the Clickbait!

Most scams are based off age-old methods of deception. Impersonation, fraud, and unauthorized access are all their own flavor of deception, but (strangely enough) one of the most classic forms of deception might also be the newest: clickbait. Today, we’ll tell you one...