Crown Logo

Technology Support For San Diego Since 1996

Click here for 60 minute consultation858-483-8770

Tech News Blog

Health Data Breaches: What you Should Know

Health Data Breaches: What you Should Know

A recent data breach at Blue Shield of California has us revisiting the topic of personal data and security. It’s a reminder that a lot of our data is stored by other people and reminds us that sometimes there’s not a lot we can do to protect all of our data. While...

Hands on with Copilot for Microsoft 365

Hands on with Copilot for Microsoft 365

Over the past year, “AI (Artificial Intelligence)” has been taking over the software world. By that, I don’t mean that AI is writing all of the software, or that AI is taking over the world, but it definitely is the hottest marketing term out there. Virtually...

5 Executive App Picks

5 Executive App Picks

This week’s blog post is in one of our favorite formats: the list! These lists are an effective way of learning about new apps or techniques that you might be missing out on but can help you save time or money (or both) by providing a service or some knowledge....

Latest news

Crown’s Holiday Tech and Gadget Guide

Crown’s Holiday Tech and Gadget Guide

It’s that time of year again… what one of our team members at Crown Computers referred to as “Marketing Season.” Instead of marketing—which you get enough of—we’ll share with you what our team thinks is fun, cool, and interesting, regardless of the season (but also,...

What is Network Security Monitoring? A Definitive Guide!

What is Network Security Monitoring? A Definitive Guide!

A network security monitoring system (NSM) protects digital assets and data against cyber threats. But what is network security monitoring? Simply put, it involves continuously surveilling network traffic and devices to detect potential vulnerabilities or suspicious...

Don’t Fall for the Clickbait!

Don’t Fall for the Clickbait!

Most scams are based off age-old methods of deception. Impersonation, fraud, and unauthorized access are all their own flavor of deception, but (strangely enough) one of the most classic forms of deception might also be the newest: clickbait. Today, we’ll tell you one...

5 Executive App Picks

5 Executive App Picks

This week’s blog post is in one of our favorite formats: the list! These lists are an effective way of learning about new apps or techniques that you might be missing out on but can help you save time or money (or both) by providing a service or some knowledge....

What Is IT Infrastructure Management? The Ultimate Guide

What Is IT Infrastructure Management? The Ultimate Guide

In a world where technology is advancing at lightning speed, effective IT management has become crucial for all types of businesses. It has been estimated that by 2024, global investment in IT is expected to reach $5.1 trillion. So, it’s obvious that the focus on IT...

How to Improve Network Security: A Comprehensive Guide

How to Improve Network Security: A Comprehensive Guide

In today's interconnected world, understanding how to improve network security is not just a choice; it's an imperative. The importance of network security cannot be exaggerated, considering the escalating threats that loom in the digital terrain. Cybercriminals are...

Health Data Breaches: What you Should Know

Health Data Breaches: What you Should Know

A recent data breach at Blue Shield of California has us revisiting the topic of personal data and security. It’s a reminder that a lot of our data is stored by other people and reminds us that sometimes there’s not a lot we can do to protect all of our data. While...

How to Secure a Network: Easy Steps That Anyone Can Follow!

How to Secure a Network: Easy Steps That Anyone Can Follow!

The fear of a network security breach looms large, especially when the stakes are as high as they are today. Disturbingly, IBM has flagged the average cost of a data breach at a staggering $4.35 million, an unprecedented peak. The impact of such breaches extends...

Crown’s Holiday Tech and Gadget Guide

Crown’s Holiday Tech and Gadget Guide

It’s that time of year again… what one of our team members at Crown Computers referred to as “Marketing Season.” Instead of marketing—which you get enough of—we’ll share with you what our team thinks is fun, cool, and interesting, regardless of the season (but also,...

What is Network Security Monitoring? A Definitive Guide!

What is Network Security Monitoring? A Definitive Guide!

A network security monitoring system (NSM) protects digital assets and data against cyber threats. But what is network security monitoring? Simply put, it involves continuously surveilling network traffic and devices to detect potential vulnerabilities or suspicious...

Don’t Fall for the Clickbait!

Don’t Fall for the Clickbait!

Most scams are based off age-old methods of deception. Impersonation, fraud, and unauthorized access are all their own flavor of deception, but (strangely enough) one of the most classic forms of deception might also be the newest: clickbait. Today, we’ll tell you one...