How hackers can infiltrate your systems

While technology empowers us in many ways, it also opens up vulnerabilities that can be exploited by malicious actors. When breaching your systems, hackers ...

Read more

Exciting Leadership Evolution at Centaris!

Announcement of Executive Leadership Changes

We are thrilled to share significant updates in our executive leadership!

New Chapter ...

Read more

Automated Scheduling

We’ve heard that one of your biggest frustrations as a client is scheduling service. We frequently play a game of ping-pong to pick a time that works ...

Read more

5 Tips for secure customer data collection

Much of business centers on giving people what they want. This means understanding customers’ interests and needs by accumulating and organizing customer ...

Read more

The 5 most common data backup solutions

For any business, data is more than just information; it’s an invaluable asset that drives decision-making and strategy. Losing data can result in ...

Read more

Centaris Acquires Network Connections, Inc.

IT Firm Continues Expansion of Services, Grows Depth of Experience

STERLING HEIGHTS, MI / ACCESSWIRE / January 15, 2024 / One of Michigan's longstanding ...

Read more

Centaris Acquires Network Source One, Inc.

Centaris, which serves more than 1,500 businesses nationwide and is headquartered in Sterling Heights, Mich., made the acquisition of the Oakland County ...

Read more

Tech Tip: Dangers of a bloated battery

As an onsite technician, I am increasingly noticing laptops that are experiencing a bloated battery. It can cause serious damage or injury by starting ...

Read more

Triple Retirement Party

On Wednesday, July 13th Centaris, formerly known as CCR, proudly celebrated the retirement of three incredibly ...

Read more

CCR Summer Event: Cedar Point!

On Saturday, July 22nd, employees, friends and family of Center for Computer Resources traded in their Technology Caps for Ride Warrior Hats. After ...

Read more

Training Employees to Spot Social Engineering

Social engineering is one of the newest methods hackers use to access sensitive information. Rather than attacking a system directly, this technique relies ...

Read more

Don’t believe these disaster recovery myths

Modern technology changes rapidly, but not all businesses can match its pace. When it comes to disaster recovery (DR), for instance, we see business ...

Read more

Holiday Scams

The holidays are right around the corner and it seems like every store is running a special. You’re constantly receiving emails with enticing deals ...

Read more

MSU vs U of M Tailgate

There is only one time throughout the year that the CCR office becomes divided. One side cheers for a team that resides in East Lansing, while the others ...

Read more

We wish you a happy and healthy Thanksgiving!

From our CCR Family to yours, we wish you a happy and healthy Thanksgiving surrounded by those who mean the most to you!Below are just a few things we ...

Read more

May Tech Tips: Toggling Windows Spotlight

Windows Spotlight is a feature that will automatically change your lock screen background image. In addition to this, it annoyingly offers suggestions ...

Read more

December Tech Tip

Tech support scams are unfortunately becoming all too common. Because of this, it is becoming increasingly more important to be able to recognize a fake ...

Read more

HIPAA and IT: The 4 key factors

There is a reason medical records are regarded as confidential. In addition to general respect for privacy, their illicit disclosure has caused social ...

Read more

Tips to enhance your Excel proficiency

Excel, a widely used office tool, holds immense potential that often remains untapped by many users. If you’re struggling with Excel, this guide provides ...

Read more

Annual CCR U of M vs. MSU Tailgate

For one week in October, CCR’s office becomes divided between two Michigan collegiate sport teams, two colors and two mascots. Our Sterling Heights ...

Read more

Is it worth monitoring employees online?

The digitization of the workplace has opened up new frontiers for employer oversight. With workers more connected than ever through computers and internet-based ...

Read more

Emerging Threat: AI-Powered Social Engineering

Artificial intelligence has brought many advantages to different aspects of modern life. This new technology allows for the fast and accurate analysis ...

Read more

Why Businesses Need Password Management

As digital technology becomes more advanced, so do the risks of online security breaches. Cyberattacks continue to be a problem, so businesses need to ...

Read more

Tech Tip: Screen Sharing with Microsoft Teams

Microsoft Teams has provided all of us with an easy way to communicate while we work from home, or from anywhere with an internet connection. Teams is ...

Read more

September Tech Tip 2022

Have you ever been in the middle of writing an important document for your boss, only to have the power go out, right before you managed to hit that ...

Read more

May Tech Tip: Keyboard Shortcuts

Common and helpful Windows Keyboard Shortcuts
Ctrl+C will copy a selected item to your clipboard
Ctrl+X will cut the selected item
Ctrl+V will paste ...

Read more

November Tech Tips: 10 Tips for you!

Ten Tech Tips from Centaris

Search Google with a Right-Click
Are you ever reading something online, see a term or person you're interested in, and ...

Read more

Top 6 VoIP trends for 2024

VoIP has delivered incredible changes, not just to the telecommunications industry but to the business landscape in general. By combining flexible features ...

Read more

How Is AI Used Against Your Employees

Artificial intelligence has evolved dramatically, and the improvements are evident. In one of its first applications, AI was used to develop a checkers ...

Read more

A strategic guide to web hosting solutions

In today’s digitally driven landscape, a robust online presence is no longer a luxury, but a critical business imperative. Regardless of your industry ...

Read more

How Do Hackers Use AI?

Artificial intelligence has been a key ingredient in propelling businesses forward—creating better customer engagement, cutting response times, providing ...

Read more

How to fix Windows 10/11 printing problems

Printing issues can be exceptionally exasperating. Just as you urgently have to print a hard copy of a document, some problem arises. This frustration ...

Read more

A guide to eliminating clutter on your PC

Managing clutter on your desktop and hard drive is essential for maintaining peak computer performance. In this article, we will explore five common ...

Read more

Why hybrid cloud solutions matter

Hybrid cloud solutions are becoming increasingly popular because they offer numerous benefits to businesses of all sizes. By combining the capabilities ...

Read more

A guide to verifying Android apps

Verifying the authenticity and safety of apps before installing them is crucial to protect your device and personal information. There are numerous malicious ...

Read more

Many businesses don’t prioritize disaster recovery. Improve your disaster preparedness with our FREE eBook.Learn More Here
+