Eclipse IT, Inc. Blog

Eclipse IT, Inc. Blog

Eclipse IT, Inc. has been serving the Sandy area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

The Tim Cook Era: Is Apple Still Great, or Just Great at Logistics?

Tim Cook has been at the helm of Apple for 15 years, and as he’s set to retire as CEO in September we thought we’d take a look at some of the differences between the Apple, Inc. he’s leaving behind and the one he took over in 2011.

Continue reading

Your 15-Point IT Infrastructure Health Check

It’s easy when things are going well to ignore the annual IT health check, but that doesn’t make it any less important. Today, we’re sharing a 15-point IT infrastructure health check to keep your technology working smoothly so your business can continue operations. We’ll cover everything from zombie software licenses to expired warranties and aging hardware.

Continue reading

Are You Sure the Voice on the Other End of the Phone is Your Boss?

For a long time, one of the best practices for phishing prevention has been to pick up the phone and call up the person apparently sending a message. Unfortunately, in some cases, phone calls are now being exploited.

Now, AI enables scammers to mimic the voices of the people they impersonate through voice cloning. As a result, it is more important than ever to verify who you are talking to before sharing any sensitive information.

Continue reading

Your Guide to the CIA Triad (AKA The 3 Pillars of Cybersecurity)

Want to hear a secret? Despite all the buzzwords and jargon, cybersecurity has a pretty simple foundation… one that many professionals refer to as the CIA Triad (unrelated to the intelligence agency). Its three pillars—Confidentiality, Integrity, and Availability—serve as the three critical sides of the cybersecurity triangle. If any fail, the whole of your systems are at risk.

Let’s go over what makes up each side.

Continue reading

The Cloud is Just Someone Else's Computer (And That’s a Good Thing)

If you ask ten different IT guys to define "the cloud,” you’ll probably get twelve different answers involving scalability, elasticity, and other buzzwords that don't actually help you run your business on a Wednesday morning.

Let's strip away the jargon. The cloud isn't some magical, invisible ether. It’s essentially just entrusting someone else—usually a massive corporation like Microsoft, Google, or Amazon—to manage the physical computer for you.

Instead of having a humming, heat-generating server box locked in your broom closet, you’re renting space on a much more powerful, much more secure server in a data center somewhere else.

Continue reading

Create Inclusive Content Easily with Microsoft Word's Built-in Accessibility Features

Digital accessibility makes technology usable for everyone, helping employees stay productive and giving employers access to more talent. Microsoft Word includes a built-in Accessibility Assistant to help you easily create inclusive documents.

Think of it like spellcheck, cranked up to 11, intended to ensure as many people as possible are able to access the information you’re trying to share.

Continue reading

Why the Sycophantic Nature of AI is a Psychological Risk

It feels good to be right. It feels even better to have an assistant that never argues, never pushes back, and seems to be on your exact wavelength 24/7. We have a name for a system that never disagrees with you: a broken one.

The reality is that AI lacks a moral compass or a personal creed. It doesn't have a "gut feeling" telling it when you’re about to make a massive business mistake. It operates purely on a map of mathematical probabilities, designed to reflect your own intent back to you with perfect clarity.

Continue reading

What the FCC’s Router Ban Means for Your Business

On March 23, 2026, the digital landscape shifted overnight. The FCC issued a sweeping mandate that reclassified almost every consumer-grade Wi-Fi router in American homes as a “national security threat.” The policy was a direct response to Salt, Flax, and Volt Typhoon campaigns—state-sponsored cyberattacks that, according to official reports, utilized residential routers as the primary entry points for breaching critical infrastructure.

We know the question on your mind, and it’s the same as many other businesses: “How does this impact me?” That’s what we’re here to answer.

Continue reading

3 Next-Gen Cybersecurity Challenges for SMBs

Imagine one of your employees receives a phone call from someone who sounds just like you. Would they be able to distinguish this deepfake from the genuine article? If you cannot answer this question with an emphatic “yes,” you have some work to do in preparing your team for modern cybersecurity standards.

Continue reading

Protecting Your Business Against AI Phishing is Essential

I’m about to say something that is going to sound weird at first, but stay with me here:

I miss the Nigerian Prince scam.

I know, I know, it’s crazy, but let me tell you why: threats were a lot easier to spot.

Continue reading

Why Your IT Provider Should Profit from Your Stability, Not Your Downtime

Imagine a partnership where your provider makes the most money when your business is at a standstill. It may sound backward, but this is the reality of the traditional break-fix model.

When your server crashes or your network lags, their billable hours start climbing. This creates a fundamental conflict of interest: Why would a vendor work to prevent the very problems that fuel their revenue?

Continue reading

Why Your Office Is a Secure Network Node, Not a Physical Address

What defines your office in 2026? If your answer is still tied to a street address, your business may be carrying unnecessary risk. In an era where the hyper-hybrid model prevails, the office is no longer a destination—it is a secure, high-performing network node.

Continue reading

RMM: The Invisible Engine of Your Uptime

The traditional help desk addresses technology that’s already broken, which doesn’t help you much when you factor in the costs of lost opportunities and productivity. With us on your side, however, you can leverage more proactive solutions that make tech fixes feel more like a high-tech production line. Instead of waiting for the phone call that something’s wrong, we use Remote Monitoring and Management (RMM) tools to find and fix bugs before they ever become a problem for your employees. 

Continue reading

Tip of the Week: 3 Signs of a Fraudulent Email

The majority of modern cyberattacks begin with some form of user manipulation, usually through phishing messages that trick recipients into acting against their own security. While these can be shared in any form, the most well-known is certainly email.

Let’s review a few warning signs that can help indicate that an email message is, in fact, a phishing scheme.

Continue reading

How to Manage an Anti-Burnout Schedule

For most small and medium-sized businesses, scheduling is a constant frustration. Balancing business needs with your employees' lives—like Jack’s daughter’s recital or Stef’s morning errands—feels like a losing game.

The good news? With the right strategy and a few modern tools, you can make scheduling easier for everyone.

Continue reading

Tri-Fold Phones Offer More to Users

The foldable market just took its biggest leap yet. There have been all types of form factors, but following years of book-style foldables, Samsung has finally released the Galaxy Z TriFold. This device isn’t just a phone that gets slightly wider; it’s a full-scale 10-inch tablet that folds into a standard 6.5-inch smartphone.

Today, we thought we would go through some of the features and benefits of Samsung’s newest smartphone innovation.

Continue reading

LexisNexis Breach — Lessons in Small Business Patching

In late February, data analytics company LexisNexis Legal & Professional suffered a data breach in which the threat actor responsible used an unpatched application to access the company’s Amazon Web Services infrastructure. While LexisNexis L&P claims the data leaked was minimal, this breach still serves as an important reminder of a critical security principle:

If a company as large as LexisNexis L&P can fall victim to such a simple vulnerability, what’s to say your business won’t?

Continue reading

Business Technology: Adapt or Fall Behind

We used to say change is constant. Now, change is a sprint. We are witnessing a massive shift in how fast the world moves, and it’s not just your imagination—human progress has hit the gas pedal.

Technologies aren't just appearing; they are crashing into each other and maturing so quickly that the "next big thing" is often replaced before it’s even fully installed. This isn't a random spike; it’s the result of three massive forces hitting their stride at once.

Continue reading

Having a Backup Is Not Good Enough. Here’s Why

No matter how you look at it, there will always be a significant difference between a data backup and a successful recovery. Businesses are too often under the impression that they are one and the same, but this is a faulty belief that puts them at risk. If you back up your files to the cloud, your business needs a way to recover those files, and fast. Otherwise, downtime ensues, and you don’t want that.

Continue reading

3 Fatal Cybersecurity Myths That Put Your Business At Risk

If your best defense against cybersecurity threats is to hope your business is too small to target, we’ve got news for you. That’s no cybersecurity strategy, and hackers don’t care how big or small your business is. All they care about is the value your data presents, and let’s be real, that’s a lot.

Continue reading

News & Updates

Eclipse IT, Inc. is proud to announce the launch of our new website at www.eclipseit.com. The goal of the new website is to make it easier for our existing clients to submit and manage support requests, and provide more information about our services for ...

Contact Us

Learn more about what Eclipse IT, Inc. can do for your business.

Utah
Eclipse IT, Inc.
63 E 11400 S #316
Sandy, Utah 84070

California
6965 El Camino Real STE 105 - 227
Carlsbad, CA 92009

Main phone:
(619) 331-4008