Advanced Search
Search Results
139 total results found
Setup and using Remote Desktop on Windows PC's
Remote Desktop comes standard on all Windows Desktop and Laptop computers. To setup and use on Windows computers, your administrator or IT Support team will likely remote into your computer and setup a shortcut on your computer to use Remote Desktop Remember ...
Setup and using Remote Desktop on iPhone or iPad
Remoting in to your work computer on a Phone and iPad is very useful when you need to check something in a pinch and away from your computer. Setup Download Windows App Mobile: Windows App Mobile on the App Store Now you may need to submit a reques...
Star Codes and Features
Call Forwarding from Star Codes - Call forwarding from star codes only forwards to a device, specifically not a user, meaning it will not respect the answering rules of the forward user. If you forward to '101', the system will only forward to the specific ext...
Checking and Sending Fax on Connect UC Desktop
While you may email almost anyone, there are some that still like the traditional fax machine. Or some agencies that just refuse to update... Checking and Sending Fax is simple, make sure it is enabled and the correct Shared Fax Number Appears, if not, you ma...
How to save shortcut on the Desktop/Taskbar but keep the website Icon?
You may got use to saving website favorites directly to your desktop, but since Windows 11 updates and New Browsers, the option seems to have disappeared. There are a few way to go about it... Keep in mind, sharing the shortcut to other computers will likely ...
Create a Company Group for Shared Emails, Calendars, Resources
You may need to able to easily collaborate and have a shared Calendar to add all the requests for Vacations so everyone can see or a single email address you can send to, to alert everyone in that group of some event going on, and best way to do that is to cre...
How do I find my computer name?
Some times you need to identify which computer you are at, or need help with, and possibly there is no label on the computer or somethings got swapped around and your not sure... Easiest way to find out, is when your computer is booted, check "System Informa...
Incorrect Charger
While using incorrect charger may work, it may lead to shorter lifespan of the Computer/Battery, and may cause permanent damage to individual components, as well as unexplained erratic behavior of the computer, such as random errors or freezing or other issues...
Setup ConnectUC Mobile App
Download App You may Use the following Links: Android: https://play.google.com/store/apps/details?id=io.connectuc.android iOS: https://apps.apple.com/us/app/connectuc/id6452840138 Or Simply Visit your Mobile AppStore or PlayStore and search "ConnectUC" ...
How to Troubleshoot Blue Screens
Blue screens—commonly known as the Blue Screen of Death (BSOD)—can be frustrating and disruptive. They often indicate a critical system error, which may be caused by hardware malfunctions, faulty drivers, or system file issues. This article provides a step-by-...
10DLC Updates and Release Notes Quick Reference Page
Due to the ever-changing nature of the 10DLC Messaging Initiative, we have created a quick reference sheet that lists significant changes to 10DLC as they occur, including portal updates/enhancements related to 10DLC. We will also list all known future deadlin...
A2P/10DLC Brand & Campaign Registration Form
10DLC A2P Brand and Campaign Registration Form (docx) A downloadable version of the A2P/10DLC Brand & Campaign Registration Form that can be used to submit to Carriers for approval of Brand and Campaign for SMS Messages What you need Either the brand’s...
Caution External Email
What is this? This is simply a easy visual warning to let you know that this email came externally, meaning that it didn't come from anyone inside your organization and if anyone is claiming to be from your company to get more information or attempt to get ...
How to get a shareable Authenticator 2FA Key on Microsoft 365
While this is strongly advised against, there are situations that an account needs to be shared between multiple users, and with 2 Factor Authentication, usually only one person may have access to the code by putting in their own phone number or using an app o...
Data Protection, Storage, and Recovery Policy
1.0 Purpose The purpose of this policy is to establish guidelines and requirements for the protection, storage, retention, and recovery of the organization's data assets. This policy aims to safeguard sensitive and critical information from unauthorized acces...
Third-Party / Vendor Risk Management Policy
1.0 Purpose Precision Computer relies on various third-party vendors and service providers to support its operations and deliver services effectively to its clients. Engaging with third parties inherently introduces risks, including security vulnerabilities, ...
Change Management Policy
1.0 Purpose This policy establishes the standard process for managing all changes to client IT environments and services managed by Precision Computer. Unauthorized or poorly managed changes can lead to service disruptions, security vulnerabilities, and clien...
Client Data Management Policy
1.0 Purpose This policy defines the principles, responsibilities, and mandatory procedures for the secure handling, processing, storage, protection, retention, and disposal of all data belonging to or entrusted by clients to Precision Computer. As a Managed S...
Incident Management Policy
1.0 Purpose This policy defines the standard process for managing operational incidents affecting client services delivered by Precision Computer. The primary goals of this policy are to ensure the timely detection, logging, categorization, resolution, and co...
Client Onboarding and Offboarding Policy
1.0 Purpose This policy defines the standardized processes and security requirements for onboarding new clients into Precision Computer's management and offboarding clients upon termination of the service agreement. A consistent and secure process for both on...