Our Blog

How to disable Google from spying on you ;-)

How to disable the Archive feature in Mozilla Thunderbird

Configuring a WeMo Dimmer with IFTTT


Coronavirus Update

Concise Newsletter

Troubleshooting a program that hogs your processor utilization

We recently discovered a shady program, which caused severe system instability. In addition, it also hogged a PC’s available processor power. As a result, one of our technicians patiently disabled and removed the software.

HipChat Cloud to Slack Migration

HipChat has been bought by Slack, so it’s going to be time to migrate soon!

The Value of Operating System Updates

We’re Hiring!

Concise is hiring!  Please see below for a detailed job description.

Concise Honored in Michigan Lawyers Weekly

Michigan Lawyers Weekly Best of 2017 Issue

Resolving Microsoft Exchange 2010 Connectivity Issues

Resolving “Connecting to remote server failed with the following error message: The WinRM client received an HTTP server error status (500), but the remove service did not include any other information about the cause of the failure. For more information, see the about_Remote_Troubleshooting Help topic.” Issue With Microsoft Exchange 2010

Roaming vs. Local Profiles

A discussion of main differences between roaming and local profiles in the Microsoft Windows operating system

The Cordcutter’s Manifesto, pt.1

Another blog about the most beautiful thing in the world, de-cluttering messes of cords.

Internet of Things and YOU: Part I

Things, the internet of things, smart things, and how you interact with them

How To Deploy Remote Desktop Services On A Windows Server 2016 Domain Controller

A brief step-by-step guide about deploying Remote Desktop on a Windows Server

Ways to Reach Concise

The best ways to reach Team Concise if you need service, from the heart that beats the office!

The Wonderful World of Bootable USB Acronis

How to create and boot a custom bootable USB Acronis Disk with drivers pre-loaded for Universal Restore

Work Remotely (Securely) With Ease

A summary of the most common usages of VPNs, or Virtual Private Networks

Virtualizing a DOS-Based Point of Sale System (that’s over 20 years old) in 2017

Part 2:  On the Miracles of Virtualization and Legacy Systems, a Concise Series

How To Create A Custom Navigation Tile In Microsoft Office 365

A Concise How-To Guide: How to Create a Custom Tile in Office 365

Virtualizing a Mac OS System 7.0.1 (from 1991) in 2017

Part 1:  On the Miracles of Virtualization and Legacy Systems, a Concise Series

Dishonest Printer Toner Cartridges

A How-to Guide on Resetting Laser Printer Toner Cartridges in the Brother MFC-7840W

Store your passwords securely

A short summary of methods for storing your passwords more securely

Remediate A Ransomware Infection: A Concise Guide

A Concise Guide to Ransomware Remediation

Intuit QuickBooks Best Practices for Multi-User Mode and Company File Corruption

Corrupted company file & proper usage of Intuit QuickBooks in Multi-User Mode

Why robot vacuums are not worth it

Our office Administrator Chelsea opines on the cons of robot vacuums

The Importance of Backing Up Your Data (Backup Your Data!!)


(How to) Run Old Versions of Internet Explorer In Windows 10

Some instructions on how to run Old Versions of Internet Explorer In Windows 10

Reasons to use Mozilla Firefox any browser over Internet Explorer

Alternatives to Internet Explorer that provide a safer, better internet browsing experience.

Network infrastructure backup with Cyberoam

Automating backup of Cyberoam (Sophos) router configuration data

Concise Remote Support Instructions

An overview of our remote support service offering, instructions on how to install, and answers to frequently asked questions.

Random Access Memories

Random Access Memory, RAM, Computer Slowness, Upgrades

Is it time to move your small business data to network attached storage

Network Attached Storage (NAS) discussion, Data Storage Concerns, Synology vs. Qnap

Minimalism, Part II

How to practice minimalism through IT (having an uncluttered desktop and organized cable management)

Concise Themed Hummingbird Cookies

How to make Concise-themed Hummingbird Cookies

Locky and Other Ransomware: Beware!

Beware! Ransomware ‘hijacking’ your files via encryption and holding them for ransom

Office 365: Embracing the Future of Microsoft Office Online

Office 365, Microsoft Hosted Exchange, Benefits of Microsoft Office 365

The importance of a disaster recovery plan

Disaster Recovery, Proactive Maintenance, Off-Site Backup


How to practice minimalism through IT (having an uncluttered desktop and organized cable management)

Why Optical Drives Are Becoming a Thing of the Past

Jonathan’s take on why CD and DVD (optical) drives are becoming extinct

How to Edit or Transfer the QuickBooks Dictionary

Editing / Merging QuickBooks Dictionary – Not The Easiest, But Certainly Useful!

Using Third Party VOIP Services with Comcast Business Internet

Key Considerations while utilizing Comcast as your ISP but a different VoIP provider

Upgrading to Windows 10

Microsoft has just released the newest version of Windows on July 29th, 2015. Unlike previous versions of Windows that require the upgrade be purchased, Microsoft is trying new things with this release.

Protecting Your Data from CryptoWall 3.0

The ever evolving threat of computer viruses recently reached frightening new levels with the release of the Cryptolocker in 2013. While CyrptoWall 3.0 is the most recent version, more will follow.

Windows Server 2003 End of Life

Microsoft will no longer issue security updates for any version of Windows Server 2003

Domain Renewal Scam Alert: iDNS

Every so often we receive calls from clients who want to run a web site related mailing by us to ensure it is not fraudulent. Recently, our client received this

Password Management

In this day and age of hackers, viruses, and way too many passwords, we often get asked by our clients

Malware to Avoid

Recently, a client called and complained of a computer that was so slow, it was barely usable. After some anti-malware scans we thought it would be a good idea to check out which programs were installed. Below is an example of about a dozen malicious programs that you do NOT want on your computer (with the exception of Adobe Reader). If you see these programs, get rid of them ASAP!

Concise Completes Goldman Sachs 10,000 Small Biz!

Jeffrey Atto, the executive officer of Concise Computer Consulting (Bloomfield Hills, MI) recently completed the Goldman Sachs 10,000 Small Businesses Program! The graduation included attendance by Governor Snyder, Mayor Duggan, Lloyd Blankfein, Mike Bloomberg, and Warren Buffet.

Decrypt Cryptolocker Locked Files!

Great News! Cryptolocker victims can now recover their files that were encrypted by the malware/virus without having to pay the ransom. Unfortunately, this does not include the newer Crypto-virus/malware, called CryptoWall.

Domain Registrar Privacy

Recently we assisted a client with an issue that they experienced with their domain registrar’s third party privacy service. In case you aren’t aware, …