Skip to main content
772-202-0835

Need Tech Support Now?

We Save You Time So

Our Blog

Help! I think I deleted my important file.
First things first. If this file is really important, power down your computer and let a professional take care of it. Following this guide may prevent recovery by a professional.

1- Look in the folder you saved it in

This is an obvious step but just check where you saved the file and open it. See if the file is there.

2- Look in Recently Opened files

Most programs have a way to see your recently opened documents. Check in here and see if any of the recent documents or images are the ones you are looking for. This shows up in Microsoft Word when you open the program, and in other programs you may need to go to File > Open Recent. Not all prorams have this feature but a lot do.

3- Check Recycle Bin

This one may seem obvious but check your Trash or Recycle Bin. When you actually delete a file, it usually goes here before deletion. Most recycle bins are organized without folders, so just a bunch of files. 

4- Search for your file

In Mac you can use Finder and its search feature to locate files, and in Windows you can use the built-in search or a more robust program like Everything by voidtools. Search for the file extension of your document (word files are .doc or .docx, Photoshop is .psd, etc). Then sort the files by Date Modified. You'll see your file near the top if it's there. 

5- Search the area

Check the folders above, and some folders just below where you expected your file to be. It could have been dragged into one of the nearby folders.

Contingency

At this point you have done the basics, so if you haven't found it yet it is time to proceed with data recovery. Data recovery tools can recover files that have been deleted and even ones emptied from the recycle bin, or from a former copy of Windows. There are free or cheap data recovery tools for use at home, slightly more complex ones for local computer shops, and specialists that basically use magic wands or who knows. You pick based on budget and how important the data is.

Help! I think I deleted my important file.

Train Your Employees in Tech
Sometimes we all take it for granted that others have basic knowledge of tech, but it is always important to reiterate this for employees in the workplace that may be unclear on their responsibilities regarding company information. The weakest point of any security system is the human factor. 

Employee Training and Documentation

Make sure people in your company are trained on what is in their role as far as tech is concerned. A lot of employees work with sensitive data everyday, and it helps to give a tour of the dos and don'ts of the role they play in the company. Sometimes it may seem like overkill to have documentation for each role and what to do, but it saves time on training. This means there is a balancing act to how well documented you want each role to be on paper (digital paper of course). It takes time to write documentation but saves time and ensures quality and security. 

Company Policies 

This one is an essential for any company with more than 1 employee in our opinion. The simplest method is to have a single policy that goes over all of your technology policies. It would have a section for password policies, information sharing policies, and company laptop usage policies among others. Users would be required to read and sign this policy each year. Moving up in the formality chain, we have a multi-part signature section with explicit dos and don'ts in legalese.

Regular Training

Some companies use a quick employee training video a few times per year to reiterate security policies and touch on modern-day scams happening in and outside the company. When a company is dealing with storing credit card data or other sensitive info, it can be good to make this type of training material before a yearly signing that they understand the company policy and their role in it. 

Our Views

One of our biggest type of jobs is when a client wasn't sure on an internal company procedure. Whether that led to a virus on a free movie website, or someone rewiring the networking equipment, we've seen a ton of scenarios. We know it's impossible for us to lay out every possibility for our own company, but some simple internal-use policies are important to make sure accountability is there.

Train Your Employees in Tech