4 different types of hackers

April 28th, 2016
4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better.

New Office 365 feature for more secure email

April 21st, 2016
New Office 365 feature for more secure email

Most of us like to think we’d never click on a suspicious link in an email. But the fact of the matter is this is one of the most common ways a business is hacked. We’re all human of course, and we make mistakes. Yet now Microsoft is trying to prevent this.

How to enhance your VoIP call performance

April 19th, 2016
How to enhance your VoIP call performance

When considering a VoIP solution, many small business owners have a lot of reservations. What if the call quality is unsuitable? What if your staff struggles with the technology? What if you have to deal with the headache of installing an additional network? All these assumptions can prevent business owners from giving VoIP a try, but are they legitimate? Absolutely not.

How to make the most out of your BYOD policy

April 18th, 2016
How to make the most out of your BYOD policy

There’s a lot of talk about BYOD policies these days. While most companies are more concerned with the security risks that go along with bringing your own device, far fewer business owners forget the productivity risks. Believe it or not, a poor BYOD policy (or lack thereof) can actually hurt your staff’s productivity.

How Virtualization helps with DR

April 14th, 2016
How Virtualization helps with DR

When most people think of Disaster Recovery, the idea of Virtualization is likely far from mind. However, these two IT services are more closely related than the average business owner thinks. Virtualization can actually serve as Disaster Recovery Solution.

4 Security risks to consider with BYOD

April 13th, 2016
4 Security risks to consider with BYOD

Taking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly.

How to protect your organization from “Locky” ransomware

April 7th, 2016
How to protect your organization from “Locky” ransomware

 Ransomware is on the rise. Follow these steps to help protect your organization:

Backup regularly and keep a recent backup copy off-site. There are dozens of ways other than ransomware that files can suddenly vanish, such as fire, flood, theft, a dropped laptop or even an accidental delete.

What are Office 365 Connectors?

April 7th, 2016
What are Office 365 Connectors?

Recently, Microsoft announced a new feature in Office 365 Groups called Connectors. As part of their new openness mantra, Office 365 Connectors allows you to connect with popular third party services without ever having to leave your Outlook client. This means relevant content and updates that you want are sent immediately to your group feed, making workflow more seamless.

Technology ROI for beginners

April 4th, 2016
Technology ROI for beginners

For many business owners, calculating the return on investment of a new technology purchase can be tricky. Some may not even see the value of calculating it, and therefore skip this step. This, however, can be a costly mistake to your business because if your technology isn’t saving you money, it’s costing you.