Blog

4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better. Here’s a profile of four […]

Ransomware alert for healthcare practices

Ransomware is becoming a growing problem for the healthcare industry. And with around a dozen attacks on hospitals being reported since the beginning of the year, you may be wondering just how severe the problem is. Should you be alarmed? How can you protect your practice? Here’s an inside look at how the ransomware epidemic […]

Picking a mouse that you click with

When you’re tired of using an uncomfortable mouse or struggling with your laptop’s trackpad, it’s time to buy a new one. But with so many brands and models out there, where would you even start looking? Finding the right mouse to fit your hand comes down to two things: ergonomics and features. In other words, […]

New Office 365 feature for more secure email

Most of us like to think we’d never click on a suspicious link in an email. But the fact of the matter is this is one of the most common ways a business is hacked. We’re all human of course, and we make mistakes. Yet now Microsoft is trying to prevent this. Here’s an inside […]

5 design ideas to revamp your website

These days, it’s almost impossible to see a business that does not have a website. Even small businesses have taken to the Internet to find more customers and create an online presence. The problem is, with so many companies creating their own websites, yours can get lost in the shuffle. Luckily, a great web design […]

How to enhance your VoIP call performance

When considering a VoIP solution, many small business owners have a lot of reservations. What if the call quality is unsuitable? What if your staff struggles with the technology? What if you have to deal with the headache of installing an additional network? All these assumptions can prevent business owners from giving VoIP a try, […]

How to make the most out of your BYOD policy

There’s a lot of talk about BYOD policies these days. While most companies are more concerned with the security risks that go along with bringing your own device, far fewer business owners forget the productivity risks. Believe it or not, a poor BYOD policy (or lack thereof) can actually hurt your staff’s productivity. Here are […]

6 cool Windows 10 updates coming your way

Windows 10 is back again with more features for you to play with. With the Windows 10 Anniversary Update, changes to Cortana, Microsoft Edge, and many more are coming your way. What are these changes? How will they be useful to you? While we are uncertain if Windows users will be foaming at the mouth […]

How Virtualization helps with DR

When most people think of Disaster Recovery, the idea of Virtualization is likely far from mind. However, these two IT services are more closely related than the average business owner thinks. Virtualization can actually serve as Disaster Recovery Solution. Here’s a breakdown of how it does just that, and a few pointers to keep in […]

4 Security risks to consider with BYOD

Taking work home, or practically anywhere else, has never been easier. With personal mobile devices, your employees can access company files wherever they are. Bringing your own device (BYOD) has become a popular strategy for many businesses to conduct work more efficiently and flexibly. But this strategy is not without its problems. BYOD, if not […]