Blog

Make use of your ancient computer

Do you remember the days when your computer was struggling to catch up with all the tasks you had at hand? We don’t blame you if you’ve already dumped your desktop for a slicker model, but in case you have one or more collecting dust in your storage room, here are some ways to make […]

Considering a New IT Provider? Consider These 5 Recommendations

Many of us know the feeling: a computer or laptop crashes, bringing productivity to a standstill. If you’re lucky, you have a tech-savvy friend or hard-working employee who will go the extra mile to try to keep systems in working order. Or maybe you know an IT professional who is available to diagnose problems and resolve major issues.

Azure is getting a new type of container

Virtualization has moved out of the server farms owned by big-name enterprises and onto the wishlists of small- and medium-sized business owners. As a subset of virtualization, container technology is benefitting from this commercialization and becoming more accessible to everyone. What are virtual containers? Virtual containers are isolated computing environments that contain the bare minimum […]

VoIP phishing: how scammers do it

Although many companies still use traditional phones, an increasing number rely on VoIP’s (Voice over Internet Protocol) multi-functionality, which allows employees to make voice calls, conduct video-conferences, and chat. Although many scammers send fraudulent emails to extort money or steal data from businesses, new ‘vishing’ campaigns are proving to be a more efficient way to […]

Grow your business with new Office 365 apps

Microsoft never fails to announce exciting new features for their products. In an effort to improve support for small- and medium-sized businesses, they introduced a series of new apps and enhancements for Office 365 during the Inspire conference in July. Some of the most notable upgrades include: Microsoft Connections Email marketing campaigns are a great […]

Are all hackers out to do harm? Not so fast

Newspaper headlines and Hollywood movies have influenced our understanding of computer hackers, but in the real world it’s not so simple. Some hackers are making tremendous contributions to the field of cyber security, it just depends on which hat they’re wearing that day. Take a few minutes to learn about white, black and gray hat […]

Stop using Google’s SMS sign-in

To ensure optimal security, two-step authentication is used. This requires a password as well as a unique six-digit code that is typically sent via SMS. The National Institute of Standards and Technology has voiced its concerns about this method and Google quickly responded by having users try an alternative method. Security was the main concern. […]

6 CRM best practices you need to know

Most companies have customer relationship management (CRM) software to help them keep track of contact information and purchase history. But having a large database is worthless if you’re not using it to build long-lasting relationships. To keep existing clients coming back and bring new ones in, follow these CRM best practices. Always update customer information […]

Ways to protect your company mobile devices

Mobile devices can’t accomplish everything that desktops and laptops can, but that doesn’t mean they’re not important to businesses. More and more employees are using smartphones and tablets to increase productivity and enhance collaboration. But before you adopt a mobile device policy, you must keep them safe from cyber criminals. Cyber criminals now have more […]