Small Business IT Services

How To: Private Firefox Browsing

Configuring Firefox for Maximum Privacy Firefox is a popular web browser that is known for its strong privacy features and customizable settings. If you want to configure Firefox for maximum privacy,...

Read More
Small Business IT Services

Why we need next-gen AV

Traditional antivirus (AV) is a type of security software that is designed to detect and remove malware from a computer or network. AV software works by analyzing files and other...

Read More
Small Business IT Services

Three reasons to dump your PBX

Three reasons to dump your PBXA final thing to consider is how you will support the extended IT infrastructure as you roll out WFH activities. Traditionally, your IT infrastructure would...

Read More
Small Business IT Services

Ransomware and disaster recovery plans

Ransomware and disaster recovery plansDisaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business–that...

Read More
Small Business IT Services

VoIP: Three productivity advantages

VoIP: Three productivity advantagesSo what do you get with VoIP technology that you can’t get from a PBX? Quite a bit, but we will just focus on the productivity aspect...

Read More
Small Business IT Services

BYOD and Federal Wage laws: Look out!

BYOD and Federal Wage laws: Look out!As most everyone knows, Bring Your Own Device (BYOD) is an approach wherein organizations allow their employees to use their own smartphones and other...

Read More
Small Business IT Services

BYOD goes far beyond IT questions.

BYOD goes far beyond IT questions.Most often we view BYOD policies as something initiated and overseen by IT. But that misses the broad-ranging impact of BYOD across several other functions...

Read More
Small Business IT Services

BYOD and Reimbursement Policies

BYOD and Reimbursement PoliciesThere is a great deal of discussion about the advantages and disadvantages of the policy of allowing employees to use their own mobile devices, primarily smartphones, instead...

Read More
Small Business IT Services

BYOD: The fine print matters

BYOD: The fine print mattersBYOD is the acronym for Bring Your Own Device to Work where “device” can refer to a laptop, tablet, or smartphone. Most frequently, however, the...

Read More
Small Business IT Services

What is network security?

There is more to it than installing some antivirus and buying a firewall.  Ready to get into the weeds?   IT and network security is often focused on keeping intruders out in...

Read More
Corporate Data Backup Service

Corporate Data Backup Musings (Update)

  Modern workplaces are proving to be more complex data environments than they were several years ago. The demand for enterprise data storage is rapidly growing as these workplaces advance their...

Read More
Small Business IT Services

Backup isn’t enough

Backup isn’t enough. To avoid downtime, your applications need to run on-demand from virtual machines backed up in the cloud. #cloudbackup...

Read More
Small Business IT Services

Natural Disasters Survival Guide Landing Page

All disasters have technology, people and process implications. Check out this Disaster Survival Guide to ensure that your business is prepared for all three. #dataprotection http://datto-content.amp.vg/web/dbok3c3ls5cmu ...

Read More
Small Business IT Services

There is a lot of collateral damage from a cyber attack. Are you prepared? http://datto-content.amp.vg/web/h7286jsg0ybg ...

Read More
Small Business IT Services

As mere mortals, some things are out of our control - e.g. other humans and the weather. Data loss is unpredictable, but how your business reacts to it doesn’t have...

Read More
Small Business IT Services

Mother Nature is an unstoppable force. Fires, floods, hurricanes, or blizzards, natural disasters happen and so does downtime. The good news? Protecting your business is easy. http://datto-content.amp.vg/web/cz6y78ckqi6s2 ...

Read More
Small Business IT Services

Why does successful cyber security require top down organizational change? http://datto-content.amp.vg/web/ckdrxy8oyd8jp ...

Read More
Small Business IT Services

Do you know that the #1 cause of data loss is human error? We can’t put all the blame on Patrick in Accounting. We’re only human after all. #infosec...

Read More
Small Business IT Services

Know the 5 areas in an organization that can be damaged by cybercriminals http://datto-content.amp.vg/web/ct823emouisdx ...

Read More
Small Business IT Services

Classic Patrick, he spilled coffee on the breaker panel after blowing a fuse. Goodbye office power! Accidents happen, so often in fact that power outages are a leading cause of...

Read More
Small Business IT Services

Working with robots? Then your data might be safe. If you work with humans, then you should give me a call about protecting your data from the guy sitting next...

Read More
Small Business IT Services

Enterprise Web Browser Security

Web browsers such as Chrome, Firefox, Edge, and a multitude of other would-be competitors are the primary means of your employees interacting with the outside world. In their default state,...

Read More

Why Do Hackers Target Small Businesses?

In the last few years, American small businesses have seen a sharp increase in cybersecurity threats. It used to be that their relative anonymity, unknown brand and limited financial resources...

Read More
Stop Data Leakage

Ransomware and disaster recovery plans

  Disaster recovery is a basic element of good continuity planning. Business continuity planning–in the case of schools, the better term might be organisational continuity planning– refers to the broad range...

Read More
Small Business IT Services

Ransomware and disaster recovery plans

Ransomware and disaster recovery plansDisaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business–that...

Read More
Managed IT Service

Cloud Computing for Small Law Firms

Cloud services help law firms meet client demands for convenience while keeping information safe and following regulations.   More and more law firms are moving into cloud computing to take advantage of...

Read More
Business Continuity Planning for your Small Business

What is Business Continuity Planning?

Trying to define business continuity isn't always easy.   Everyone seems to have a unique definition these days.  Depending on how your business operates, you may think about it a lot differently...

Read More
Phishing Attack Prevention

Phishing Alert: Ring Central Voicemail

Phishing attempts after sensitive information such as usernames and passwords aren't going anywhere.  Social engineering techniques and fake websites are compromising more businesses these days than technical flaws, exposing bank...

Read More
})(jQuery)