Blog

Disaster recovery audit fail: A few lessons

Disaster recovery audit fail: A few lessons

In talking about disaster recovery plans (DPR), it’s best to illustrate with real-world scenarios to help you understand things better. They offer concrete examples of successes and failures, and you can learn a lot from them. Here’s an example of a DPR audit and the lessons it offers. Hosting certain types of data and managing […]

Virtualization containers 101

Virtualization containers 101

The affordability of cloud computing and virtualization are helping small businesses do away with in-house IT hardware. Virtual containers are the next step in that trend. They come with plenty of benefits and are becoming easier to manage every day. What are containers and why are they so popular? Virtual containers are like digital versions […]

Cloud-hosted or on-premises VoIP?

Cloud-hosted or on-premises VoIP?

Business communication is different from traditional landlines. Today’s buzzwords are internet-based phone systems or VoIP. Before upgrading your old phones, determine where you want the new system to be: in the cloud or on-premises? Installation and maintenance On-premises VoIP phone systems are installed in your office and typically managed and maintained by your own personnel. […]

How to disable nosy Windows 10 settings

How to disable nosy Windows 10 settings

Windows 10’s Cortana tries to be helpful by displaying accurate, personalized ads based on your online searches and spamming useful suggestions as you type. But this can start to feel invasive after a while. Here are some tips you can use to keep Microsoft’s watchful eye off your computer activity. Turn personalized advertising off For […]

A closer look at fileless malware

A closer look at fileless malware

To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal data or ruin its integrity. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic or IT/system administration tasks while leaving fewer footprints. Ultimately, your business could […]

Keeping track of your business online

Keeping track of your business online

Google Alerts lets you monitor the web for mentions of your name, your business, and even your competitor. It’s Google’s user-friendly content change detection and notification service. You only need to follow simple instructions to get alerts whenever you have new mentions on the web! Learn more about this revolutionary tool. What is Google Alerts? […]

iOS 12: Security settings to set up now

iOS 12: Security settings to set up now

Just updated to iOS 12, Apple’s latest software for iPhone and iPad? Have you checked out its new security and privacy settings? It’s a good idea to set these up right now so you can take full advantage of your device’s robust features. Set a stronger passcode iOS 12 now requires six-digit passcodes, and this […]

Manufacturers concerned about PC shortage

Manufacturers concerned about PC shortage

The world’s largest computer manufacturers are growing concerned about the shortage of computer chips. Even though the issue was reported back in September 2018, Intel is still having trouble meeting the demand. So, what’s the cause of the major PC shortage and what does it mean for businesses? Reasons for the shortage There are many […]

Why should I use private browsing?

Why should I use private browsing?

You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network where the exchange of information is often difficult to track. Here are some good reasons to “go incognito”. With the headlines about data breaches and cyberattacks greeting […]