Our Blog

Fighting ransomware with virtualization

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with virtual disaster recovery solutions. Virtual […]

Meltdown and Spectre fixes cause problems

It’s been three weeks since one of the worst IT security vulnerabilities in history was announced, and consumers are still receiving mixed messages about how to protect themselves. We usually encourage users to install software updates as often as possible, but when it comes to Meltdown and Spectre, that advice comes with an asterisk. Unsecured […]

Why UPS is necessary for network equipment

Fire, flood, storm, and other disasters can lead to power failure and productivity loss. Using uninterruptible power supply (UPS) for computers ensures you never lose unsaved work, but without internet, you’re practically crippled. To avoid that dilemma, we highly recommend using UPSs for your networking equipment, including cable modems, wireless access points, and routers. UPS […]

Think before saving logins to your browser

There are a number of reasons you should be wary of saving your password to a digital platform. Just look at Yahoo’s data breach in 2013, which leaked passwords for three billion people. Even when your password isn’t compromised, saving it to a browser could have serious implications for your privacy. Why auto-fill passwords are […]

5 social media trends of 2018

To say that social media is a small part of our lives is an understatement. Platforms like Facebook, Instagram, Twitter, and Snapchat are now integrated into our lives like never before. But what’s next? Can social media’s involvement go any further? These upcoming trends certainly point toward it. Read on to learn more. The boom […]

Big gains for small-business IT in 2017

How many new technologies did your business adopt last year? Too many? Too few? You’ve officially made it through 2017 and there’s no better time than now to review which IT fads were worth investing in, and which ones should be left in the past. Look no further than our recap of last year’s most […]

Phishers use encrypted sites to scam

Just when you thought cyber criminals couldn’t get smarter, along comes a new scamming technique. Previously used for safeguarding browsing activity, encryption tools are now used by hackers in carrying out phishing scams. This means some fraudulent sites may have HTTPS on their address, giving users a false sense of security. How hackers use encryption […]

Identity and Access Management 101

Whether it be cloud, mobile, or on-premises, every technology you use stores certain confidential data that are accessed by your employees. So how do you guarantee the safety of said data from cyber threats like identity theft, phishing attacks and more? IAM is the answer. What is IAM? Identity and access management is a system […]

Facebook Messenger: What’s New?

Over 330 million consumers connected with small businesses via Facebook Messenger in 2017 alone, so it’s evident that the ‘phone call’ era is coming to a close. Since consumers now want constant, immediate online connectivity with their local car dealership, pizza joint, and other local businesses, it is only fitting that Facebook Messenger’s latest feature […]

Cybersecurity Essentials: VPN

Whether it’s because of government surveillance or cyberattacks, internet users are more concerned than ever about the privacy of their online activities. Unfortunately, security measures like firewalls and antivirus software can’t help you in this case, but there’s one that can: Virtual Private Network (VPN). What is VPN? Simply put, a VPN is a group […]