by Tom | Nov 6, 2017 | Blog
Data breaches are so common nowadays that you’re lucky not to see one in the breaking news section of any news outlet. How is your business preparing for the inevitable data breach of intellectual properly and sensitive information? You need to start considering...
by Tom | Nov 3, 2017 | Blog
Wouldn’t it be great if you could take advantage of a built-in security feature that could lock down your Google services in the event of a potential data breach? Thanks to attacks on high-profile users, Google is now offering this service to those who are at...
by Tom | Nov 1, 2017 | Blog
Google Chrome is the most popular web browser in the world, and for good reason. The browser has many useful features, largely due to the user’s ability to install ‘extensions’–applications that add to the browser’s functionality or the user’s experience. Once...
by Tom | Oct 30, 2017 | Blog
VoIP, or Voice over Internet Protocol, has become the only practical choice for a forward-focused business’ telephony needs. Any one of those who have adopted it could share a reason that they leverage it. But what is VoIP, really? How does it work, and why is it so...
by Tom | Oct 27, 2017 | Blog
Imagine what it would be like to discover that your website was suddenly redirecting to content that was decidedly more… adult… than what should be representing your business. For a company in Phoenix, Arizona, this was the unfortunate reality after they...