by Tom | Jul 28, 2016 | Newsletter
Businesses are volatile entities that can change drastically at any given moment. All it takes to eliminate data and cause disaster is an unexpected natural disaster, like a flood or fire, or a hardware failure that wipes out mission-critical data. The fact remains...
by Tom | Jul 28, 2016 | Newsletter
Mobile devices have grown extraordinarily popular in the workplace. Organizations find them to be of considerable value for staying connected and getting work done while outside the office. This trend has presented a serious risk in the form of network and data...
by Tom | Jul 28, 2016 | Newsletter
Thanks to the advancements of virtualization and cloud computing, many businesses are hosting key parts of their IT infrastructure off-site. While this move is great for mobility and productivity, it makes operations extremely dependant upon a working Internet...
by Tom | Jul 28, 2016 | Newsletter
Hackers of all shapes and sizes use brute force attacks to gain access into accounts and infrastructures, but do you know how they work and what your business can do to protect against them? Failing to understand brute force attacks could put sensitive information in...
by Tom | Jul 27, 2016 | Blog
It’s been almost one year since the release of Windows 10. Are you taking advantage of everything Windows 10 offers? Here are four of the best Windows 10 features that you’ll want to start using right away. Virtual Desktops If you’ve never used a virtual desktop...
by Tom | Jul 25, 2016 | Blog
You don’t often hear about mobile operating systems being vulnerable to security threats (desktop vulnerabilities usually hog the spotlight), but when you do, they’re usually major problems that you need to be aware of. One such threat is called “Hummer,” a trojan...
by Tom | Jul 22, 2016 | Blog
When you picture an old computer, do you see a giant machine that takes up an entire room? These days, people might consider even something like a CRT monitor and a device running Windows XP to be ancient. Yet, the oldest “computer” in the world may actually be a...
by Tom | Jul 20, 2016 | Blog
File storage is a staple in the office, and chances are that even your work desktop is jam-packed with files and folders that could use a bit of sorting. This might include moving all of your files to different locations, but you don’t have to move each one...
by Tom | Jul 18, 2016 | Blog
A vulnerability has been discovered that affects all versions of Microsoft’s Windows operating system, including the long-unsupported Windows XP, going all the way back to Windows 95. The vulnerability, called BadTunnel, allows attackers to directly bypass system...
by Tom | Jul 15, 2016 | Blog
In a world where mobility is king, it can be challenging at best to implement new solutions without first taking into account how they can affect your business’s mobility. Especially with the cloud gaining ground, companies have their eyes on mobility and the...
by Tom | Jul 13, 2016 | Blog
We’ve all ran into problems that weren’t easily solvable, even by technically-proficient people. In fact, it’s often the case that simple problems can be escalated far beyond where they deserve to be. Sometimes all it takes is a little outside perspective, and some...
by Tom | Jul 11, 2016 | Blog
Microsoft has been looking to cover more ground in the business environment by offering a new Technology as a Service (TaaS) offering, which will allow small businesses to purchase Surface products, accessories, and support for their devices, all with a monthly...
by Tom | Jul 8, 2016 | Blog
It’s well-known that publishers are a major component of an author sharing their work with the world, but recent innovations threaten to disrupt the status quo of the industry. Like many industries, the publishing industry has been changed significantly by the...
by Tom | Jul 6, 2016 | Blog
As the smartphone takes over many of our daily tasks, it can be annoying if we have to use a separate device to accomplish what we need to, like making calls on a different phone. Did you know that it’s easy to add a second phone number to your smartphone? There are...
by Tom | Jul 4, 2016 | Blog
In a recent hack attack, Twitter had 33 million user login credentials stolen. This is unfortunate, but not surprising; an incident like this routinely makes the headlines. Although, what is surprising is what this hack reveals about people’s poor password security...