On Friday, May 12, 2017, a cyber attack hit 200,000 victims in at least 150 countries. That number has since grown as people returned to work Read More
Should You Restrict Local Administrator Rights?
Restricting local administrator rights is about culture as much as it's about technology. Users want local administrative rights so they can do just about anything Read More
Tips to Stay Secure During Tax Season
While you may be thinking about the next few months with apprehension and dread, cyber-criminals are simply overjoyed at the possibility of obtaining your personal information duri Read More
Cloud Computing for Business: How to Remain in Control
| February 14, 2017
Business computing is happening everywhere – at the office, at home, on mobile devices, in watches and cars. Consequently, the way we work is transforming rapidly.
As a business owner, you a Read More
Office 365 Business vs. Enterprise Licensing
Are you having trouble deciding between Office 365 Business vs. Enterprise Licensing for your organization?
In this blog post, we will discuss the differences between the Read More
2017 Tech Trends for Small Businesses
| December 14, 2016
2017 Tech Trends 1: Security
2016 has been an eye-opening year for cyber security. From the W-2 phishing scams to the WordPress security vulnerabilities; the growi Read More
Is It Time to Upgrade Your Legacy Systems?
If you’re unfamiliar with this phrase, a legacy system refers to outdated computer systems, programming languages or application software that is actively b Read More