Beware of these social engineering tactics

As the spectacle and competitive atmosphere of the Rio Olympic Games have drawn the world’s attention, hackers who use social engineering are inching closer to our private information. Although our systems may be prepared for the likes of malware and worms, social engineering is a different beast of its own.

Read more

How does Microsoft FindTime really work?

Theoretically, scheduling meetings should be virtually hassle-free. But in reality, simply agreeing on a mutually compatible time is often an impossible task. On top of hectic schedules, you have different departments that have their own time constraints.

Read more

Best practices for SMB Facebook pages

Considering the most recent stats of Facebook’s daily usage — an astounding 1 billion daily mobile users, to be exact — it’s time to take another look at your company’s page. Even if you’re actively managing your page, changes and updates are so frequent at the social media colossus that there’s likely a feature or […]

Read more

Two new tools for defeating ransomware

A simple Google search of “ransomware” returns just over 9 million results. So, too, does a search for “Three Mile Island,” the location of the late-70’s Pennsylvania nuclear meltdown. And while we don’t mean to equate the near catastrophe of the latter to having your company’s data hijacked by computer hackers, ransomware can in many […]

Read more

5 ways to get the most out of the latest fads

Have you seen folks wandering around downtown, staring at their phone like it was a map pointing them to a pot of gold? Or ordering pizza over a Facebook chat conversation with an awkward cashier? With some creative marketing and structuring, your SMB could be on the other side of those people’s phones.

Read more

What’s all the buzz about data?

If an IT consultant told you that backing up data is one of the most important things for your technical team to do well, you’d probably nod in agreement. But what if they suggested that your dirty data requires cleaning prior to utilization? One simple adjective like “dirty” may give you pause, and there’s a […]

Read more

5 tips to help deal with security headaches

Keeping your company data safe and secured is not an easy job, especially as cyberattack threats get more and more sophisticated every day. But fret not, there are a lot of simple solutions that can be achieved with almost any level of tech expertise.

Read more

5 new search and social media trends

In a day and age of constantly evolving internet technology, it’s our job to keep an ear to the ground at all times, because you just never know when something new might be making noise on the web. One area in particular where you hear constant clamoring is with SEO and Social Media methods, and […]

Read more

The latest WordPress release fixes major issues

Although WordPress is more secure than it used to be, outdated installations can be a potential threat to your website and the data that is hosted on the servers. In an attempt to shut down hackers before they can exploit vulnerabilities, the WordPress security team recently rolled out a new version that patches security loopholes […]

Read more

FREE eBook: A comprehensive guide on minimizing downtime!Download here
+