Our Blog

June 13, 2017

Get Your Documents out of the File Cabinet and into the Cloud

Does your business have numerous file cabinets stuffed with documents, making it hard to find the files you need? If so, you might consider storing your […]
June 13, 2017

5 Ways to Prepare for Employee Turnover in Your IT Department

The sudden departure of an employee can be disruptive to your business, but the disruption can be more serious if the employee is a member of […]
May 29, 2017

Has Your Practice Outgrown Your Shared Server?

Most practices quickly realize that they need a server to host their website, internal tools, backups, and other digital services. Initially, to save on startup costs […]
May 29, 2017

Defending Against Cybersecurity Threats in Your Hotel Room

Being on the road is typically a stressful affair. Travelers have to worry about making their flight connections or booking reservations to a hotel or restaurant. […]
May 29, 2017

Not Sure How to Back Up Your Data? Consider These Techniques

Data is a valuable yet vulnerable asset for companies of all sizes. To protect your data, you need to back it up regularly. That way, your […]
May 15, 2017

Don’t Let Your Business Become the Next Spear Phishing Victim

Spear phishing scams targeted at businesses have proven to be very lucrative for cybercriminals. For example, since January 2015, hackers have stolen over $3 billion (USD) […]
May 15, 2017

6 Ways to Make Your IT Security Training More Effective

Cybercriminals like to target the weakest link in companies’ security defenses — and that link is often the employees. But it does not have to be […]
May 15, 2017

WannaCry?

The WannaCry Ransomware has been all over the lately.  Here are the highlights: On Friday, May 12, 2017, the world was alarmed to discover that cybercrime […]
May 4, 2017

How to Set Up Two-Step Verification for Your Google Account

As the series of massive Yahoo! data breaches demonstrate, having a strong password is not always sufficient. Cybercriminals can hack into companies’ databases and steal customers’ […]