Blog

Apple’s 2nd 2018 product launch

Apple’s 2nd 2018 product launch

Don’t be surprised that Apple has a second product launch for 2018. For starters, the first one covered only two products: the iPhone and the Apple Watch. Were there no new iterations for the iPad and MacBook? Apple’s announcement on October 18 gave us a teaser of an answer: “There’s more in the making.” Read […]

Protect your browser, protect your business

Protect your browser, protect your business

Any successful small- or medium-sized business today must do two things to thrive: digital marketing and network security to keep its data safe from cyber attacks and other forms of data loss. When it comes to security, browsers are no exception. In small- and medium-sized businesses, some 50 to 150 workers access the net daily […]

Top reasons for technology business reviews

Top reasons for technology business reviews

Businesses need technology to be profitable and productive. But not all technologies are capable of delivering on their perceived benefits. To make sure your investments are still worth keeping, you need to perform technology business reviews. What is a technology business review? A technology business review reveals the strengths and weaknesses of your company’s IT […]

Google Pixel: An iPhone competitor

Google Pixel: An iPhone competitor

Although Google released its first high-end smartphone later than Apple and Samsung, its mobile devices have consistently been top performers. The latest version of its Pixel phones are out and there’s a lot to like for business users. Models and pricing The Pixel 3 comes in two models, each with two price points depending on […]

Containers: Setting the record straight

Containers: Setting the record straight

Although both container and virtualization applications allow users to divvy up software and hardware more efficiently, containers have many advantages over virtualized machines. There are a number of misunderstandings though, and it’s time to set the record straight. Containers are made up of the bare minimum hardware and software requirements to allow a specific program […]

How SMBs can prevent VoIP eavesdropping

How SMBs can prevent VoIP eavesdropping

As a business owner, you should be aware of the different cyberattacks that your company faces. One of these is voice over internet protocol (VoIP) eavesdropping. As cybercriminals constantly find new ways to infiltrate your business and steal critical data, now’s the time to implement the proper defenses for your VoIP phone systems. Change the […]

How Office 365 deals with phishing attacks

How Office 365 deals with phishing attacks

Microsoft not only builds robust productivity solutions for its customers, but it also prioritizes their security above all else. This year, the company invested a lot of money to protect Office 365 subscribers from increasingly sophisticated phishing scams. Read on to learn more about what they did. Effective anti-phishing solutions must be able to recognize […]

Cortana commands everyone should know

Cortana commands everyone should know

Not yet using Microsoft’s voice-activated personal assistant, Cortana? You’re missing out on some beneficial, hands-free functionality, like launching applications, making dinner reservations, and more. Try the following commands to make the most out of your virtual assistant. Hey, Cortana Before asking her to do anything, we need to get Cortana’s attention by clicking or tapping […]

What exactly is proactive cybersecurity?

What exactly is proactive cybersecurity?

Most managed IT services providers (MSPs) promise “proactive” cybersecurity consulting. Businesses large and small embrace the idea of preventing cyberattacks and data breaches before they happen, and MSPs themselves would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cybersecurity means, so let’s take a minute to go […]