Blog

Best practices for SMB Facebook pages

Best practices for SMB Facebook pages

One point five billion people check Facebook every single day. That’s a lot of potential business for companies that take the time to manage and update their profile. There are lots of ways to simplify social media engagement that don’t require much time or money, but these six are our favorites.

5 Easy tips for preventing data breaches

5 Easy tips for preventing data breaches

Keeping your personal and professional information safe from cybercriminals is not easy. It takes constant vigilance and frequent training. There are dozens of simple tools and tips to help people with almost zero expertise stay safe online, but these five are our favorites.

Why you need Hardware-as-a-Service

Why you need Hardware-as-a-Service

The new flashy set of PCs your company just bought last year are becoming outdated, and you don’t have enough IT staff to maintain them. If this is your current situation, it might be time to consider Hardware-as-a-Service (HaaS), a pay-as-you-go model where you pay your managed services provider (MSP) a monthly fee to take […]

Make tech trends work for you! Here‘s how

Make tech trends work for you! Here‘s how

Have you seen folks wandering around, staring at their phone like it was a map pointing to a pot of gold? Or ordering pizza over a Facebook conversation with an awkward cashier? With some creative marketing and structuring, your SMB could be on the other side of those people’s phones.

3 Tips for Virtualization as a DR solution

3 Tips for Virtualization as a DR solution

One effective Disaster Recovery (DR) solution for small businesses that most people are unaware of is Virtualization. The former is a strategy used to recover your business after a disaster has struck, while the latter is a way for businesses to save money by running all their office PCs on a “virtual” server.

PhishPoint attack looks like SharePoint

PhishPoint attack looks like SharePoint

Have you ever received an email that claimed to come from a bank or government office when it obviously didn’t? It was probably a phishing scam trying to trick you into downloading malware. The most recent campaign duplicates a trustworthy Office 365 email and can fool even the most skeptical users.

Windows 10: Your PC, your way

Windows 10: Your PC, your way

The Windows 10 interface looks good and is quite intuitive, but something is still missing — your signature style. Microsoft’s premier operating system gives you the power to customize your device any way you like. So if you’re tired of your plain blue theme or if you’re starting to get annoyed with that notification sound, […]

What are the risks of BYOD?

What are the risks of BYOD?

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data.

The convenience of dual monitors

The convenience of dual monitors

Some things come in pairs, including glasses, shoes, and, for busy office workers, computer monitors. The concept of using two monitors at once is unconventional for some, but staying in familiar territory when it comes to working at a desk might not be best for productivity.