How Often Do You Really Need To Replace Your Hardware?

There has been a lot of debate as to what your hardware refresh cycle should look like. The answer tends to fall somewhere in the 2 – 4 year ran[...]

Keep Reading

Ransomware Causing a Rethinking of Disaster Recovery Importance

Many companies are having to re-think their disaster recovery strategies due mainly to the recent spike in ransomware attacks, but also because of mal[...]

Keep Reading

Hackers Can Spy and Take Screenshots with New Mac Virus

A recently-discovered virus targeting Mac computers is also being characterized as “backdoor spying software,” and which can covertly grab[...]

Keep Reading

Yahoo Data Theft –A Good Reason to Regularly Change Passwords

In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the rea[...]

Keep Reading

How to Stop Facebook from Listening to You Through Your Phone

Although empirical evidence that Facebook is listening to its users through the microphone settings available on smartphone apps for the social media [...]

Keep Reading

Is Your IT in the Cloud?

Understanding the Differences Between MSP and CSP and Why Your Small Business Needs Both Cloud-based IT resources have been growing at a rapid clip as[...]

Keep Reading

10 Ways to Make the Most of Your Office 365 Migration

There are many ways beyond just moving to the cloud to maximize the benefits from your Office 365 migration. Many are aware of the basics in terms of [...]

Keep Reading

5 Ways to Make the Most of Employee Social Media Time

A June 2016 survey conducted by Pew Research Center showed that 77% of the 2,003 surveyed American workers reported that despite workplace policies li[...]

Keep Reading

Using Two-Factor Authentication to Address Workplace Cyber Threats

Two-factor authentication (2FA) – or, Multi-factor authentication (MFA), as it’s becoming increasingly known – is perhaps the most d[...]

Keep Reading

Hacker Exploits Extend to iPhones and iPads, Can Access Your Data and Location

iPhone and iPad vulnerabilities, or zero-days exploits allow hackers to access any and all data, know your location by GPS co-locating, and also be ab[...]

Keep Reading

Partners