
One of the advantages of using Office 365 instead of a static copy of Office that is a one-time software purchase, is that you always automatically have the most updated copy of all the Office programs, like Outlook, Word, Excel, etc. [Read more…]

One of the advantages of using Office 365 instead of a static copy of Office that is a one-time software purchase, is that you always automatically have the most updated copy of all the Office programs, like Outlook, Word, Excel, etc. [Read more…]

The Consumer Electronics Show (CES) is always a fun look in the future of technology. Tech that has debuted at past shows included things like the Xbox, VCR, and digital satellite system. [Read more…]

Just because you’re using a cloud service from a well-known company like Microsoft, doesn’t mean it’s automatically safe from being hacked or losing data due to user error or malicious intent. [Read more…]

What are your business goals for 2020? For many businesses, increasing sales, lowering costs, and better serving their customers are three things on their list of goals in the new year. [Read more…]
![]()
Just because your network may be smaller, doesn’t mean it still shouldn’t get the same level of protection as a larger enterprise network. [Read more…]

When it comes to the security of your business data and how it can be accessed Active Directory Domain Services from Microsoft has been an industry standard in credential authentication and ensuring only those who should log in to your applications can. [Read more…]

One of the most common and effective forms of cyberattack is through phishing. Phishing generally comes in the form of an email message disguised to look legitimate, so that you’ll click a link or download an attachment designed to infect your device and network with malware. But the rise of texting and social media has caused these deceptive messages to invade our lives other forms too. [Read more…]

When computers first started popping up on desks, they were mainly relegated to the office. Then as technology started becoming a bigger part of our lives, PCs began migrating into homes, until many people have similar types of home networks as do small businesses. [Read more…]

The 21st century form of digital kidnapping happens when a ransomware code infects a computer or network, making the data unusable. The code is designed to encrypt the data and then send the victim instructions on what to do next, usually in the form of a popup on their computer. [Read more…]

A common theme is occurring in this digital age, which is the challenging balance between convenience and privacy. Smart devices that are voice-controlled have made our lives easier, but all that connectivity can also put you and your family at risk. [Read more…]