Blog

Tips for optimizing your mobile hotspot

Did you know you can keep your laptop connected to the Internet in areas without a Wi-Fi connection? All it takes is a portable, low-cost 4G router to make a private wireless network for their devices. These tiny devices are a great investment for employees working from the road, and we’ve got some tips on […]

Mobile devices in the field

Field workers. You see them every day. And you notice that they, too, use mobile devices, as now more than ever do they need to stay connected with their organizations to stay in business. This is where mobile performance management, a critical factor for any field worker to perform and finish tasks on time, comes […]

The management drawbacks of virtualization

IT managers turn to virtualization to effectively scale down on cost, boost efficiency, and maximize space in their server rooms. Yet, what they didn’t expect were the drawbacks involved in this technology solution. It’s therefore essential that you’re aware of the following management issues before going all in: Backup Incorporating a robust backup system in […]

4 things to do before deploying Skype

From instant messaging to video conferencing, Skype for Business offers many communication features many companies need to be productive. But before you start making calls on Skype, there are four things you should do to ensure crystal-clear quality. #1. Conduct a preliminary network assessment By conducting a comprehensive preliminary network assessment, you’ll be able to […]

Office 365: New security updates

Microsoft recently rolled out security updates to Office 365 for business and home users. These enhancements aim to increase safety when sending or receiving an email in Outlook, sharing links in OneDrive, and alerting users of possible malware infection. Files Restore in OneDrive Previously available only to Office 365 business users, Files Restore allows users […]

Smaller firms less likely to keep up to date on the basics that protect them

  Smaller firms less likely to keep up to date on the basics that protect them. On the never ending problem of cyber security, small firms often do not have any/much in-house IT support. As a consequence, they may be less likely to be able to make sure their software is consistently updated to reflect any patches released by the product’s maker.

Cyberattacks and the vulnerability of the small business

  Cyberattacks and the vulnerability of the small business You cannot go a day without reading about some big name company or even government agency being hacked and critical data being compromised. What you don’t see in the media is that most of the attacks happen to small firms, and that this is where a lot of the cybercrime is occurring.

Denial is not a solution: Something you owe your customers and your employees

  Denial is not a solution: Something you owe your customers and your employees Why do so many people procrastinate about making a will? Why is it so hard to get young people to buy health insurance? Because it is one of those “probably won’t happen--at least in the foreseeable future, and I‘ve got more interesting things to worry about or spend my money on” issues.

Limited investment capital and planning for trouble

  Limited investment capital and planning for trouble Small businesses often fail to take the time to make business continuity plans. One aspect of a business continuity plan involves developing plans to handle the loss of physical infrastructure and hardware.

Data Protection Laws and PIIs

  Data Protection Laws and PIIs Last week we discussed the overall concept of “Data Protection Laws,” which govern the handling and securing of specific data. While these laws are wide ranging, most of these laws reference Personally Identifiable Information (PII) This “refers to information that can be used to distinguish or trace an individual’s identity, either alone or when combined with other personal or identifying information that is linked or linkable to a specific individual.