Blog

IT Defense in Depth Part II

 

Defense in Depth Part IIIn our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses.

How to choose the right VoIP solution

Basic internet-based phone calls aren’t new to many of our readers. Skype has been around for over a decade and there are dozens of other free apps with limited features. Picking a voice over IP   (VoIP) solution for a small business is still a tricky prospect, though. Let’s take a look at what it […]

Microsoft updates Office 365 apps for Apple

Microsoft recently updated Office 365 for iOS and Mac to enhance user experience. Office apps are now better integrated into the Apple ecosystem, which means iPhone, iPad, and Mac users can expect a more seamless experience when creating, accessing, or storing Office documents. Co-authoring in Word, Excel, PowerPoint Apple users can now co-edit documents in […]

Facebook makes space for more relevant posts

Social media has proven to be very influential in shaping people’s lives, affecting everything from one’s mental health to people’s views on certain political parties. To limit this, Facebook has made a decision to limit the posts from business accounts on your News Feed to make room for more meaningful posts shared by your friends […]

IT Defense In Depth Part I

In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack.

5 things to do to your new laptop

Getting a new laptop can be very exciting. It guarantees a more seamless user experience with faster speed, more memory, and better battery life. But it’s all for naught if you don’t take certain preventive steps before using your new machine. Discover five things you should do before you start exploring your new toy. 1. […]

Fighting ransomware with virtualization

Ransomware takes your data hostage and demands a payment for its recovery. While it may seem like there’s no other choice but to pay the ransom, you should never give in to the hacker’s demands. Before the next wave of ransomware comes around, it’s important to protect your business with virtual disaster recovery solutions. Virtual […]

Azure virtual machines get a free upgrade

Virtualization is difficult to understand. The technology itself is complex, and the industry is dominated by vendors that the average business owner has never heard of. Almost everyone knows Microsoft though, and its virtualization platform just got a big speed boost that won’t cost users a thing — if they know how to take advantage […]

Understanding Office collaboration tools

Office 365 is chock full of so many apps that it’s sometimes difficult to keep track of them all. Sure, you have the most popular tools like Word and Skype for Business, but there are three tools in the lineup that seem like they could be used the same way: Outlook Groups, Yammer, and Microsoft […]

Data safety: The non-technical way

Keeping up with advancements in technology as a business owner is tough, especially when those advancements relate to information security. However, it doesn’t have to be. Here are a few physical security tips you can implement to protect your data before calling us! Cover up your webcam There must be some credibility to doing this […]