Blog

Google Drive improves comment feature

Google recently launched a new feature on Google Drive that will improve collaboration. Users can now use a combination of Microsoft Office and G Suite while working with their teammates and clients. This update allows them to conveniently comment on Office files, images, and PDFs in the ‘Preview’ pane of Drive. Learn how you can […]

Password Basics That Are Still Ignored

 You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are sloppy with passwords.There are many ways data can be breached, and opening some link they shouldn't is one of the most serious security sins employees can commit, but today we’ll just talk about passwords.

Virtual desktops vs. Containers

Even if you’re aware of virtualized containers, it’s probably difficult to explain how they differ from virtual desktops. Thankfully, all you really need to understand is whether containers are the better option for your business — and we can answer that in under ten minutes. What are virtual desktops? Imagine all you have is a […]

VoIP Hardphones vs Softphones

You have just decided to use VoIP as your telephony solution, but now your technician is asking how you want to use it. Do you want traditional desk phones (hardphone) or software-based devices (softphone)? Read on to discover the benefits of each and which ones are most suitable for your needs. What’s a hardphone? A […]

Tips for using Outlook more efficiently

Outlook is arguably the best tool that businesses use to manage their email, set up meetings, and coordinate projects. It’s much more than a basic email program and includes features that help you organize your work, contacts, and business communications. Let’s take a look at a few tips you may have missed. Clean Up your […]

Are hackers using your PC to mine Bitcoin?

Cryptocurrencies like Bitcoin and Monero are so popular because they’re secure and potentially worth thousands of dollars. But investors and consumers aren’t the only ones interested in them. Hackers are using malicious tactics to steal cryptocurrency, and they’re doing it with something called cryptojacking. Hijacked hardware Cryptojacking secretly uses your computer to calculate complex mathematical […]

You’re Fired! Now Give Me Your Password

 "You're FIRED!" ( now give me your password)Losing an employee is not usually a good experience. If they leave voluntarily, you lose a valuable asset. If they have to be fired, you have the arduous task of the progressive discipline process and the final termination meeting.

Improve Business Productivity with Cortana

As an entrepreneur, you understand how essential time is. There is always a need to come up with new processes or search for new technology to keep your office organized. If you use Windows 10, you already have an underutilized tool right in front of you. To take advantage of Cortana, you should enable it […]

Virtualization best practices for newbies

The benefits of virtualization are so significant that deciding whether to jump on board is a no-brainer. It offers centralized IT management, faster hardware resources, improved business continuity, and reduced overhead costs. But in order to experience these benefits, there are a few best practices you need to consider. Conduct an assessment Evaluating your IT […]

IT Defense in Depth Part II

 

Defense in Depth Part IIIn our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses.