Network issues can be a tricky thing to solve. What may seem like the simplest of problems could actually be rather complex behind the scenes. Since its in our nature to take matters into our own hands, those curious to try and solve the issue themselves may turn to Google to try to locate a solution. But it’s important … Read More
The End is Coming for Windows 7
The end is coming for one of the most widely used pieces of technology in existence today! In less than a year, Microsoft will be officially discontinuing support for the operating system Windows 7 after nearly eleven years. If you’ve used any computer during that time, there is a very high probability that it was running Windows 7, considering … Read More
How To Protect Your Domain Names Integrity
In our everyday lives, we tend to make decisions based on the principle of least privilege. Our decisions related to standard occurrences are instinctively designed to provide ourselves, or those involved, with minimal access to the resources needed to get the job done. Ordering a pizza to your home? The delivery driver will only come as far as your front … Read More
The Truth About Smart Speakers
As we inch closer to the holiday season and great shopping deals arise, many of you may be considering adding smart functionality to you or a loved one’s home by purchasing a smart speaker such Amazon Echo or Google Home (for a comparison, check out our post How Smart is Your Home?). But in an age of always-connected devices, there … Read More
Why Fake News Should Be Taken Seriously
Most recently our Facebook feeds were filled with chain letters claiming that if you received a friend request from someone that it was an imposture that had created a fraudulent account and now you too may be affected and so on and so on and so on… Every other post on my feed was another chain letter – same as … Read More
How To Avoid Phishing Scams
How to avoid Phishing scams Remember when all those advertisements used to come in the mail to your house? We used to call it “junk mail” and immediately threw it away, never looking twice at it. Now instead of being delivered to your house and placed in your mailbox, it is now being delivered electronically to your computer or mobile … Read More
The Risks Of Having Admin Access To Your Computer
Often overlooked, but a highly effective and simple method to mitigate data security risk, is limiting end-user permissions. Especially for this post, we’re discussing limiting or removing altogether, local administrative rights. When it comes to assigning permissions within an organization, a best practice is to assign the permissions that are only necessary for end users to do their jobs. In … Read More
Why Your Business Should Consider a Hosted Desktop Solution
Does it make sense to keep replacing PCs as they age, or should you migrate to a Hosted Desktop solution? What is a Hosted Desktop anyway? In this week’s blog post we’ll attempt to answer those questions and help you come to a conclusion as to why your business should consider a hosted desktop solution. First, let’s explain what a … Read More
Cyberattacks, Phishing, and Ransomware
Cyberattacks. Phishing. Ransomware. These words sound like something out of a science-fiction movie, but as we face the ever-growing challenges of Cyberattacks, “Phishing and Ransomware” are becoming much more commonplace. According to the Webroot Quarterly Threat Trends September 2017 report, Phishing is the number one form of Cyberattack, and in 2016, 93% of Phishing attacks led to Ransomware. What does this mean? It … Read More
New Year’s Resolutions for Small Business Tech
Every year we make resolutions to improve ourselves: lose weight, travel the world and become more technically savvy! Okay maybe the last one didn’t make your list but it should! Here are some New Year’s resolutions to improve your use of technology, protect your data and help your business be more productive in 2018 giving you more time to look … Read More