Blog

Security policies every business needs

When it comes to Internet security, a reported 87% of small businesses have no security policies in place at at all. And considering that employee error is one of the most common causes of an online security breach, it makes sense to have rules in place that your staff need to follow. So to help […]

Stay in operation with these BCP strategies

Power outages, disasters and other disruptions happen. And thousands of businesses around the globe are affected by them every year, with lost profits ranging into the millions, if not billions. So how can your business protect itself and stay open when the unexpected strikes? Here are five common business continuity strategies that many companies rely […]

5 Biggest Mistakes That All Leaders Make

Guest Post by Geoff Smart

Although everyone agrees that hiring is tough, most managers struggle with an even more prevalent leadership mistake. It’s an affliction as prevalent as the common cold, and one of the least recognized in the workplace today.

Gadget of the Month: MagicLight® Plus

The next time you replace a lightbulb, you can now pick one that will stream your favorite music and light up your life in your choice of over 16,000 colors, all with a tap on your phone.

You might have already noticed that some LED bulbs now include a Bluetooth or Wi-Fi controlled speaker.

Are You Ready for Windows 10?

For the past few months, we’ve been swamped with questions about Windows 10. If you’re wondering whether now is the best time to upgrade your system, here are a few things to think about.

First and foremost, if your organization relies on your computers in any way to make money or save lives, consider the risks carefully.

SECURITY ALERT: Dell Tech Support Scam

In late 2015, Dell warned their customers about more aggressive unsolicited calls from scammers claiming to be tech support from Dell. They even provide a link to a recorded call that one of their employees received from these scammers. That employee received 243 follow up calls from the scammers (from 14 different phone numbers) since she hung up on them.

5 different types of virtualization

Companies of all sizes are embracing virtualization as a way to cut IT expenses, enhance security, and increase operational efficiency. While the benefits of virtualization are self-evident, many people are still in the dark when it comes to the many different types of virtualization. Here, we’ll show you some of the most common virtualization methods […]

Avoid these common VoIP pitfalls

When a technology is released on the market that promises to cut the expense of your old technology in half, it certainly can raise some eyebrows. We all know, when a deal sounds too good to be true it usually is. So when it comes to VoIP, and its wild claims of radically reducing phone […]

It’s Time To Disaster-Proof Your Business

When and if disaster strikes, is your business going to continue to operate and cater to customers despite a possible long-term hardware failure or a network disruption? If you answer no or are not even sure what to do, you are part of a majority of business owners who have not considered disaster preparedness and […]

This small business was hacked. Are you next?

When it comes to the online security of their business, many SMB owners consider it an afterthought. They think their business is too small to be of any concern to cyber criminals, and there’s good reason for this mentality. How often are security breaches to SMBs listed in the news? Rarely. In fact, you may […]