Blog

End ransomware with virtual DR

Ransomware like CryptoLocker and WannaCry has become more sophisticated over the years. No wonder that more ransomware attacks are expected this year. To fend off these threats, turn to virtualized disaster recovery (DR) solutions. They’re your best defense against ransomware. Virtual DR Virtual DR solutions allow you to create point-in-time copies or “snapshots” of operating […]

What VoIP services can you choose from?

Forget about the days when your company used to spend a lot of money on long-distance phone calls to clients and partners. Voice over Internet Protocol (VoIP) technology allows people to place and receive free or cheap calls, and there are various options for individual users and business owners alike. VoIP comes in a variety […]

How to create a Facebook ad that sells

Your products and services won’t sell, no matter how exceptional they are, if no one knows they exist. That’s where advertising comes into play. Yet for a small business with a limited budget, an ad placement in traditional media is costly. But thanks to Facebook’s online platform, advertising is now more affordable. Why advertise on […]

Top security threats to financial services

Hackers go for the gold. This means that banking information makes for the number one target. These cyberattacks lead to the theft of large sums of money, undermine the economic stability of individuals and organizations, as well as destroy the reputation of banks and other financial institutions. When these incidents occur, the damage can be […]

Easy fixes to your Wi-Fi issues

From answering emails and using online productivity suites to browsing Facebook and streaming YouTube videos, a fast and reliable internet connection is a must. But what do you do when there are connectivity and speed issues? Here are some solutions to five of the most common Wi-Fi worries. Range constraints Wi-Fi works via radio waves […]

Why you should care about HTTPS

One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple as looking at your URL bar to check whether the URL string starts with “https” and whether there is a symbol of a closed padlock beside it. HTTPS Encryption When you […]

Disaster recovery audit fail: A few lessons

In talking about disaster recovery plans (DPR), it’s best to illustrate with real-world scenarios to help you understand things better. They offer concrete examples of successes and failures, and you can learn a lot from them. Here’s an example of a DPR audit and the lessons it offers. Hosting certain types of data and managing […]

Virtualization containers 101

The affordability of cloud computing and virtualization are helping small businesses do away with in-house IT hardware. Virtual containers are the next step in that trend. They come with plenty of benefits and are becoming easier to manage every day. What are containers and why are they so popular? Virtual containers are like digital versions […]

Cloud-hosted or on-premises VoIP?

Business communication is different from traditional landlines. Today’s buzzwords are internet-based phone systems or VoIP. Before upgrading your old phones, determine where you want the new system to be: in the cloud or on-premises? Installation and maintenance On-premises VoIP phone systems are installed in your office and typically managed and maintained by your own personnel. […]

Understanding Office collaboration tools

Office 365 is so chock-full of apps, it’s sometimes difficult to keep track of them all. Sure, you have the most popular tools like Word and Skype for Business, but there are three tools in the lineup that seem like they could be used the same way: Outlook Groups, Yammer, and Microsoft Teams. Read on […]