Locking Down Endpoint Security
Mobile Devices on Your Network? Use Endpoint Security Software Mobile devices used for telecommuting can compromise your network. To keep your sensitive data safe, use[...]
Factsheet on Mobile Applications and Cybersecurity
FaceApp, the AI-powered photo editing app, went viral for quite a while until various experts expressed concerns about cybersecurity. In light of these concerns, we’ve[...]
September’s Free Online Microsoft Training
Every month, we host Microsoft Office and other technology training sessions. Our training sessions are completely free of charge and are available “on-demand”. Yes, you[...]
Small Business Tech Tips
When chosen carefully, technology can make your work life (and your employees’) a lot more efficient. But without the help of an expert IT company,[...]
Google Docs Being Used to Attack Users With TrickBot Banking Trojan
Watch Your Google Docs: Program Being Used to Disseminate TrickBot Malware Beware of any Google Doc emails you receive. Cyber attackers are using the word[...]
Happy Labor Day
To make the most out of what we hope will be a gorgeous long weekend, we will be closing our office for the day on[...]
Ready for Disaster? Tips for Creating a Smart Business Continuity Plan
Mitigate Disaster with a Comprehensive Business Continuity Plan When you create a detailed business continuity plan, you can keep disaster from disrupting your operations. See[...]
Technology Best Practices for Nonprofits: Questions and Answers
If you don’t mitigate risk and protect your nonprofit organization’s confidential data, you could face a costly data breach.
The End Of Windows 7
As of January 14th, 2020, Microsoft will be ending all support for their hugely popular Windows 7 operating system, which has technology professionals strongly recommending[...]