Is your email sending out mass-mail spam messages? Have you ever received a complaint about sending unsolicited ads or obvious spam messages? Have you ever received bounced emails by the boatload that look like they have been sent from your own account, even though you know you didn't send them?

Published in IT Blog
Friday, 27 April 2012 11:59

Why Should I Safely Remove Devices?

If you've used a USB flash drive or other USB devices like cameras, smartphones, and external hard drives, you've probably seen Windows request you to safely remove the device as opposed to simply unplugging it from the PC when you are done. How important is this? Very.

Published in IT Blog
Wednesday, 25 April 2012 06:58

Your Company Social Media Policy Part 1

Social media has revolutionized the way people communicate online. Social media is where discussions are had and information is shared. Over the past few years, the world has seen a remarkable shift in the way people socialize and it is not going away.

Published in IT Blog
Monday, 23 April 2012 07:07

Mac Malware on the Rise

It looks like Mac users won't be getting a break from malware as another trojan is breaking out on OS X. In February, malware known as Flashback infected around 600,000 Macs. This month a new trojan called SabPub is making its rounds.

Published in IT Blog
Friday, 20 April 2012 07:45

Android OS on your Wrist?

Techies get pretty excited over neat new gadgets and integrating them into day-to-day life, so when we heard about Sony's new SmartWatch, it caught our attention. Will smart watches become the next thing in the not-so-distant future or will they become flops like New Coke and Betamax?

Published in IT Blog
Wednesday, 18 April 2012 07:48

Take Back your Bandwidth

"Almost 40% of enterprise network bandwidth is being consumed by recreational or non-business applications [facebook, linkedin, youtube]"
~Blue Coat Systems Survey

More companies are blocking video streaming sites such as YouTube and Netflix to improve productivity at work..

Published in IT Blog

When traveling with your trusty laptop or tablet, it's pretty common to find publicly accessible Wi-Fi networks that you can connect to, enabling you to surf the web. Where ever you are, whether it's a coffee shop, hotel, airport, or anywhere else, it's important to be safe about public surfing.

Published in IT Blog

Most people might not realize this, but a Microsoft Word Doc can retain a lot of information pertaining to the history of the document, your personal information, annotations, and other invisible elements. This can be a huge security risk! Read on to learn how to remove that extra information.

Published in IT Blog
Wednesday, 11 April 2012 06:13

3 Huge Benefits of Voice over IP

Voice over IP phone systems revolutionize voice communications for small businesses by providing plenty of big benefits. VoIP uses the Internet to send signals as opposed to standard telco phone lines. Let's go over a few major benefits that businesses see when they switch to VoIP.

Published in IT Blog
Monday, 09 April 2012 07:32

Do Employees Work Better from Home?

Technology today makes it easy for businesses to let employees work from home. Offering secure remote access gives employees the flexibility to work on the road, at events, or from home as if they were at their desks in the office. Is this good for small businesses?

Published in IT Blog
Page 1 of 2
IBM Business Partner Badge Microsoft Badge ConnectWise Badge SonicWall Badge