Blog

2
May

It’s of course best to do everything you can within reason and appropriate budget to avoid cybersecurity incidents at your business. However, you do need to be prepared to respond to a serious cybersecurity event, such as a hack or other breach. No defenses or planning can ensure 100% security. In the case of a […]

3
Apr

Email phishing remains one of the most prominent–and dangerous–forms of cyberattack. But as users adapt and efforts are made to increase awareness of the prevalence of phishing, attacks via mobile device have become more common. One of the reasons is that the user interface on mobile devices is necessarily simpler and more limited because of […]

15
Jan
password managers

One of the ways to handle lots of passwords today without using the same (or very similar passwords for all of your accounts) is to use a password manager. The idea of a password manager is that it will generate, retrieve, and keep track of long and random passwords for all of your accounts (and […]

15
Dec
g suite

One of the advantages of SaaS is that you get immediate access to updates to software (including bug fixes and new features) on a continual basis. One of the challenges is staying up to date with this innovation. With its broad set of applications, G Suite has a healthy stream of innovation to keep up […]

15
Nov
office 365

One of the advantages of Office 365 is that you get access to a lot of apps–including new ones that Microsoft bundles into Office 365 for free. Some of these fly under the radar and never get noticed or used. Here are 5 that you should be aware of. Teams Microsoft’s answer to Slack.Team’s is […]

15
Oct
ICANN WHOIS

It seems like the problem of spam is getting worse and worse. One of the reasons it can feel oppressive is the number of areas it can hit you: your inbox, your phone, even by text message today. Business owners get a lot of spam.  One of the best ways to limit this plague is […]