Considering a Bring-Your-Own-Device (BYOD) Policy?

2019-08-20T17:32:54+00:00August 6th, 2019|Mobile Device Management|

As more and more employees and companies use mobile devices for work, more organizations are facing the question of whether to use company-supplied devices or implement a bring-your-own-device (BYOD) policy. For those considering how to implement a BYOD policy, a recent article written by Daniel Hein offers a great explanation of the 6 BYOD assumptions [...]

Mobile Device Management – What is it and how is it implemented?

2019-08-20T15:06:17+00:00July 23rd, 2019|Mobile Device Management|

Mobile Device Management (MDM) is simply a piece of software that allows your IT Staff to control a portion of your employee’s smartphone. No, it does not allow them to see your text messages or pictures. It does allow them to enforce policies for corporate information on smartphones and tablets. The purpose of MDM is to improve the [...]

Is Picking Out a Phone System Making Your Ears Hurt?

2019-07-18T16:01:59+00:00July 9th, 2019|Cloud Service Operation System, Mobile Device Management|

If you've been hearing about VoIP, Hosted, or Virtual phone systems and still have questions, you're not alone. Things have changed since the old phone systems that resided somewhere in the back of your office. Today, there are many more simple options for smaller businesses looking to increase their level of professionalism and availability. There [...]

Don’t Procrastinate Windows 7 Users, It May Affect Your Security

2019-07-18T15:37:15+00:00June 25th, 2019|Security, Strategic Planning|

Everyone is busy and sometimes you do need to push off a meeting or an email; totally acceptable. However, Windows 7 users are running out of time. Windows 7 will officially begin the 'End of Life' phase on January 14, 2020. Microsoft has roadmaps for all of its products and for Windows 7 it is [...]

Be On the Lookout: Robbinhood Ransomware

2019-06-11T20:59:14+00:00June 11th, 2019|Security|

Whether its ransomware, malware, phishing emails, it's in your best interest to be aware of the latest threats targeting companies and their computer networks. Recently, a ransomware named Robbinhood has been making rounds. Rather than being distributed through spam, this ransomware uses Trojans including hacked remote desktop services, emails with unknown attachments, or malicious websites [...]

Do You Have an Extra $25,000 Laying Around?

2019-06-11T14:59:11+00:00May 28th, 2019|Disaster Recovery, Security|

Ransomware does not discriminate. You might have heard horror stories when a company or even a city has had its data held hostage by ransomware. You might have even felt empathy, but chances are you probably also thought "It could never happen to me!". Sadly, this is wishful thinking these days, as we've seen businesses [...]

Ransomware: Don’t Let Your Company Be Held Hostage

2019-06-10T18:22:24+00:00May 14th, 2019|Security|

The productivity of your employees is paramount. Unfortunately, with a single mouse click, one employee could bring your entire company to a screeching halt. Even worse, your company could be held hostage to pay a substantial amount of money to return to business-as-usual. That's the definition of ransomware - a growing epidemic amongst small, medium, [...]

Prepping for a Successful Office Move

2019-04-09T20:36:38+00:00April 8th, 2019|Business Continuity|

As businesses grow and change, they are likely to experience frequent office moves. The success of all office moves is directly impacted by the effective management of the office information technology – an area where most small business owners and managers often don’t have a lot of confidence. From our experience in managing the technology [...]

Cybersecurity Tips for 2019: How to Spot a Phishing Email

2019-04-09T19:19:13+00:00April 2nd, 2019|Security|

Phishing is not a fun day on the water! Phishing emails lure you (the victim) into clicking on a malicious URL or email attachment so that you hand over your personal data. What is Phishing? Phishing is very similar to spending a day on an ocean or lake but instead of trying to reel in [...]

Cybersecurity Tips for Spring Break – Protect Yourself

2019-03-12T16:35:09+00:00March 12th, 2019|Mobility, Security|

Planning a trip? Getting ready to travel with your laptop for business or pleasure? As important as it is to deploy safe cyber practices while at home, it is even more important to be aware of cybersecurity risks while traveling. According to a TripWire survey, 51% of Americans believe that using personal devices on vacation [...]