Back that Data Up!

March is here! And that means WORLD BACKUP DAY! Okay, maybe nobody else is that excited for it but we are! Backing up your data and confirming the validity of those backups is so important. What would happen if your computer crashed today? How many contacts or contracts would you lose? This can be a huge burden on small companies since losing even a single day worth of data may cost your company, not just money, but it’s reputation as well.  Validity of Backups  If you have some form of Continue Reading

Where is My Phone?

Where did your phone go? You had it right next to your bag and only looked away for a second! That is all it takes for a thief to swipe your phone. Depending on your security level that thief may not just have your physical device but also access to your bank accounts, shopping accounts, email, and pretty much your entire life. By following these 5 tips you protect yourself from physical and identity theft: Continue Reading

Who Makes Your IT Purchases?

This month we’ve been discussing the value of updating your current technology. We are using Medical Offices as our example, but in reality, this information is important to all small businesses. In this week’s blog, we will discuss the pitfalls of sticking your head in the sand by being resistant to change.  Let’s assume that everything we’ve said in previous articles about upgrading your technology resonated with you, and you agree 100% — now what? Continue Reading

Why the Break-fix Model Doesn’t Work

So, you may be wondering why the break-fix model doesn’t work. Grandpa always said, if it ain’t broke, don’t fix it. While we love Grandpa, that truism isn’t always true. Just like the customer is always right and other similar expressions, simply because people have been saying something forever doesn’t make it correct.  Still wondering why the break-fix model doesn’t work?  Break-fix fails: waiting to take action when something breaks before you fix it can end up being costly and disastrous in the long Continue Reading

Ransomware Is Alive And Well

By now, you’re likely familiar with the threat of ransomware, and hopefully that is through training and not experience. While ransomware may not dominate the headlines the way it used to, don’t get fooled into thinking cybercriminals have retired this attack – it is alive and well.   What is ransomware?   In case you’re unfamiliar, ransomware is a malicious software that blocks computer access until a ransom demand is paid. Ransomware has been around for a long time, in Continue Reading

How to Spot a Phish

Phishing scams have become one of the most common forms of cybercrime today. Millions of people fall for Phishing scams every day, you may even know some who has fallen for a phishing scam. Phishing e-mails are a great danger to not only your computer, it can also lead to having your identity stolen, or worse it could cause a massive security risk to your business. These e-mails are more concerning due to the fact Continue Reading

Business Evolution

Figuring out how to effectively utilize social media within your business can be a tricky task. On one hand, it’s critical for Marketing. On the other, it can be a major time suck. You’ll have to walk a fine line of utilizing the main players like Facebook and Instagram, alongside other lesser known social-related platforms to evolve your business and increase communication and productivity amongst employees and clients. We’re not going to spend time in Continue Reading

Ma! Did you make a new FB account?

Have you ever received a Facebook friend request from your mom even though she is already a friend of yours on Facebook? So, you call her up to make sure she didn’t forget her password again and just create a new FB page. Then, right after that, “she” sends you a video link saying you’re in a YouTube video. You think, “Well dang! I didn’t think she even knew how to use Messenger.” As the Continue Reading

Five Tips for Working in the “In-Between”

We’ve reached an in-between status of this quarantine. Businesses are starting to open back up (with restrictions), but a lot of employees are finding themselves in an awkward spot between working in the office and remaining at home. Doctors are utilizing video and tele-conference appointments but are holding office hours to see patients and perform “elective” surgeries. Companies are requesting that their employees work from home, if possible, but they’re relaxing requirements for coming back Continue Reading

Mischievous Malware

Unfortunately, malware is not a foreign term, in fact it’s pretty well known to anyone that uses a computer. There are several types of malware, as well as mediums in which you may receive it. So, before you click on that link for the free cruise you won, think about all of the personal data you could be giving away. First, let’s take a quick tour of the types of malware you may run into.  Viruses: These act Continue Reading