Our Blog

Multi-Factor Authentication

High-profile security breaches are on the rise and company information is being compromised. “Billions of people were affected by data breaches and cyber attacks in 2018 - 765 million in the months of April, May, and June alone - with losses surpassing tens of millions of dollars.” (Positive technologies) Most of these breaches occur when [...]

March 25th, 2019|Security|

Stop Phishing Emails and Malware in its Tracks!

Nowadays, businesses rely heavily on email as their main communication tool between other businesses and their customers. With over 270 billion emails sent and received each day, email is an important form of communication that we all use daily for our work and in our personal lives. However, inboxes are constantly under attack. Phishing emails [...]

February 26th, 2019|IT Services|

Do You Have an IT Disaster Recovery Plan?

Disaster recovery is an important topic in the IT world. Companies rely on their IT systems to conduct business. What happens if critical systems go offline due to a hardware failure, a malware infection, an operating system crash or a natural disaster? One hour of downtime can cost small companies as much as $8,000, midsize [...]

January 25th, 2019|IT Services|

If it Ain’t Broke, Don’t Fix it!

The philosophy, “If it ain’t broke, don’t fix it” can be very expensive when it comes to your IT. If you are relying on break-fix (as needed) IT services, you are probably wasting money and risking valuable downtime. The challenge is that it’s impossible to predict when something will break which could lead to downtime [...]

December 14th, 2018|IT Services|

How to Protect You and Your Business from a Cyber Security Threat

Simple Ways to Keep Your Information Safe Cyber-attacks are more common now than ever, and we want to make sure you are prepared if it happens to you or your business. Here are a few helpful and simple ways to protect yourself from Cyber Security Threats. Wi-Fi – Make sure your business and even your [...]

November 19th, 2018|Security|

Why Windows 10 is the most secure Windows ever

With Device Guard, Credential Guard, and Application Guard, Windows uses virtualization to provide unprecedented protection from malware and advanced persistent threats. Three years after its debut, Windows 10 is poised to overtake Windows 7 as the most popular version of the Windows operating system. Microsoft introduced virtualization-based security features – namely Device Guard and Credential Guard [...]

September 22nd, 2018|IT News|

What’s in the latest Chrome update?

Chrome 68 for Windows, macOS and Linux takes another step toward differentiating between secure and non-secure websites. Google this week released Chrome 68 for Windows, macOS and Linux, patching 42 security flaws, adding new APIs for developers and marking sites relying on HTTP as "Not Secure." Chrome updates in the background, so users can usually [...]

August 22nd, 2018|IT News|