Blog

Warning: WannaCry Ransomware Outbreak

May 12th, 2017
Warning: WannaCry Ransomware Outbreak

News outlets and cyber-security firms are reporting a massive outbreak of ransomware infections worldwide, in countries including the US, UK, Russia, China and others. Many hospitals across England and Scotland have been attacked and taken offline.

The ransomware instance called WannaCry and variants has been newly detected in tens of thousands of instances by cyber-security firm Kaspersky.

Alert – Google Docs phishing attack

May 8th, 2017
Alert – Google Docs phishing attack

If someone invites you to edit a file in Google Docs be vigilant — it may be spam from a phishing scheme that began spreading quickly last week. As detailed on Reddit, the attack sends targets an emailed invitation from someone they may know, takes them to a real Google sign-in screen, then asks them to “continue to Google Docs.” But this grants permissions to a (malicious) third-party web app that’s simply been named “Google Docs,” which gives phishers access to your email and address book.”

The Non-Negotiables of Small Business Backups

May 4th, 2017
The Non-Negotiables of Small Business Backups

Chances are you’ve heard the warnings before. You must backup your business data! As nice and necessary as these warnings sound, setting up a backup solution might be one of those tasks that continue to get pushed down your to-do list. And because of that, you might be questioning if you need a backup at all, or if the warnings are a little exaggerated.

What is Hosted VoIP (and Why Should You Care)?

April 26th, 2017
What is Hosted VoIP (and Why Should You Care)?

Consider this: What would your business look like if you had more flexibility to answer or make calls anywhere, anytime? With hosted VoIP, not only can you bring your office with you wherever you go, but you can also save money in the process.

Why you need to back up your mobile devices

April 20th, 2017
Why you need to back up your mobile devices

There was a time when mobile phones were used exclusively for calling and texting. Now, they can do so much more. Regardless of your level of tolerance or skill for managing documents in such a small gadget, mobile devices allow you to send and receive email, download and upload media files, store data, and even close business deals.

An essential checklist for WordPress users

April 19th, 2017
An essential checklist for WordPress users

Wake up. Take a shower. Get dressed. These are just some of the numerous tasks we do every single day. They may not be fun, but they are essential to our daily routine. Managing a website is very much the same. By going through the necessary steps, you can ensure the speed and security of your website.

How Small Businesses Benefit from Managed IT Services

April 18th, 2017
How Small Businesses Benefit from Managed IT Services

Have you ever heard the term, “managed IT services” and raised an eyebrow in confusion? This term is quickly becoming more well-known in the world of small business because of the enormous benefits that come along with it. So, what are managed services and how can they help your small business? Let’s take a look.

Firmware: the threat most users overlook

April 18th, 2017
Firmware: the threat most users overlook

For decades, one of the most foundational principles of cyber security has remained the same: Always update and patch your software. But for most people, hardware is exempt from this process. They think of hardware as nothing more than a vessel for software to occupy — and that’s totally incorrect.

Did Microsoft commit a security breach?

April 11th, 2017
Did Microsoft commit a security breach?

In case you didn’t know, Microsoft provides Office 365 users with a free document-sharing platform called docs.com. It’s a great new tool for publishing files intended for public viewing. The downside is, sensitive documents are published without the file owners’ permission.