Blog

Virtualization and disaster recovery plans

Preparing your business for every type of disaster is critical. Even if you weren’t affected by this year’s historic hurricane season, earthquakes, fires and power outages are ever-present threats to any business’s future. Virtualization might just be your ticket to surviving the next disaster. Virtual desktops In most offices, employees are still dependent on desktop […]

Office 365 users face new phishing scam

With the popularity of Office 365, hackers are trying to find new ways to exploit its users, and they’ve come up with a new idea: a credential-harvesting campaign that uses personalized spear-phishing mails as a tool. If you’re an Office 365 user and don’t want your account compromised, read on. What makes it different from […]

6 ways to flood-proof your business IT

Hurricanes Harvey and Irma have already caused billions of dollars in damages, but hurricane season is far from over. Experts are predicting that there will be five more major tropical storms through October, and if they present risks to your business, it’s time to establish a watertight disaster recovery (DR) plan. Here are a few […]

Useful features on the new Outlook.com

Along with a new, clean look, Outlook.com introduces improvements that will make you and your staff’s lives easier. A more convenient mail sorting system, easy-to-implement social media integration, and enhanced security features are some of the advantages users should be excited about. Easy elimination of unwanted emails Employees spend an excessive amount of time poring […]

Protect yourself from this Facebook threat!

Despite the apparent break from international ransomware attacks, hackers are still keeping themselves busy, this time using an adware campaign that could easily be one of their most cunning tricks yet. If you use Facebook Messenger, you need to read this. What is it? Little is known about the adware itself or those behind it, […]

Virtualization 101: Running Windows on a Mac

If you own an Apple computer, you might think it’s impossible to install Windows-based software on it. But with operating system (OS) virtualization, you can run any application you want and enjoy exciting new cross-platform features. Configure an entire machine with a few clicks With programs like VMware and Parallels, installing Microsoft’s OS on your […]

What are the advantages of VoIP?

As a small- to medium-sized business, you need to do everything that you can to keep costs down. If you’re still using traditional phone systems as your sole communication solution, a much more affordable VoIP solution is something you should consider. Here’s why. What is VoIP? VoIP, or Voice over Internet Protocol, is a technology […]

Locky-type ransomware is attacking systems

A new, Locky-type ransomware is currently infecting tens of thousands of computers worldwide. It uses the same code from the 2016 version to encrypt users’ files and it looks poised to cause another massive cyber emergency. Here’s everything we know so far. Quick facts According to a threat intelligence report, the email-based ransomware attacks started […]

The values of Amazon AppStream 2.0

Success is not just about putting in the hours, but also being adaptive and investing in the right tools to improve outputs. Keeping work confined to the office might have been adequate years ago, but not anymore. Today’s workforce is now more mobile than ever, which is why businesses are turning to remote access solutions. […]

What can users expect with Microsoft Edge?

Microsoft Edge has replaced Internet Explorer as the default web browser on Windows 10. Edge offers plenty of new features that optimize web searches and ensure a seamless transition from any web browser. Here is the rundown on some noteworthy features: Import favorites You can easily import the list of websites you’ve marked as favorites […]