Blog

Advice from a failed disaster recovery audit

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways. […]

Vulnerabilities on WordPress websites

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running […]

Are your printers safe?

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise. One study reveals that at least 20 printer models are vulnerable to Distributed […]

How to get a sneak preview of Instant Apps

At its I/O 2016 conference, Google introduced us to Android Instant Apps. This built-in feature allows users to access a cloud version of an app without having to download it from the Google Play Store. While the technology isn’t yet available to the general public, Google is running a limited test of the technology for […]

3 Virtualization issues to watch out for

Although data storage is only one of the many ways to benefit from virtualized hardware, it’s still the most common use of the technology. Despite this popularity, virtualized storage is susceptible to a number of mismanagement catastrophes. We’ve outlined the three most common mistakes when utilizing this technology, right here. Poorly structured storage from the […]

Do VoIP-enabled offices even need handsets?

“Follow-me” features from VoIP vendors have revolutionized modern business telecommunications. Because internet-based phone solutions allow office workers to answer one phone number from multiple devices, companies can reduce costs and increase efficiency. But for all its certainties, VoIP may have you questioning one thing: Do you even need office phones any more? Question #1: How […]

Why you should be an Office Insider

To deliver unparalleled service, Microsoft tests products and features months before they’re released to the public. One of the ways they do this is with the Office Insider program, a voluntary Office 365 subscription that gives participants a sneak peek into future Microsoft developments. It also provides several benefits to business owners willing to take […]

What exactly is preventive cyber-security?

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cyber-security means, so let’s take […]

The latest on Microsoft Office for Mac

It’s official. Microsoft has just announced plans to bring support for add-ins to the Mac version of its Office Suite. This marks yet another step forward in Microsoft’s efforts to make the Mac version of the Office Suite more like its Windows counterpart. At the moment, this functionality is available for testing only by users […]

G Suite vs. Office 365

Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out innovative solutions that simplify the lives of users around the world, especially with G Suite and Office 365. This raises a question: Which is a better option for your business? Cost and commitment G Suite offers two […]