Blog
Ransomware, a Growing and Destructive Threat
You boot your computer, and it tells you that your files have been encrypted, and unless you pay the perpetrator through an anonymous channel, you can’t get them back. If you hesitate, the files might start disappearing a few at a time. This is ransomware, one of the nastiest tricks that online criminals can pull…
Educating Employees on Cyber Security
Computer security training isn’t just a matter of giving employees information. Knowing best practices is important, but it helps only if employees understand that they make a difference. Talking about “viruses” which “infect” computers gives the wrong message. It suggests that attacks are just something that happens to computers, like catching a cold. The truth…
Microsoft’s LinkedIn Purchase: What It Means for Small and Mid-Sized Businesses
Microsoft’s purchase of LinkedIn has been hailed as a huge boon for LinkedIn shareholders and Microsoft’s reassertion of its dominance in the tech market. While investors and both companies should undoubtedly be rejoicing, small and mid-sized businesses just might have the most cause for celebration. How Microsoft’s LinkedIn Acquisition is Poised to Benefit Small and…
Small Business Owners Selecting An IT Firm
Although saving money on IT logistics and security may feel good in the short term, it is very difficult to hold that feeling when the unexpected catastrophe hits. It only takes a few seconds for a hacker to steal all of your proprietary information or customer data if you have an unprotected system. In those…
3 Approaches to Office 365 Email Migration
Thinking about an Office 365 email migration? Taking your office productivity applications to the cloud doesn’t mean you have to leave all your organization mailboxes on your local Exchange Server or with another email system. Making the migration move Whether you are planning to abandon your Exchange Server altogether or to go the hybrid route,…