Blog

G Suite’s new updates

With Bring Your Own Device (BYOD) policy and a growing mobile workforce, business owners are looking for an agentless way to manage iOS devices, one that would be convenient and secure for both admins and employees. Thanks to G Suite’s latest feature, Basic Mobile Management, everyone can now work in peace. But that’s not all […]

New virus threatens virtual machines

One of the core principles of virtualized technology is the ability to quarantine cyber security threats easily. For the most part, vendors have been winning this security tug-of-war with hackers, but that may change with the resurrection of a long-dormant piece of malware that targets virtualized desktops. If your business employs any form of virtualization, […]

Let Office 365 help you save the date

Calendar sharing is one of those mundane yet vital components of effective scheduling. The task of sharing one’s calendar hasn’t always been easy, and many wonder why. Microsoft has recently improved upon its calendar sharing features in Office 365 for all users, and here are some of the reasons you should accept the latest advancement […]

Why you should update your SBC

Malware delivered via email should be the least of businesses’s worries. Aside from common malware, businesses have to protect their VoIP systems from call jacking, eavesdropping, and denial-of-service attacks. So how exactly can you protect your business from these serious threats? The answer: a session border controller (SBC) with the latest security patches. What is […]

Statistics for cyber security during 2016

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s sophisticated threats can leave immense impact, something that antivirus solution alone can’t handle. With that in mind, we’ve rounded up […]

2017 IT essentials: disaster recovery plan

Over the previous months, you’ve probably heard about new and disruptive trends like virtual assistants, smartphones, and automation technologies. Some of these IT solutions may even be placed on top of your business priority list. However, with floods, fires, and power outages just around the corner, disaster recovery and business continuity plans should always have […]

Group voice call on Facebook

With communication apps such as Skype, WhatsApp, and Slack aiming to conquer audio and video calling, what is a social networking giant like Facebook to do? In a move to enhance its already ubiquitous Messaging app, Facebook is all set to follow suite and occupy a space alongside some of the most dominant VoIP apps […]

iPads allow thieves to bypass lock feature

There’s nothing worse than hardware vulnerabilities that put even the most cautious of users at risk. We could lecture you about how even unimportant tablets with little to no personal information are still a security liability, but until Apple releases a patch to the iPad’s newest vulnerability, everyone who owns one is at risk of […]

5 safe bets for web services in 2017

The crystal ball certainly won’t be making an appearance anytime soon, so it’s time to start preparing for the far more realistic technology trends of the coming year. Investing in the right technology could be the thing that sets you apart from your competitors in the coming year, and all it takes is a little […]

Considerations for large-scale AWS migration

Migrating your business’s data, applications and other critical resources to the cloud requires time and a bit of money. Performing a large-scale migration to Amazon Web Services delivers many benefits and is a cost-effective solution that most businesses should adopt. Given its potential to increase your company’s efficiency, there are factors that need to be […]