Blog

Improve Chrome with these 6 extensions

May 30th, 2016

2016May30_Browsers_BAccording to Statcounter’s April web browser usage report, Google Chrome accounts for over 60 percent of the market share. However, out of all those people how many are employing any of the truly helpful extensions offered in Chrome’s web store? The answer is almost certainly less people than the number of those who have problems that could be easily fixed by one of these extensions.

Early adopters share iPad Pro feedback

May 27th, 2016

2016May27_iPad_BYou may still be on the fence about whether or not to purchase an iPad Pro for your business. While you can find a lot of coverage on Apple’s latest tablet online, you may wonder what actual users think. Today, you’ll discover just that. CIO, a website that delivers the latest news and tips for IT professionals, recently surveyed 11 iPad Pro users to get their feedback.

Why Peter Pan’s cloud migration would thrive

May 26th, 2016

2016May26_Office365_BNot every business owner who migrates to the cloud achieves great results. As much as the service is touted with words like “freedom”, “productivity” and “collaboration”, realizing the full benefits of these words is not a given. So if you’re thinking about transitioning to the cloud, how can you ensure you optimize the technology for your business? Well, it all starts with your attitude before migration.

Aspects of virtualization: licenses

May 25th, 2016

2016May25_Virtualization_BWhether you only need a dozen, or a hundred, the process of deciding on and acquiring software licenses can be very frustrating. Many of us had hoped that cloud computing and virtualization would alleviate some of these headaches. Unfortunately, we’re not there yet, which is why it’s important to understand all of your licensing options when deciding on a virtualized environment — let’s take a look.

5 tricks for thwarting VoIP threats

May 23rd, 2016

2016May23_VoIP_BNot that long ago, VoIP services were a new and revolutionary concept. Nowadays, internet-based voice communication is commonplace among SMBs, which means it’s time to turn our attention toward improving their security. Without a thorough understanding of what is needed to protect your VoIP systems, you could be vulnerable to cyberattacks.

How business continuity plans can fail

May 20th, 2016

2016May20_BusinessContinuity_BLike all things man-made and otherwise, business continuity plans are not perfect. They too have pitfalls that can result in your business’s failure if not accounted for immediately. Don’t blame it all on the IT guy, as often times the way a system is designed can also have loopholes.

OpenNotes portal initiative gaining steam

May 18th, 2016

2016May18_HealthcareArticles_AA recent initiative to give healthcare patients access to the notes their doctor or clinician writes about their visit is continuing its meteoric rise across the country. OpenNotes began a few years ago by researching the benefits of allowing patients to have access to their doctor’s notes.

Are your site’s images hiding an attack?

May 17th, 2016

2016May17_Security_BUnfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content.

A more secure cloud-based Microsoft Office

May 16th, 2016

2016May16_MicrosoftWindowsNewsAndTips_BSMBs see a lot of benefits to utilizing browser-based software, but generally avoid implementation for privacy and security concerns. Microsoft has finally addressed these issues by allowing businesses to host Microsoft Office locally. Popular pieces of software that usually take up a lot of space can now be securely accessed through a private cloud.