Blog

Citrix features coming to Google Cloud

August 4th, 2017
Citrix features coming to Google Cloud

In an effort to build stronger relationships with major developers, Citrix worked with Google to get their virtual desktops running on Google’s cloud platform last month. This means certain Citrix products can be accessed by G Suite and Google Cloud users.

Better call quality with a dedicated circuit

August 3rd, 2017
Better call quality with a dedicated circuit

It’s very frustrating for businesses with hosted VoIP (Voice over Internet Protocol) to experience bad call quality. Hosted VoIP is supposed to be more advantageous than traditional phone or on-premises VoIP systems, but many providers still can’t seem to guarantee landline call quality when it comes to voice calls.

Tell Office 2016 and Office 365 apart

August 2nd, 2017
Tell Office 2016 and Office 365 apart

Microsoft delivers some of the best productivity tools for businesses worldwide. Office 2016 and Office 365 are the most popular software in the market today. And while both offer Word, Excel, and PowerPoint, there are some significant differences between each product.

Microsoft 365 unveiled

August 1st, 2017
Microsoft 365 unveiled

Microsoft has sold Office 365 and Windows 10 to businesses in various ways. While some business owners don’t mind purchasing the two solutions separately, others prefer one bundle that offers both. And that’s now possible with Microsoft 365.

Microsoft 365 combines Office 365, Windows 10 and Enterprise Mobility + Security into one solution, which will be available in two plans: Microsoft 365 Business and Microsoft 365 Enterprise.

Blockchain and healthcare: what to expect

July 31st, 2017
Blockchain and healthcare: what to expect

Blockchain is the newest technology to fuel the Silicon Valley hype train. Everyone is talking about the wonderful things it can do, but few have explained how it works in layman’s terms. Stay ahead of your competition with a crash course in this new and exciting technology!

What is blockchain?

Although the technology was first associated with Bitcoin and other digital currencies, blockchain is not exclusive to the financial sector.

Know these types of malware to stay protected

July 28th, 2017
Know these types of malware to stay protected

Computer threats have been around for decades. In fact, one of the first computer viruses was detected in the early 70s. Technology has come a long way since then, but so have online threats: Spyware, ransomware, virus, trojans, and all types of malware designed to wreak havoc.

Malware targeting MacOS steals bank logins

July 27th, 2017
Malware targeting MacOS steals bank logins

Although ransomware has stolen the limelight recently, there’s another type of cyberattack targeting your bank account. Thanks to some horrifying ingenuity, being infected by OSX.Dok can result in victims directly handing their bank account information to hackers.

Backup and Sync: Google’s new business tool

July 26th, 2017
Backup and Sync: Google’s new business tool

Businesses that store and process large volumes of data need a highly organized storage and backup system. Although there are various ways to do this — like keeping them on multiple devices or putting them on external hard drives and memory cards — these are not very efficient and can also be misplaced.

Have you used these 6 Gmail tips yet?

July 25th, 2017
Have you used these 6 Gmail tips yet?

Time is of the essence, especially for small- or medium-sized businesses. To keep up with your competitors, spending most of your day rummaging through your inbox won’t help. Use these Gmail tips and tricks and spend less time in front of the monitor and more time enhancing your bottom line.

Tips and tricks for avoiding IoT threats

July 24th, 2017
Tips and tricks for avoiding IoT threats

Internet of Things (IoT) devices have become more popular with businesses in recent years. This is largely because they can keep track of large amounts of information, analyze data patterns, and streamline business processes. But as you introduce more internet-connected devices into the office space, you may be exposing your business to attacks.