Blog

New Office 365 cyberattack on the loose

New Office 365 cyberattack on the loose

Phishing scams disguise malicious links and emails as messages from trusted sources. The most recent scam to watch out for almost perfectly imitates a trusted invitation to collaborate through Microsoft SharePoint. It’s a three-step attack that’s easy to avoid if you know how it works.

A Cybersecurity Webinar For SMBs, featuring Jeff Grace

A Cybersecurity Webinar For SMBs, featuring Jeff Grace

Small and medium businesses (SMBs) don’t have threat researchers. In fact, a large number of them don’t even have dedicated IT people or security professionals; instead, they rely on managed service providers to help them tackle the cybersecurity and data protection challenges they face.

4 Security risks of the BYOD strategy

4 Security risks of the BYOD strategy

Taking work home, or practically anywhere, has never been easier. The bring your own device (BYOD) strategy has become a popular approach for many businesses to conduct work more efficiently and flexibly. But this strategy is not without risks. BYOD, if not implemented correctly, can make your system susceptible to a number of attacks.

Perks of using dual monitors

Perks of using dual monitors

Many employees are uncomfortable using two monitors at their desk, so it’s no surprise that dual monitor setups aren’t as popular as single monitor setups. But working with two screens provides ways for employees to work more productively. Here’s a look at some of the main reasons why your employees’ desktops should be upgraded to two monitors.

Connect2Help

Connect2Help

For our managed clients, we've implemented a new tool that will allow us to provide you with even better service. You’ll see a blue and orange “N” in the bottom right-hand corner of your computer.

The “N” stands for NetEffect, and clicking it will bring up a box (see below) with useful information that our support team may ask you for over the phone – items like computer name and logon server.

What you need to know about e-commerce & AI

What you need to know about e-commerce & AI

Many business owners are looking to artificial intelligence (AI, or “machine learning”) for its potential to improve communications with their customers. It is predicted that by 2020, 85% of all interactions will originate from machine learning “bots.

The pitfalls of business continuity planning

The pitfalls of business continuity planning

Your service provider, tasked with looking after your company’s IT, has kept your business up and running for the past 10 years. Unfortunately, that kind of longevity in developing continuity plans can result in some providers overlooking or underestimating certain issues.

7 ways to more retweets

7 ways to more retweets

It can be discouraging for any business to post a thoughtful tweet in the morning just to see that it barely has any retweets by the end of the day. To maximize your tweets’ exposure, consider these 7 ways to increase your retweets.

Schedule your tweets

There is absolutely no point in tweeting out any content if your audience isn’t even awake for it.

How your business can prepare for VoIP

How your business can prepare for VoIP

Companies that want to stay ahead of the curve are switching to Voice over Internet Protocol (VoIP) solutions to drive productivity and mobility. To get ready for the upgrade, you need proper planning and network preparation -– here are the most critical considerations.