Over half of all web searches are also now conducted from a mobile device rather than a desktop PC. This has caused mobile devices to become more targeted over the past few years. As hackers realize they’re...
One of the most important applications we choose is our internet browser. When on a computer or a mobile device, we work in that most of the time because many applications are now cloud-based, so accessing them means...
While many companies have moved most of their workflows to the cloud, there is still a key component of office operations that is location-based. This would be employee computers.
The longer that malware sits on your system unchecked, the more damage it can do. Most forms of malware have a directive built in to spread to as many systems as possible. So, if not caught and removed right away,...
This week the US Department of Homeland Security predicts an increase in cyber attacks due to the evolving crisis in Ukraine. Such Russian-backed state-sponsored attacks will focus not only on our infrastructure and...
We are in the midst of a ransomware crisis, with the epidemic intensifying as we start 2022.
We are excited to celebrate our designation as a top-rated, managed IT services and security solutions provider in TechStak’s exclusive service network.
For the last post in my series on what I wish business owners knew about IT, I am going to discuss IT people issues.
After 30 years in the field of IT, I have a few things to share with fellow business owners about IT and this time its about MONEY!