fbpx

To make the most out of what we hope will be a gorgeous long weekend, we will be closing our office for the day on Monday, September 2nd. And as always, we’ll have technicians on call for all of our managed IT services clients, and you’ll be able to reach us by calling our office

According to FEMA, 40% of businesses hit with a disaster never recover, and this rate more than doubles for those without a business continuity plan. While the two are linked, a business continuity plan shouldn’t be confused with disaster recovery. You might have a great plan for getting things up and running after an event but

Why is Effective Business Continuity Management Important? Business continuity management (BCM) denotes how organizations plan for and respond to risks. Mission-critical functions must continue to run after disruptions such as bad weather or hackers. A business continuity plan documents how your organization will continue to operate after a natural or man-made disaster, severe market conditions

Mitigate Disaster with a Comprehensive Business Continuity Plan When you create a detailed business continuity plan, you can keep disaster from disrupting your operations. See how to get started here.   When disaster strikes, disruptions to your operations could negatively impact your construction projects, pushing them past the deadline and over budget. And it is

Have you heard the news over in Texas? Over 20 government organizations across Texas were targeted in a coordinated ransomware attack. That’s right… These government organizations have been added to the ever-growing list of major attacks on government organizations in Florida, Albany, Atlanta, and Baltimore. The threat of ransomware attacks on corporations, government, and yes,

Recently, news broke about the latest large-scale data breach to hit a major organization. Capital One Bank has announced that millions of customers across the US and Canada have had their personal information compromised in one of the biggest breaches to ever happen to a financial services company. This brief video courtesy of News24 discusses the

What You Need to Know About Android Malware Hackers are devising new ways to infect phones with malware. Learn about the latest attack on Android phones and how to minimize your risk of getting malware.  Since the first computer operating systems hit the market, malware has been a serious security concern. Today, malware can infect

 How to Use iOS12 to Instantly Share Information With Colleagues Want an easier way to communicate with your colleagues? Save time and reduce errors by learning how to instantly exchange information using iOS12’s share feature.  Beginning with Apple’s release of iOS8, it has been easier to share information, files and apps with others, including

Downloading Apps on Your Android Device: How to Use Your Computer Installing apps to your Android phone via your desktop computer (or other “unofficial sources”) is fast and easy. Learn the simple process right here.   One of the best things about Android devices is the fact that you can access and execute unique commands

Protecting Your Data from SHTML Phishing Data security is vital to any business. Learn how SHTML phishing works and how to minimize the risk of your data falling into the hands of attackers. Email phishing has been in the playbook of hackers since, well, email. What’s alarming is the scope in which criminals can conduct