In the IT industry, there are a lot of terms that aren't well defined. This includes technicians who may be called an Engineer, Field Engineer, Technician, or a System...
Everyone knows that downtime is not good for business, but what does “not good” mean to the bottom line?
For most organizations, the biggest cyber security threat isn't an issue of having the latest and most sophisticated technologies.
Having a phone system may sound quaint in this day and age of social media, messengers, live chat, email, smartphones, Slack, Trello, etc. However, sometimes there's nothing...
In the past few years, higher education institutions have been frequently targeted by cyber criminals:
IT downtime is no joke.
Did you know that downtime can cost businesses up to an average of $9,000 per minute?
And did you know that increasing uptime from 99.9% to 99.99%...
Are you still using postscript type 1 fonts?
We originally posted this article in 2011 and it's even more relevant today (in 2018)!
2021 UPDATE: Adobe is Ending Support for...
How do you go from interchangeable to invaluable - when everyone else offers the same thing that you do?
Do you need to update your Apple Mac keychain after a password change? Here's how!
Hardly a week goes by where we don't hear about yet another company admitting to a data breach. A password alone is no longer enough to protect your online accounts against...
We know what you’re thinking.
Why should you pay more for a “business class” laptop or desktop when you can get a consumer model for less from Best Buy, Staples or Amazon?
It's all over the news - Equifax suffered a massive data breach which compromised the personal information of as many as 143 million Americans. Here's the top 5 things you...
As you’ve likely heard by now, Microsoft has announced “end of life” for Office 2007 in October 2017. Are you at risk if you continue to use it? The short answer is yes, and...
To help protect your Office 365 account from the dastardly deeds of cyber criminals, it's good practice to periodically change your password — and use a secure (long) password
Here's how 90% of the business networks I've seen have been built. Tell me if this sounds like you! You started with a fairly small, unsophisticated network. You probably had...
Are you having trouble deleting email from your Apple iPad or iPhone? Here's a quick fix if you're getting an error message every time you try!
Phishing—It’s not just about investment opportunities in Nigeria anymore!
Imagine for a moment you are suddenly inspired to build a new home...
We are aware of the initial thoughts that run through the minds of business owners, which pertain to the skepticism of procuring ongoing network maintenance services when...
Managed IT services involve the proactive handling of IT assets. The asset will typically be managed by Managed Service Providers (MSPs). They manage IT assets for their...
An Apple ID is a user name used to shop the iTunes Store, log in to iCloud, buy from the Apple Online Store, and more. An Apple ID is also essential to managing apps on an...
Artificial Intelligence (AI) is no longer a distant concept or passing trend; it has become a powerful, ever-present force that’s reshaping...
As AI technology continues to break new ground, Microsoft Copilot 365 stands out as a transformative solution that is reshaping the way we...
In a time when the truth isn't always what it seems, the rise of 'deepfakes'—a fusion of ' deep learning' and' fake'—represents a major change in how...