Uncategorized

Are you wondering why no one is replying to your email?   What file type did you attach to your message? There are certain file types you shouldn't share via email.   The reason is that these file types can insert malware or viruses into the device or network, compromising security. Hackers and spammers send emails with these attachments to phish users and gain access to their systems and...

Read More

In this article, we outline the key areas to cover when changing IT provider. This is going on the assumption that the business has either: 1) A fully outsourced IT company is providing relevant IT services. 2) Internal IT department/staff that require 3rd party support for certain aspects of the technology function in the business. Step 1: what the new supplier should be asking: Multiple factors come into this decision...

Read More

Our in-house cyber security expert is now recommending local businesses act immediately to secure their IT infrastructure and online services.   A highly complex password and multi-factor authentication are now just basic security measures all businesses should have in place. Here are the three items you need to enforce across all of your business devices and IT services:   Conditional Access   Enforcement of strict cyber security policies in the Microsoft...

Read More

Managed Service Providers (or MSPs) don't always get a seat at the boardroom table when their clients are are putting together forecasts on a quarterly or yearly basis. Many providers are looked at as “fixers” - and not necessarily as useful, strategic planners that can help to drive the same conversation.   Here are 3 practical ways your MSP can help you forecast next year's IT costs...

Read More

Computers that have passed through the healthcare industry are some of the most valuable buys on the black market and dark web.   What should healthcare companies and institutions do with their old or spent hardware – that once contained patient data?   Improper disposal of sensitive information can potentially compromise thousands of patients and their most personal data.   When it's time for a system to be discarded, there are...

Read More

We all know that first impressions matter a lot. When it comes to new employees starting in your company, you have an excellent opportunity to make the transition into the new role as smooth as possible and impress them using technology.   In this article, we will discuss some of the ways we are helping local businesses just like yours create a smooth, seamless employee onboarding process...

Read More

With many of our mobile workforces now working in a hybrid environment or fully remote, technologies such as VPNs (Virtual Private Networks) have become invaluable when it comes to accessing company information, files and documents.   We are now seeing a growing trend among modern, forward-thinking companies where that are now ditching their VPNs in place for cloud file solutions such as Microsoft’s Azure file storage. Combined...

Read More

If you’ve been using Microsoft Teams for some time now, you’ll know how powerful it is for online collaboration between you and your colleagues. Teams have many features, and there’s one that you might not know about – that is the ability to make and receive telephone calls. It’s an additional bolt-on that can be enabled within the Office 365 environment – in this article. We...

Read More

Almost all workforce employees rely on an internet connection to get their work done. In the office or at home, it’s now more important than ever that you have stable, fast access to your cloud services.   In this article, we will be discussing three of the best ways to increase internet speed, reduce dropouts and breathe new life into your internet connection.   Consider hardwired   Without a doubt, the...

Read More