Our Insights

Valuable information we share.

How Do I Get Rid of My Old Computer Equipment?

on Jul 3, 2018 9:55:17 AM By | Bruce Waite | Tips
Do you have an old computer equipment graveyard? I’ve been to many new client’s offices only to be asked, “how do I get rid of all this junk taking up an entire storage room?”. We appear to have a habit of believing that at some point, that old computer, monitor, set of cables or printer may come in handy. And you definitely cannot throw electronics out in the trash. So, we stack them up and close the door.
Read More

Protecting your Backups from Ransomware

on Jun 22, 2018 10:48:02 AM By | Nino Vales | Ransomware Backup
Ransomware scans network locations where the infected user has read and write access. Files under documents, desktop, and the shared folders you have access are examples of locations vulnerable to getting encrypted. Imagine if an administrator account or someone using an account that has full read and write access to the server gets infected. Easily, everything on the server and the network will be affected. It can halt the operations and affect the productivity of not just one person but the entire organization.
Read More

Risks of Unsecured Remote Desktop Connections

on Jun 18, 2018 11:14:58 AM By | Nino Vales | Remote Desktop
The ability to connect to your work place computer or remote desktop server remotely provides an added productivity to some employees. However, the risks of having this incorrectly configured outweigh the convenience it provides.
Read More

What is Microsoft 365 and how do I know if it's a fit for my business?

on Jun 18, 2018 11:12:17 AM By | Glenn Kemp | Cloud Microsoft 365
Almost every small and mid-sized business (SMB) owner is being inundated with information promoting cloud this or that, making it nearly impossible to determine who or what to trust. After all, deciding to migrate to the cloud is often fraught with risk and uncertainty, leading many business owners to stick with what they know. Often, what they know and are comfortable with, is a file server installed in the secure confines of their office. This is a tangible investment in purpose-built hardware running Windows Server OS, a topology referred to as a “client / server network”. In this mode of network, which has been around since the 70s, each computer connects to the local server for access to files and applications. This centralized way of computing has served us well, but the emergence of cloud computing has turned the model upside down. I would describe cloud as decentralized computing, opening a seemingly endless array of servers and services for computers and other devices to connect to. This can be empowering, but at the same time, dangerous if not conceived and designed with security and manageability in mind. Another important consideration is how analogous the devices become connected to this cloud network. Collaboration and sharing of information should be a paramount concern; moving to the cloud without easy access to shared data is destined to fail. The more homogeneous security and collaboration is, the more complete the cloud solution will be.
Read More

Three easy ways to make your business more efficient using Web APIs

on May 31, 2018 4:03:04 PM By | Glenn Kemp | Cloud Web API
As more and more small and mid-sized businesses migrate application workloads or whole environments to the cloud, I am seeing several trends emerging. The maturity of cloud computing is allowing many organizations to stake their claim and build out significant presence. Salesforce, HubSpot, Office 365, and Xero are common services that business may subscribe to, but you are very likely creating separate silos of data for each one.  In fact, you may already have two or three copies of client data floating out there – keeping each of these up to date individually is a big challenge.
Read More

Seven Layers of Defense for Small and Medium Business Networks

on May 23, 2018 11:17:30 AM By | Bruce Waite | Network Security
Over the last several years, the threats to business networks in terms of hacking (denial of service attacks), malware (keyloggers and password stealers), ransomware (WannaCry, Petra, CryptoLocker) and viruses in general have grown exponentially.  And the recent introduction of Spear Phishing, targeted emails from what appear to be trusted sources, make it harder and harder for business to protect their networks and data. 
Read More

Cloud or Local Backups? Why not both?

on May 10, 2018 7:46:56 AM By | Nino Vales | Backup Cloud
A reliable backup does not have to be expensive or complicated. Backup storage evolved from punch cards to using the Cloud. The objective remains the same, protect your data from unexpected data loss or provide recovery from disasters.
Read More

Understanding Office 365 Updates and Channels

on May 2, 2018 8:27:41 AM By | Jason Miller | Office 365
A major benefit to Office 365 application subscribers is the automation of security updates deployment into the products that keeps common applications current and also includes controlled rollout of enhancements and new features into the suite. In this article, we will outline the Office update options available, and we will provide a quick tip that will help you change your Office update settings.
Read More

How much information is shared with your Facebook Apps and how to remove them

on Apr 19, 2018 12:56:08 PM By | Nino Vales | Facebook Social Media
How much do Facebook Apps know about you? Privacy has always been a concern when having a social media profile. Major platforms generally require your Full name, Email Address, and Date of birth before you can sign up for an account. That information will help verify your identity and ensure you are a real person and not a bot account.
Read More

Security Assessment as a Service

on Apr 12, 2018 3:28:51 PM By | James Poirier | Network Security
We lock our house when we go out; we lock our car when we park it; but is our network locked and protected from the bad guys when we are not looking? What about when we are looking?
Read More