Month: February 2017

Real-world audits: disaster recovery plans

Failing to stop a cyber attacker, or to pass a disaster recovery plan (DRP) audit could be the product of focusing your efforts on the wrong educational resources. Because no matter how many conferences you attend, or how many certifications you receive, nothing beats real-world case studies. If that’s what you’re looking for, a state …

Real-world audits: disaster recovery plans Read More »

Popular printer brands are prone to attacks

Do you have security measures in place for your office’s printers? By “security,” we don’t mean locked doors or watchful guards; we’re referring to security against hackers that use printers as a weapon. Despite many companies going paperless, printers are still essential in most offices. And based on recent reports, popular printer brands are targeted …

Popular printer brands are prone to attacks Read More »

Why sign up for the Office Insider program?

With Office 365, users can access the latest cloud productivity features available. But for those who want to get a leg up on Office features, opt for the Office Insider program. In a nutshell, the Insider program allows Office 365 subscribers to preview and test upcoming Microsoft builds. Business owners who are enthusiastic about technology …

Why sign up for the Office Insider program? Read More »

5 great ways to prevent cyber-attacks

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational aspects of our cyber-security would most likely put you to sleep before convincing you of our expertise. But if …

5 great ways to prevent cyber-attacks Read More »

Ready to get more value out of your business IT?

Get in touch today to find out exactly how we can help

Scroll to Top