22 March, 2021 Is Your Organization Prepared for a Ransomware Attack? Various reputable sources, including the United States Federal Bureau of Investigation, the Canadia…
4 March, 2021 Privacy Concerns: New Technology to Grade Meetings Through Surveillance of Attendees Like it or not, data collection technology is pervasive. Your online activities and purchases are t…
22 February, 2021 How SaaS is Changing IT Departments As software as a service (SaaS) tools continue to gain more popularity with businesses, it’s only n…
4 February, 2021 LibreOffice: An Open Source Alternative to Microsoft Office The phrase “open source”, as used in the title, can also be read as “free.” That is correct – there…
22 January, 2021 Teleworking: Information Security Essentials for Organizational Leadership Teleworking: Information Security Essentials for Organizational Leadership The COVID-19 pandemic f…
13 January, 2021 Free, Reliable Tools to Help You Protect Yourself From Identity Thieves There are many reputable free tools available online that will allow you to lower your chances of b…
6 November, 2020 7 Common Myths About Hypertext Transfer Protocol Secure (HTTPS) You Shouldn’t Believe Hypertext Transfer Protocol Secure (HTTPS) has surpassed Hypertext Transfer Protocol (HTTP) to beco…
14 October, 2020 10 Tips for Developing a Disaster Recovery Plan (DRP) Most businesses rely on information technology (IT) systems. Even a small business may have critica…
1 October, 2020 5 Ways an IT Provider can Save Your Business Money Outsourcing your IT department offers impressive benefits, such as improving productivity, increasi…