SSL certificate and various tech icons and a computer

Website Hosting and Security in the Age of COVID-19

More than ever, your website is one of your company’s most valuable assets. As business moves increasingly online, you should be taking active measures to protect the integrity of your web presence. Here are some questions to ask yourself as you analyze your website hosting and security in the age of COVID-19. Is your website secure, updated, and supported by…

Read More icon
illustration of computers, a smartphone, a server tower, and a worker with a laptop

Remote Work Series: Laptop Provisioning, Management, and Safety

In the midst of a hard pivot to a remote work model, it's easy to become lax in the management of company devices--especially laptop provisioning. In fact, whether you're shipping out laptops to a slew of new hires or you're converting to a bring-your-own-device (BYOD) model, your IT team is bound to have their hands full. While COVID-19 has made…

Read More icon
illustration of two workers and a large computer monitor

Assess Your IT Systems After Going Remote

In the brave new world of COVID-19, remote work is the new norm. For many companies, the transition to remote work has involved a fast, hard pivot...often a painful one. The abrupt nature of this transition means that you may have not had time to prioritize the safe management of your information. Meanwhile, the word is out that many companies…

Read More icon

The 4 Mythic Characters of IT

The 4 Mythic Characters of IT Company owners often view IT through the lens of headache cure or damage control. And yes, when you’re dealing with the pain of unstable systems built on outdated equipment, all you want is relief. But when you only look to your IT team for palliative care, you may miss the opportunity to tap some…

Read More icon
ransomware illustration

Crypto Ransomware Threats: A Growing Concern

Crypto Ransomware Threats: A Growing Concern We just wanted to warn our community about some virulent ransomware attacks that are currently circulating. At this point, none of our clients have been affected, but businesses in many industries (including banks, hospitals, and government institutions) have. The fallout has included loss of money, time, reputation, and public trust. "Locky," "Robin Hood," "Bart"…

Read More icon
security tech worker

How to Encrypt Your Mac With FileVault

What is FileVault? FileVault is a data encryption software that is included in all Apple computers (OS X 10.7 or higher). When FileVault is enabled, all the data on the computer is locked until a password is entered, meaning all data is safe from unauthorized users. Why Use FileVault? Enabling FileVault is a good protective measure to have in place,…

Read More icon

Smart Methods for Password Creation

We all know it can be challenging to come up with secure passwords that will protect your data from online crooks. The crooks are, in fact, becoming more and more savvy with each passing year. For the best protection, you should choose secure passwords that comply with high standards of protection. Here are a few recommended methods that can help…

Read More icon

Watch Out for SEO Scams

Beware the SEO Scam Artists! If you run a small business like we do, you probably receive countless emails pushing SEO services. Many will make rash promises like "Rank Number 1 on Google!" or "Achieve 1st Place Ranking!" If you're not familiar with these claims, you may be tempted to contact these companies and hire them to assist you. While…

Read More icon