Blog

The 4 Mythic Characters of IT

The 4 Mythic Characters of IT Company owners often view IT through the lens of headache cure or damage control. And yes, when you’re dealing with the pain of unstable systems built on outdated equipment, all you want is relief. But when you only look to your IT team for palliative care, you may miss the opportunity to tap some…

Read More icon

Crypto Ransomware Threats: A Growing Concern

Crypto Ransomware Threats: A Growing Concern We just wanted to warn our community about some virulent ransomware attacks that are currently circulating. At this point, none of our clients have been affected, but businesses in many industries (including banks, hospitals, and government institutions) have. The fallout has included loss of money, time, reputation, and public trust. "Locky," "Robin Hood," "Bart"....you…

Read More icon

How to Encrypt Your Mac With FileVault

What is FileVault? FileVault is a data encryption software that is included in all Apple computers (OS X 10.7 or higher). When FileVault is enabled, all the data on the computer is locked until a password is entered, meaning all data is safe from unauthorized users. Why Use FileVault? Enabling FileVault is a good protective measure to have in place,…

Read More icon

Beware the SEO Scam Artists

Beware the SEO Scam Artists! If you run a small business like we do, you probably receive countless emails pushing SEO services. Many will make rash promises like "Rank Number 1 on Google!" or "Achieve 1st Place Ranking!" If you're not familiar with these claims, you may be tempted to contact these companies and hire them to assist you. Restrain…

Read More icon