Technology Guidance for Business Leaders

Subscribe to our blog to stay informed!

Outlook Email Inbox Organization and Management Tips

In the professional world everyone uses email, and its usually Microsoft Outlook. It’s a handy mailbox management tool, but many of us are now inundated with more emails than...


5 Benefits of Microsoft Office 365 for Remote Teams

Microsoft Office 365 is the cloud-based collaboration platform from Microsoft that offers all of the productivity software we’ve come to know and love, including Office apps...


Do Your Devices Have a Good Work-Life Balance?

Work-life balance has become a hot topic, thanks in part to Bring Your Own Device (BYOD) work policies, and the mobile devices that keep us digitally tied to the office 24/7.


Best Cyber Security Checklist for Your Business

Humans love to be comfortable. We'll always choose convenience over anything else! But when it comes to your cyber security environment, complacency can mean big problems. 


What Are Managed IT Services and How Much Do They Cost?

A Managed Service Provider (MSP) is an IT services company that assumes complete responsibility for the proactive support of a businesses IT environment. From small printer...


Six Hidden Gems in Microsoft Office 365

Microsoft Office 365 offers a vast improvement over the local Office suite installations of years past. We’re here to dig into some hidden gems that have recharged the...


How Phishing Affects Businesses

We've all received those emails from a Nigerian prince who will gladly give you $10,000 if you just help him complete a quick wire transfer. This old trick has been so played...


Don't Gamble with Regulatory Compliance!

It's hard for businesses to keep up with changing regulatory requirements, and as a leading IT consulting company we know that many of our clients struggle with priorities....


Protecting your Organization from Ransomware Attacks

During the holiday season, employees tend to do more “multi-tasking” – i.e. online shopping when at work. Which in the scheme of things should be no big deal.


How a Strong Cyber Security Posture Can Grow Your Business

You might not think that cyber security and attracting new clients go hand in hand, but as it turns out there’s a very strong correlation between the two.


What Is A System Administrator (SysAdmin)?

In the IT industry, there are a lot of terms that aren't well defined. This includes technicians who may be called an Engineer, Field Engineer, Technician, or a System...


How Much is Downtime Costing Your Business?

Everyone knows that downtime is not good for business, but what does “not good” mean to the bottom line?


How to Educate Your Employees on Cybersecurity

For most organizations, the biggest cyber security threat isn't an issue of having the latest and most sophisticated technologies.


How To Select the Right Phone System For Your Business

Having a phone system may sound quaint in this day and age of social media, messengers, live chat, email, smartphones, Slack, Trello, etc. However, sometimes there's nothing...


Cyber Security and Data Protection For Higher Education

In the past few years, higher education institutions have been frequently targeted by cyber criminals:


5 Technologies To Improve IT Resilience and Reduce Downtime

IT downtime is no joke.

Did you know that downtime can cost businesses up to an average of $9,000 per minute?  

And did you know that increasing uptime from 99.9% to 99.99%...


Still Using PostScript Type 1 Fonts? Really?

Are you still using postscript type 1 fonts?

We originally posted this article in 2011 and it's even more relevant today (in 2018)!

2021 UPDATE: Adobe is Ending Support for...


Differentiating Your Business in a Commodity Market: CEO Perspective

How do you go from interchangeable to invaluable - when everyone else offers the same thing that you do?


Updating Mac Keychain After a Password Change

Do you need to update your Apple Mac keychain after a password change? Here's how!


Why Two-Factor Authentication Improves Your Security

Hardly a week goes by where we don't hear about yet another company admitting to a data breach. A password alone is no longer enough to protect your online accounts against...


Business PCs vs Consumer PCs - What's The Difference?

We know what you’re thinking.

Why should you pay more for a “business class” laptop or desktop when you can get a consumer model for less from Best Buy, Staples or Amazon?


Top 5 Things You Should Do After The Equifax Hack

It's all over the news - Equifax suffered a massive data breach which compromised the personal information of as many as 143 million Americans. Here's the top 5 things you...


The 3 Biggest Risks of Running Unsupported Software

As you’ve likely heard by now, Microsoft has announced “end of life” for Office 2007 in October 2017. Are you at risk if you continue to use it? The short answer is yes, and...


Office 365 Password Expired?

To help protect your Office 365 account from the dastardly deeds of cyber criminals, it's good practice to periodically change your password — and use a secure (long) password


Is it time to rebuild your network from scratch?

Here's how 90% of the business networks I've seen have been built. Tell me if this sounds like you! You started with a fairly small, unsophisticated network. You probably had...


Can't Delete Email from iPad or iPhone?

Are you having trouble deleting email from your Apple iPad or iPhone? Here's a quick fix if you're getting an error message every time you try! 


How to Identify a Phishing Scam

Phishing—It’s not just about investment opportunities in Nigeria anymore! 


Using Technology To Reach Your Business Goals

Imagine for a moment you are suddenly inspired to build a new home...


How Proactive IT Services and Support Can Save Money

We are aware of the initial thoughts that run through the minds of business owners, which pertain to the skepticism of procuring ongoing network maintenance services when...


What Are Managed IT Services?

Managed IT services involve the proactive handling of IT assets. The asset will typically be managed by Managed Service Providers (MSPs). They manage IT assets for their...


Best Practices for Creating Apple IDs

An Apple ID is a user name used to shop the iTunes Store, log in to iCloud, buy from the Apple Online Store, and more. An Apple ID is also essential to managing apps on an...