Blog

Scammers deriving new ways to scam via VoIP

Scammers deriving new ways to scam via VoIP

VoIP (Voice over Internet Protocol) makes business communications simple and inexpensive. However, scammers are still finding ways to exploit VoIP, such as through “vishing scams, a new type of phishing wherein fraudsters make phone calls, pose as a business or financial partner, and request private details. The best way to prevent yourself from being scammed […]

Tips on how to best use G Suite

Tips on how to best use G Suite

G Suite is Google’s powerful productivity and collaboration platform. The suite includes popular Google apps like Gmail, Docs, Sheets, chat and video-conferencing apps, and so on. Many people are already familiar with these apps, but even those who use it every day may benefit from learning a trick or two on how to further maximize […]

Safeguard your iPhone from phishing

Safeguard your iPhone from phishing

Phishing scams have been around for years, and they’ve gotten smarter with time. Recently, criminals have been targeting iPhone users through a voice phishing scam that makes the call appear like it’s coming from Apple Support. Fortunately, there are simple but effective tips so you don’t fall prey to this notorious scheme. If you receive […]

Single Sign-On: The key to user management

Single Sign-On: The key to user management

Making passwords can be tedious. From complexity requirements to minimum lengths, creating a password for each new account brings its own set of headaches. If this problem is reaching a boiling point, Single Sign-On (SSO) solutions can help. These techniques are secure, easy-to-manage, and do away with the need to manage a long list of […]

2019 – The year of crippling attacks…

2019 – The year of crippling attacks…

If you aren’t improving security, you REALLY should be.

Attacks on small and medium business have skyrocketed in 2018. The damage caused in each attack has become worse. It is extremely expensive to be hacked. Not just in massive lost productivity and cost to remediate but now there are legislative fees and requirements imposed for most breaches.

Top 7: Kick 2019 off right with some power strategy and tips on the top seven questions we get…

Top 7: Kick 2019 off right with some power strategy and tips on the top seven questions we get…

Why unique on every site? Here is a common example. LinkedIn had their password database stolen (true story!). Let’s say your LinkedIn password is the same one you use other places. Probably not the worst thing ever if someone got your LinkedIn password but if it’s the same as your banks password or investment account, they could empty out all of your money! And it’s NOT the bank’s fault.

Great uses for an old computer

Great uses for an old computer

It’s inevitable. Sooner or later, you’re going to have to replace your computer. But while it may not be as fast as when you first got it or as sleek as your new computer, your old desktop or laptop might still have a lot to offer— after upgrading it a little, that is. Here are […]