August 2019 Business Continuity Tip
Keeping Your Workforce Safe Everyday threats, such as natural disasters, workplace violence, disgruntled employees, or cyberattacks, put your workforce and operations at risk. You need to ensure that your company is prepared and protected should these threats occur. 1. Understand what sheltering in place means. Many people believe that sheltering in place means staying exactly where […]
Hiring a web host? FTC has security tips for small businesses
used with permission from FTC.gov by Lesley Fair Engage, connect, protect was the theme of a series of Small Business Security Roundtables the FTC sponsored last summer. We listened to businesses talk about the challenges they face in securing sensitive information and fending off cyber threats. We also heard that they want concrete advice from […]
5 Key Ingredients in Creating a Small Business Website
used with permission from SBA.gov by Marco Carbajo A website is an essential element for running a successful business. A business without a website can potentially lose out on great opportunities since potential customers can’t reach you, find you and learn about you online. Creating a small business website can lead to many different ways […]
Create a modern IT strategy as your CIO role evolves
used with permission from Tektonika (HP) by Rose de Fremery As an IT leader, your job is growing more challenging by the day. Your IT strategy must be sophisticated and agile, balancing digital transformation priorities with security imperatives—and you probably have to stick to a lean budget too. What are the non-negotiable priorities you absolutely […]
12 iPhone security tips for iOS 12
used with permission from Norton by Symantec by Nadia Kovacs Every year, like clockwork, Apple releases a new phone and a new iOS for all existing iPhones. This year, we welcomed iOS 12. This is a time of great excitement for iPhone users — new operating systems mean new features, gizmos, apps, and more. With […]
Windows 10 Tip: More choices for updates
used with permission from Windows Blog by Athima Chansanchai Thanks to the Windows 10 May 2019 Update, you’ll see fewer interruptions when Windows updates. Now you have the option to let Windows Update adjust active hours based on you device-specific usage patterns. We know that sometimes, updates can come at inconvenient times. So, now you’ll be […]
How WiFi 6 will revolutionize the way you work
Used with the permission of http://thenetwork.cisco.com by Jason Deign The new wireless network standard will get you more connected than ever. Handset makers at this year’s Mobile World Congress in Barcelona, Spain, were thrilled by the advent of fifth-generation (5G) mobile networks. And what made the development even more exciting was that it came alongside […]
July 2019 Business Continuity Tip
Mobile Phone Security Checklist Remember that good “device hygiene” is important to avoid degraded performance, but also to avoid security risks. Here’s a quick list of actions to periodically check to make sure your device is healthy and well-maintained. Digital cleaning: Remove any unused apps. Respect access: Review app permissions. Secured: Install or update anti-virus software. Locked: Turn on […]
Windows 10 Tip: Start, simplified
used with permission from Windows Blog by Athima Chansanchai If you feel like your life is too cluttered, some of you might find respite in the simplified Start layout that comes with the Windows 10 May 2019 Update. New Windows 10 users — those who have new devices, new user accounts and clean installs — will […]
Are you prepared for the end of Windows 7?
Windows 7 and Windows Server 2008 are popular and well-loved — and they’re completely unsupported after January 2020. Have you prepared to upgrade yet? When Windows 7 reaches end of life and end of support in 6 months, it will no longer be a secure, compliant operating system. Microsoft will no longer releases updates or […]
Comparing Wi-Fi 6 and 5G – it’s more than a good connection
Used with the permission of http://thenetwork.cisco.com by Stephanie Chan Why the two wireless technologies will be better together. So, you’re all prepared for the next innovations in mobility and looking for next-generation speeds and more bandwidth. But with all of the hype around both Wi-Fi 6 and 5G, what can each of technologies actually do? […]
Update your software now
used with permission from FTC.gov by Ari Lazarus We secure our valuables — our wallets, keys, and homes. We know that, if left unsecured, they can easily be a target for criminals. So it makes sense to think the same way about the information stored on all our devices. Computers, tablets, phones and other personal […]