• Latest Ransomware Demand Successful: University of Calgary Pays $20K to Decrypt Sensitive Files

    Latest Ransomware Demand Successful: University of Calgary Pays $20K to Decrypt Sensitive Files

    When a business is targeted for a ransomware attack, paying the ransom can often seem like the most reasonable response to getting data decrypted and begin the process of restoration. The problem is, it isn’t always that simple. After all—cyber criminals are a criminal element, and just because they say they will follow through with […]
  • Soft Skills for Hard Problems: Essential IT Skills for Law Firms

    Soft Skills for Hard Problems: Essential IT Skills for Law Firms

    Important skills for IT professionals when working with law firms. For law firms, it’s incredibly important their IT staff can keep up and deliver given the details that a lawyer’s occupation requires. With this being said, here’s a look at what skills IT professionals need when working with a law firm. Meeting & Deal-Making Skills […]
  • Protecting Your Assets: Can Your Managed IT Handle It?

    Protecting Your Assets: Can Your Managed IT Handle It?

    Is your managed IT protecting your business assets? Protecting business assets is incredibly important when it comes to managed IT. Thankfully, we’re going to cover some of the more important issues regarding asset protection for managed business IT. With this being said, here’s a look at IT technology geared towards protecting business assets. Cybercrime: The […]
  • Does Your IT Company Protect Your Company’s Information?

    Does Your IT Company Protect Your Company’s Information?

    How safe is online data storage? Should you entrust your personal, financial and proprietary data to a cloud IT service? The answer to the first question is, yes, because cloud storage, among other things, employs data encryption. (More on this later.) The answer to the second question may be moot. Your organization may be subject […]
  • What Your Website Must Have

    What Your Website Must Have

    What every website must have is, as the French put it, a raison d’être. Your reasons for investing time, resources and money in a website go way past vanity publishing and into the realm of ROI. The latter stands for “return on investment,” and it is, coincidentally, the French word for king. If ROI reigns […]
  • Have I Been PWNed?

    Have I Been PWNed?

    How to bounce back from a breach in security. Nothing is worse than getting PWNed in a security breach; it exposes weakness in security and puts the customer in harm’s way. Thankfully, we’re going to cover how to bounce back after getting PWNed and a few steps for recovery. Here’s a look at bouncing back […]
  • Is Windows 10 Stalking You?

    Is Windows 10 Stalking You?

    Turn Off Keylogger to Stop Microsoft From Tracking Your Every Word As if it isn’t enough that Microsoft has forced Windows 10 updates upon us, it appears that the newest Windows operating system also has built-in features that allow it to record what you say and what you type. When you use Cortana, Windows 10’s […]
  • 10 Tips on Password Security for Businesses

    10 Tips on Password Security for Businesses

    Computer password security holds great importance for businesses in a wide range of industries. If hackers guess or gain access to passwords, they could potentially steal your company’s funds, read private messages or use customer data for illegal purposes. These tips can help you prevent such disasters: 1. Train employees to develop complex passwords and […]
  • 3 Technology Game-Changers That Improve Your Sales

    3 Technology Game-Changers That Improve Your Sales

    The lead generation landscape is quickly evolving. Once upon a time, your sales team was the go-to experts on your product or services. However, easy access to information online arms buyers with information that is pertinent to their decision to buy or not. Technology has empowered customers. It can empower your sales team as well […]
  • Attacks on Bangladesh’s Central Bank and What It Implies About Financial Cyber Security

    Attacks on Bangladesh’s Central Bank and What It Implies About Financial Cyber Security

    In February of 2016, a group of hackers managed to steal $80 million from Bangladesh’s central bank. Attempting to steal a billion, the hackers took advantage of the bank’s lack of firewall and second-hand $10 routers. The attack drew attention from the world both because of its links with past attacks and because of what […]
  • Replace Outdated Tape Backup With Reliable Cloud-Based Solutions

    Replace Outdated Tape Backup With Reliable Cloud-Based Solutions

    June 7 is the unofficial National VCR Day, a day designated to recognize a technology that was cutting-edge in its time. VCRs gained popularity when the home videocassette format was introduced, making the technology available to everyone. It’s estimated that billions of videotapes are still in existence, holding movies and memories, but VCRs are no […]
  • Congress has Taken Note of Ransomware

    Congress has Taken Note of Ransomware

    The meteoric rise of ransomware attacks are making waves in the tech community. Anyone who works in IT or web development has heard about this nasty form of malware. Ransomware has become such a concern that members of Congress have taken time out of their busy days to address it. What is Ransomware? In a […]