Blog

Pitfalls of business continuity planning

May 20th, 2016
Pitfalls of business continuity planning

Like all things man-made and otherwise, business continuity plans are not perfect. They too have pitfalls that can result in your business’s failure if not accounted for immediately. Don’t blame it all on the IT guy, as often times the way a system is designed can also have loopholes.

Image uploader security flaw discovered

May 17th, 2016
Image uploader security flaw discovered

Unfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about this vulnerability you’ll take the first step toward better protecting your content.

7 Ways to get more retweets

May 13th, 2016
7 Ways to get more retweets

It can be discouraging for any business to post a thoughtful tweet in the morning just to see that it barely has any retweets by the end of the day. Even after hours of compiling the best 140 characters your company can think of, are you still not getting any hits? There are many tricks to maximizing your tweet’s exposure and if your company’s Twitter account is hungry for retweets, consider using a few of these tactics to increase your chances.

Best tricks and shortcuts for Microsoft Word

May 11th, 2016
Best tricks and shortcuts for Microsoft Word

Microsoft Word has become synonymous with document creation in businesses, schools and pretty much anywhere that wants to create electronic text documents. Despite more than one billion users worldwide, several of its most useful productivity features are still unknown to the average consumer.

Server Administration 101: Temperature

May 10th, 2016
Server Administration 101: Temperature

In this day and age almost every business employs some type of server management. If yours is hosted locally, temperature management could mean the difference between running smoothly and running into the ground. Understanding how to properly cool your servers prevents data loss and ensures the longevity of your hardware’s life.

Turn your home into an office with VoIP

May 9th, 2016
Turn your home into an office with VoIP

So you’ve noticed that the work rate in the office has been slowing down lately. Perhaps it’s because the job is too stressful. Or maybe most of your employees live far away from the new office. Whatever the reason, it’s probably best to try something new.

The effective marketing tool you forgot

May 3rd, 2016
The effective marketing tool you forgot

When it comes to marketing, it can be tough to determine the most effective strategies. There are so many different ways you can try to lure customers to your brand: a free ebook, email marketing and press releases are few strategies often used. But how do you know what’s most effective? It all comes down to looking at data to see what works best.

4 different types of hackers

April 28th, 2016
4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little better.

Picking a mouse that you click with

April 26th, 2016
Picking a mouse that you click with

When you’re tired of using an uncomfortable mouse or struggling with your laptop’s trackpad, it’s time to buy a new one. But with so many brands and models out there, where would you even start looking? Finding the right mouse to fit your hand comes down to two things: ergonomics and features.