Blog / Reports / Resources

Important Warning From The FBI

Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that...

read more

What’s New With Apple?

Building a worldwide brand takes an army — that’s an army of independent developers if you’re Apple. The latest WWDC (Worldwide Developers Conference) always includes a few unexpected tidbits that make the tech world salivate, and this year is no...

read more

How IoT and Cloud Adoption is Changing Healthcare

The introduction of electronic health records (EHR) has caused a transformational change in medicine, but there is an even larger movement in the future that caregivers across the world are glimpsing — robots and the Internet of Things (IoT). It took more than...

read more

Does The CMO Have A Role In Technology Decisions?

The role of CMOs has been changing rapidly in recent years with the introduction of numerous technologies. Social media platforms, CRM software and diverse multimedia channels all offer businesses remarkably effective tools for creating and maintaining a brand while...

read more

Which Application Rules Supreme: Outlook or GMail

Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that come with changing personal contact information. Quite often, personal emails are attached to personal bills and...

read more

Happy Father’s Day!

June 16th is Father’s Day, a great reason to spend a little quality time with the family doing a few of Dad’s favorite things.   Whatever your plans are, take some time this Sunday to let Dad know how much you appreciate everything he’s done for you over the...

read more

Outsourcing IT Makes Sense for Small Businesses: 7 Reasons

If you’re a small business owner, you have plenty of things to worry about. IT shouldn’t be one of them. We think it makes complete sense for most small businesses to outsource their IT needs to a managed service provider (MSP). Here are 7 reasons. 1. Focus on What...

read more

How to Install Microsoft Launcher on Android Devices

If you haven’t looked lately at what Microsoft’s mobile offerings, it’s time to look again. Microsoft’s first forays into the iOS and Android mobile spaces (circa 2010) were underwhelming to say the least, but in recent years the company has turned things around in an...

read more

How to Create a Strong Password You’ll Remember

Nearly every site or service we use online requires a username and password. Remembering hundreds of unique passwords is just about impossible, and reusing passwords across multiple sites can be dangerous. If one account is compromised in a data breach (and this is...

read more

What Technology Should Small Law Firms Choose

It is questionable whether there is any industry today that has not been forced to adopt new technology to remain competitive. But for small law firms, the need to utilize technology appropriately is necessary for more than just competitiveness—it is actually being...

read more

How to Find the Right IT Services Company

If your business has made the decision to contract with an IT services company for IT support, you’ve made the right choice. However, you’re not done yet. You still need to choose the IT services company that’s best for your business. In most markets, you’ll have...

read more

Critical Update From The NSA

The NSA Is Urging To Patch Remote Desktop Services On Legacy Versions of Windows The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats. Recent warnings by...

read more

4 Strategies For Super Strong Passwords

Some days it seems like everything in our lives requires a password: banks, apps, debit and credit cards, online banking, business applications, healthcare accounts . . . the list is literally endless. Technology professionals recommend that you use a different and...

read more

Was Your Photo and License Plate Number Breached?

 CBD Reports 100,000 Photo and License Plate Breach The U.S. Customs and Border Protection (CBP) reported today that nearly 100,000 travelers’ photos and license plate data were breached. If you’ve driven in or out of the country within the six-week period where...

read more

3 Reasons to Regularly Test Business Systems

Protecting your business requires more time, effort and energy from your technology team than ever before. Business systems are increasingly complex, requiring staff members to continually learn and adapt to changing conditions and new threats as they emerge....

read more

What The CMO Needs To Know About Marketing Technology

Familiarity with marketing technologies is a must for today’s CMO. However, the range of tech knowledge across CMOs varies widely. Even if every CMO can benefit from some technical familiarity, the reality is that some CMOs know very little about technology while...

read more

3 Security Tips For Australian Organisations

More than ever, cybercrime is a reality all businesses in Australia must face. No matter your industry, company size, or level of technology use, it’s up to you to ensure the security of your data and the strength of your security. Together with the Cyber Security...

read more

How to Stop Spam from Ever Hitting Your Inbox

Spam emails can be incredibly annoying. Not only that, it can be downright dangerous, considering the phishing schemes and other email scams that are prevalent today. We can’t avoid spam completely and hope to have any kind of digital life, because so many services...

read more

Sign In With Apple

Sign In With Apple…Should You Use It? Apple recently reported that its new “Sign in with Apple” feature will be part of the iOS 13 release in the fall of 2019. It promises to protect your privacy, and authentication experts say it could have an enormous impact...

read more

Top Challenges Facing CEOs (How to Solve Them)

If you’re a CEO — whether your company is big or small, new or old, successful or working on it— there’s no doubt certain problems do a great job of keeping you up at night. These are the challenges you just can’t seem to master. They plague you day-to-day,...

read more

How to Find Someone’s Email Address

Email is a great system when it works well, but it has some frustrating limitations. You have to know someone’s email address to be able to reach them via email, and there’s no central database for finding email addresses. You can often use the internet to find...

read more

LabCorp Data Breach: What We Know

Are You One Of Many Affected By The LabCorp Data Breach? Financial & Personal Information of 7.7 Million Exposed Just yesterday we wrote about the Quest Diagnostics’ breach affecting nearly 12 million. Today we’re writing to tell you about a LabCorp breach...

read more

What Are Tracking Cookies? Are They Bad?

For today’s tech blog we’ll tackle a topic that’s become much more visible over the last couple years. What are tracking cookies? How do they get on your devices? Can they harm your devices? We’ll answer these three questions in this post. What Are Cookies? Tracking...

read more

Is The CMO Responsible For Digital Technology Decisions?

With the adoption of technology in the personal and commercial spheres ramping up to breakneck speed, the need for clear objectives for key business personnel like CMOs has never been greater. CMOs need to know what their responsibilities are. It may seem like a...

read more

How to Get the Most From Your Android Battery

Battery technology has come a long way in the past several decades. Today’s lithium-ion batteries are a pretty amazing feat of engineering, offering high capacity, low power leakage, and comparatively long life. That said, they aren’t perfect, and they don’t last...

read more

Hurricane Preparedness (Questions/Answers)

How to build an effective Hurricane Survival Plan Now is the time to double check your supply inventories, invest in protective measures for your business, and make sure you have an actionable Hurricane Survival Plan in place. The 2019 hurricane season is almost here...

read more

Why Do IT Departments Report To The CFO

Organizational structure is something that is hotly debated at businesses around the world, but one of the biggest mysteries is where it makes sense to have the technology teams. IT has both a strategic thread as well as a day-to-day operational focus, making it a...

read more

Quest Diagnostics Breach: Latest News

Are You One Of Many Affected By The Quest Diagnostics Breach? Financial & Medical Information of 12 Million Exposed Quest Diagnostics reports that almost 12 million people could have been affected by a data breach. On Monday, June 3, 2019, Quest Diagnostics...

read more

How to Cyber Secure Your Company in 60 Minutes or Less

In today’s digital economy, cybersecurity is just as important as traditional, physical security. Many small businesses that wouldn’t dream of leaving their stores or offices unlocked and unguarded give little time or effort to a cybersecurity strategy. That’s in...

read more

Managed IT Helps Your Bottom Line: 6 Ways How

Here’s an honest truth: managed IT services cost money. With any business expenditure, it’s a good idea to understand the value that the expenditure will bring to the organization. We believe businesses can improve on many fronts by implementing managed IT services....

read more

CEOs Guide To Corporate Mobile Device Security

One of the major advantages of newer technologies is their ability to connect employees working remotely. Connections to colleagues, data and files help make doing business more productive, effective and accurate, no matter where employees and their teams are....

read more