Blog / Reports / Resources

You Will Love These Top Apps for Educators

You Will Love These Top Apps for Educators

Today’s digital-savvy educators do more than simply lecture their class. They’re creating interactive quizzes and gathering real-time feedback via an app. They’re assigning projects to students, while students complete and submit their homework...

read more
Cyber Security Advice: 6 Crucial Strategies

Cyber Security Advice: 6 Crucial Strategies

Cyber security is more important than ever before. The news is full of stories of leaks and breaches large and small. Some of these result from sophisticated, targeted hacks, and others occur thanks to enterprising hackers taking advantage of security holes in...

read more
What Changes Can We Expect From New Apple Software?

What Changes Can We Expect From New Apple Software?

The 2019 Apple Worldwide Developers Conference in California has come to a close, and we’ve learned everything there is to know about the new software updates to expect from one of our favorite technology companies. Say goodbye to the iTunes app. If you’ve ever been...

read more
City Government In Florida Must Pay $600K To Hackers

City Government In Florida Must Pay $600K To Hackers

The small city of Riviera Beach, Florida, north of West Palm Beach is the latest government to be crippled by a ransomware attack. Their data was encrypted by hackers so they couldn’t access it. This has paralyzed the City’s computer systems. In an attempt to retrieve...

read more
The #1 Security Threat to Local Small Businesses

The #1 Security Threat to Local Small Businesses

There are many types of risk in business: the risk that a new competitor will come on the market and steal market share, the risk that top staff members will jump ship for a better offer . . . but are you considering the significant risk that is associated with a...

read more
Spoofing & Hacking: What’s The Difference?

Spoofing & Hacking: What’s The Difference?

Most people know not to open email attachments from senders that they do not know. Unfortunately, it is not just attachments from strangers that you have to be on the lookout for. It happens quite often that people will get emails that seem to be from known senders...

read more
What Is Technology Competence

What Is Technology Competence

According to the LawSites blog, as of this writing, there are 36 states that have adopted the ABA’s updated Model Rule 1.1, which states that lawyers should maintain technology competence. The rule is purposefully vague to allow for the constant changes in technology...

read more
Healthcare Guide to the DTA’s New Secure Cloud Strategy

Healthcare Guide to the DTA’s New Secure Cloud Strategy

Creating a secure, usable network of systems is top-of-mind for Australia’s Digital Transformation Agency (DTA). The recent growth of security challenges for organisations of all sizes has caused this government agency to closely examine how businesses are...

read more
How to Make Calls with Amazon Alexa

How to Make Calls with Amazon Alexa

  Did you know you can use just about any Amazon Echo device to make phone calls for free? You can do the same in the Alexa app on iOS or Android, whether or not you have an Echo device. You can also call others in your contacts on their Echo devices instead of...

read more
Cutting These Two Corners Could Lead to Business Disaster

Cutting These Two Corners Could Lead to Business Disaster

Cost-cutting measures are not unusual for organizations as they traverse the standard lifecycle of products and services. What you decide to cut during the lean times can have just as much impact as to where investments go when your business is flush with cash. Some...

read more
Your Windows 7 Checklist

Your Windows 7 Checklist

When you’re working hard to grow your business, you can get caught up in things that take your attention away from your technology. Before you know it, your IT system isn’t up to speed because you failed to update an operating system. We don’t want this to...

read more
The CEO/CIO Relationship: A Vital Tie

The CEO/CIO Relationship: A Vital Tie

In its look at the top 10 strategic technology trends for 2019, Gartner notes that businesses need to address an astounding number of technologies that will change the way companies run, their business models and their internal processes. From the rise of artificial...

read more
Important Warning From The FBI

Important Warning From The FBI

Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that...

read more
What’s New With Apple?

What’s New With Apple?

Building a worldwide brand takes an army — that’s an army of independent developers if you’re Apple. The latest WWDC (Worldwide Developers Conference) always includes a few unexpected tidbits that make the tech world salivate, and this year is no...

read more
How IoT and Cloud Adoption is Changing Healthcare

How IoT and Cloud Adoption is Changing Healthcare

The introduction of electronic health records (EHR) has caused a transformational change in medicine, but there is an even larger movement in the future that caregivers across the world are glimpsing — robots and the Internet of Things (IoT). It took more than...

read more
Does The CMO Have A Role In Technology Decisions?

Does The CMO Have A Role In Technology Decisions?

The role of CMOs has been changing rapidly in recent years with the introduction of numerous technologies. Social media platforms, CRM software and diverse multimedia channels all offer businesses remarkably effective tools for creating and maintaining a brand while...

read more
These 4 Issues are Paralyzing CFOs from Moving to the Cloud

These 4 Issues are Paralyzing CFOs from Moving to the Cloud

CFOs have long been challenged by the value proposition of capital technology investments, often requiring in-depth analysis and reviews before making the plunge. While the lower monthly costs of cloud-based computing may overcome this inertia in some instances, CFOs...

read more
Which Application Rules Supreme: Outlook or GMail

Which Application Rules Supreme: Outlook or GMail

Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that come with changing personal contact information. Quite often, personal emails are attached to personal bills and...

read more
Happy Father’s Day!

Happy Father’s Day!

June 16th is Father’s Day, a great reason to spend a little quality time with the family doing a few of Dad’s favorite things.   Whatever your plans are, take some time this Sunday to let Dad know how much you appreciate everything he’s done for you over the...

read more
Outsourcing IT Makes Sense for Small Businesses: 7 Reasons

Outsourcing IT Makes Sense for Small Businesses: 7 Reasons

If you’re a small business owner, you have plenty of things to worry about. IT shouldn’t be one of them. We think it makes complete sense for most small businesses to outsource their IT needs to a managed service provider (MSP). Here are 7 reasons. 1. Focus on What...

read more
How to Install Microsoft Launcher on Android Devices

How to Install Microsoft Launcher on Android Devices

If you haven’t looked lately at what Microsoft’s mobile offerings, it’s time to look again. Microsoft’s first forays into the iOS and Android mobile spaces (circa 2010) were underwhelming to say the least, but in recent years the company has turned things around in an...

read more
How to Create a Strong Password You’ll Remember

How to Create a Strong Password You’ll Remember

Nearly every site or service we use online requires a username and password. Remembering hundreds of unique passwords is just about impossible, and reusing passwords across multiple sites can be dangerous. If one account is compromised in a data breach (and this is...

read more
What Technology Should Small Law Firms Choose

What Technology Should Small Law Firms Choose

It is questionable whether there is any industry today that has not been forced to adopt new technology to remain competitive. But for small law firms, the need to utilize technology appropriately is necessary for more than just competitiveness—it is actually being...

read more
How to Find the Right IT Services Company

How to Find the Right IT Services Company

If your business has made the decision to contract with an IT services company for IT support, you’ve made the right choice. However, you’re not done yet. You still need to choose the IT services company that’s best for your business. In most markets, you’ll have...

read more
Critical Update From The NSA

Critical Update From The NSA

The NSA Is Urging To Patch Remote Desktop Services On Legacy Versions of Windows The National Security Agency is urging Microsoft Windows administrators and users to ensure they are using a patched and updated system in the face of growing threats. Recent warnings by...

read more
4 Strategies For Super Strong Passwords

4 Strategies For Super Strong Passwords

Some days it seems like everything in our lives requires a password: banks, apps, debit and credit cards, online banking, business applications, healthcare accounts . . . the list is literally endless. Technology professionals recommend that you use a different and...

read more
Was Your Photo and License Plate Number Breached?

Was Your Photo and License Plate Number Breached?

 CBD Reports 100,000 Photo and License Plate Breach The U.S. Customs and Border Protection (CBP) reported today that nearly 100,000 travelers’ photos and license plate data were breached. If you’ve driven in or out of the country within the six-week period where...

read more
3 Reasons to Regularly Test Business Systems

3 Reasons to Regularly Test Business Systems

Protecting your business requires more time, effort and energy from your technology team than ever before. Business systems are increasingly complex, requiring staff members to continually learn and adapt to changing conditions and new threats as they emerge....

read more
What The CMO Needs To Know About Marketing Technology

What The CMO Needs To Know About Marketing Technology

Familiarity with marketing technologies is a must for today’s CMO. However, the range of tech knowledge across CMOs varies widely. Even if every CMO can benefit from some technical familiarity, the reality is that some CMOs know very little about technology while...

read more
3 Security Tips For Australian Organisations

3 Security Tips For Australian Organisations

More than ever, cybercrime is a reality all businesses in Australia must face. No matter your industry, company size, or level of technology use, it’s up to you to ensure the security of your data and the strength of your security. Together with the Cyber Security...

read more