Entries by John Murray

Password Fatigue Is Real. Here’s What Businesses Need to Know

Password fatigue is a real problem for businesses. Here’s what they can do while they await passwordless authentication. Does the term “password fatigue” sound familiar? It’s ironic that increased security measures put in place to keep us safe may sometimes do the exact opposite. Mandatory password changes, lengthy password requirements and security questions, while well […]

Don’t let ransomware ruin your Mac

If you’re a Mac user, it’s important to be aware of the growing number of ransomware attacks that are specifically targeting macOS devices. Just like Windows users, you need to take precautions to protect yourself from these threats. Here’s how you can secure your Mac against ransomware attacks. Defining ransomware Ransomware is a type of […]

How Microsoft 365 can help your SMB grow

As the owner of a small- or medium-sized business (SMB), you may feel like you’re always stretched thin. You have to manage tight budgets, juggle multiple roles, and make sure your employees have the tools and resources they need to do their jobs. It can be tough to find time to focus on growing your […]

,

Protect your business printers from cyberattacks

Protecting your business printers from malicious cyberattacks may be the last thing on your mind, but it should definitely not be. Hackers are always looking for new vulnerabilities to exploit, and, if left unprotected, printer systems can offer a trouble-free gateway into vast troves of sensitive data. To help safeguard against unforeseen risks, take these […]

,

Improve Your Cyber Security Awareness

Learn About Today’s Most Common Types Of Cyber-Attacks If you’ve turned on the news sometime during the past few years, you’ve probably heard of more than one instance where a business closed due to a cyber-attack. You may think your business is small enough and hackers won’t target you, but this couldn’t be further from […]

Beware of Phishing Attacks

Phishing attacks are increasing and getting more sophisticated. Here’s how to avoid them: Phishing is on the rise, and anyone who uses email, text messaging, and other forms of communication is a potential victim. These attacks, in which a cybercriminal sends a deceptive message that’s designed to fool a user into providing sensitive information such […]

,

An I.T. Manager’s New Year’s Resolution

An I.T. Manager’s New Year’s Resolution The beginning of the year is the perfect time to review your systems maintenance program, tweak your plans and processes and optimize your overall I.T. strategy. Review, Evaluate and Optimize. More than likely, your business could live or die based on your IT strategy. We have all become dependent […]

Keep your work devices clean and running smoothly with these tips

It’s no secret that a clean work environment is more productive than a cluttered one. The same principle applies to your computer and mobile devices. If you allow them to accumulate dirt and dust, you’re going to start seeing glitches and hardware failures — both of which will affect your productivity. In this blog post, […]

Understanding the different types of web hosting

In today’s digital world, it is essential for businesses of any size and in all industries to have a website. To build your own site, you will require the services of a web host, but what exactly does this entail? Let us give you an overview as we introduce the two most popular forms of […]