Why you should care about HTTPS

One basic internet security habit that everyone should remember is to avoid websites that aren’t secured with the HTTPS protocol. This is as simple as looking at your URL bar to check whether the URL string starts with “https” and whether there is a symbol of a closed padlock beside it. HTTPS Encryption When you […]

Disaster recovery audit fail: A few lessons

In talking about disaster recovery plans (DPR), it’s best to illustrate with real-world scenarios to help you understand things better. They offer concrete examples of successes and failures, and you can learn a lot from them. Here’s an example of a DPR audit and the lessons it offers. Hosting certain types of data and managing […]

Cloud-hosted or on-premises VoIP?

Business communication is different from traditional landlines. Today’s buzzwords are internet-based phone systems or VoIP. Before upgrading your old phones, determine where you want the new system to be: in the cloud or on-premises? Installation and maintenance On-premises VoIP phone systems are installed in your office and typically managed and maintained by your own personnel. […]

A closer look at fileless malware

To avoid detection by antimalware programs, cybercriminals are increasingly abusing legitimate software tools and legitimate programs in systems to steal data or ruin its integrity. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic or IT/system administration tasks while leaving fewer footprints. Ultimately, your business could […]

Why should I use private browsing?

You may think that you’re not online enough to risk your safety, or that you never visit unsafe sites. However, the world wide web is a vast network where the exchange of information is often difficult to track. Here are some good reasons to “go incognito”. With the headlines about data breaches and cyberattacks greeting […]

Making the most of digital marketing

Many business owners believe they should be promoting their organization in as many places as possible. Realistically, however, updating social media statuses without proper planning and strategy could do more harm than good. Read on to understand how timing is everything in social media marketing. Social media has helped businesses not only to cut down […]

Make sure your VoIP phones survive a disaster

Voice over Internet Protocol (VoIP) telephony systems are great for today’s businesses. They’re more mobile with greater functionality and better cost efficiency versus traditional landline phones. But as with any technology, VoIP is vulnerable to disruptions due to equipment failure, disasters, and cyberattacks. Plan ahead and make sure your VoIP can weather any breakdown. Invest […]

The dangers of autocomplete passwords

Hackers have found a new way to track you online. Aside from using advertisements and suggestions, they can now use autocomplete passwords to track you down. Feeling unsecure? Here are some ways to keep you out of harm’s way. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users […]

Quick facts about virtualization and the cloud

Virtualization and cloud computing are sometimes mistaken as one and the same, causing much confusion. For the record, virtualization is different from cloud computing, but these two technologies usually overlap. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. If there were a spike in email traffic, […]

Best practices to maximize your CRM

Customer relationship management (CRM) software can add value to your business in many ways. Next to being a very important sales improvement tool, CRM software strengthens your company’s professional image in the market. However, not all CRM users utilize the software a hundred percent. Here’s what you can do with CRM to get the job […]