fbpx Skip to content

IT MSP Blog

Make tech trends work for you! Here‘s how

By Chris Butler / August 31, 2018 /

Have you seen folks wandering around, staring at their phone like it was a map pointing to a pot of gold? Or ordering pizza over a Facebook conversation with an awkward cashier? With some creative marketing and structuring, your SMB could be on the other side of those people’s phones. Tech fads are a treasure…

Read More

3 Tips for Virtualization as a DR solution

By Chris Butler / August 29, 2018 /

One effective Disaster Recovery (DR) solution for small businesses that most people are unaware of is Virtualization. The former is a strategy used to recover your business after a disaster has struck, while the latter is a way for businesses to save money by running all their office PCs on a “virtual” server. Read on…

Read More

PhishPoint attack looks like SharePoint

By Chris Butler / August 27, 2018 /

Have you ever received an email that claimed to come from a bank or government office when it obviously didn’t? It was probably a phishing scam trying to trick you into downloading malware. The most recent campaign duplicates a trustworthy Office 365 email and can fool even the most skeptical users. Here’s how to stay…

Read More

Windows 10: Your PC, your way

By Chris Butler / August 24, 2018 /

The Windows 10 interface looks good and is quite intuitive, but something is still missing — your signature style. Microsoft’s premier operating system gives you the power to customize your device any way you like. So if you’re tired of your plain blue theme or if you’re starting to get annoyed with that notification sound,…

Read More

What are the risks of BYOD?

By Chris Butler / August 23, 2018 /

The bring your own device (BYOD) strategy lets employees use their personal mobile devices to do work for your company from anywhere. This strategy increases efficiency and convenience to your business, but it also brings a number of security risks to your IT infrastructure and data. If you’re thinking of incorporating BYOD in your office,…

Read More

A foolproof guide to installing iOS

By Chris Butler / August 22, 2018 /

On July 9, Apple rolled out iOS 11.4.1, their latest software update. Whether you’re an experienced iOS user or a newbie, here are some tried and true methods that guarantee a successful upgrade to the newest version of iOS. Consider waiting Just because a new iOS update is released doesn’t mean you must install it…

Read More

The convenience of dual monitors

By Chris Butler / August 21, 2018 /

Some things come in pairs, including glasses, shoes, and, for busy office workers, computer monitors. The concept of using two monitors at once is unconventional for some, but staying in familiar territory when it comes to working at a desk might not be best for productivity. If you’re hesitant about your employees using two monitors…

Read More

An introduction to G Suite Apps

By Chris Butler / August 20, 2018 /

Google has come a long way since it started out as just a search engine two decades ago. Their most recent development is called G Suite, a cloud-based productivity suite that offers a wide array of features and benefits to consumers and businesses. G Suite puts all of Google’s most popular apps into one package.…

Read More

Is your continuity plan doomed to fail?

By Chris Butler / August 16, 2018 /

Like all things, business continuity plans are not perfect. They have pitfalls that can result in your business’s failure if not taken into account immediately. Don’t blame it all on the IT guy; often, the way a system is designed can also have loopholes. Here are a few of the reasons why business continuity plans…

Read More

Controlling security risks of virtualization

By Chris Butler / August 14, 2018 /

Virtualization security often ends up on the back burner, and you probably didn’t even realize how important it is. However, like the rest of your technology, a virtualized infrastructure must be secured. To help keep yours protected, here are some of the security risks involved with virtualization and ways to control them. Security risks of…

Read More
Scroll To Top