Blog

The Home Office – When Function Meets Comfort

Who would have thought back in March that come the end of summer the home office set-up you thought was very time-limited might be open-ended? But with the half-year mark of remote working looming, now may be the time to evaluate whether you have a home office space that provides functionality and comfort. Let’s go…

Read More. . .

The 101 on Zoom

Six months into the “new normal” with no “back to normal” in sight, a properly outfitted home office is no longer a nicety, it’s a necessity. Say good-bye for now to those sit-around-the-conference-table meetings and hello to your home-based business discussions via Zoom.  So, how do you go about setting up Zoom? It’s pretty easy…and the…

Read More. . .

Thwart Internal Threats With A Strong Employee Security Policy

So far we’ve looked at the types of malware plaguing businesses from a few angles, including phishing attacks and ransomware. Just when you thought you had been sufficiently scared to open your laptop, along comes yet another major threat, particularly to small businesses. Generically termed “insider threat,” this very real risk to businesses is caused…

Read More. . .

Don’t Let Cybercriminals Hold Your Business Hostage

Ransomware, one of the most common forms of malware wreaking havoc with small businesses, is exactly what its unsavory name implies. It is a threat to publish a victim’s data or block access to it unless a ransom is paid. It’s illegal, it’s malicious, and it is gaining speed with one survey indicating that ransomware…

Read More. . .

Trojans, Viruses, and Worms – They Are Not Our Friends!

Malware. The mere mention strikes fear in the heart of every business owner on the planet – and for good reason seeing that these malicious attacks, in the form of trojans, viruses and worms are pure and simply trouble with a capital T! So, what exactly is malware? In short, it’s malicious code created by…

Read More. . .

Don’t Go On Any Phishing Expeditions!

There’s a sentiment among many small business owners that they’re not large enough to attract the attention of cyber criminals. But just because you’re a small fish in a big pond doesn’t mean you’re invulnerable to so-called phishing attacks. Remember – if you’re on the Internet, it’s open game for hacker hunters. In fact, it…

Read More. . .

A True Blue Breakthrough

We’re not typically much for hyperbole, but we have to say that the new Epson ink technology is definitely cutting-edge and could be a real game-changer in the print management industry. What makes this technology different is that it doesn’t require heat to print, and this results in vastly superior color, longer life span for…

Read More. . .

Why Do We Continue to Use Substandard Passwords?

In a previous article, we addressed the importance of strong passwords and listed the most common ones used in recent years. Now, let’s talk a little about the “psychology of passwords” and find out what’s behind the choices we make. We’re all aware that a password with strength should include upper and lower case letters,…

Read More. . .

Breakthrough in Scanning Devices in the Age of the Novel Coronavirus

Amazing, this day and age of technology we live in! Just a mere couple decades ago, who would have thought we could control the temperature in our homes from long distance, never mind store pretty much all our information on a cell phone. And since technology never rests on it laurels, now there’s a “new…

Read More. . .

Conservation: Less CAN Be More!

The so-called “paperless society” that seemed nothing more than fantasy a mere decade or so ago has become reality for many businesses, thanks to software and technology. But a lot of companies and organizations still spend far more on paper and energy to create documents than they need to; in fact, an estimated 1% to…

Read More. . .