Blog

A True Blue Breakthrough

We’re not typically much for hyperbole, but we have to say that the new Epson ink technology is definitely cutting-edge and could be a real game-changer in the print management industry. What makes this technology different is that it doesn’t require heat to print, and this results in vastly superior color, longer life span for…

Read More. . .

Why Do We Continue to Use Substandard Passwords?

In a previous article, we addressed the importance of strong passwords and listed the most common ones used in recent years. Now, let’s talk a little about the “psychology of passwords” and find out what’s behind the choices we make. We’re all aware that a password with strength should include upper and lower case letters,…

Read More. . .

Breakthrough in Scanning Devices in the Age of the Novel Coronavirus

Amazing, this day and age of technology we live in! Just a mere couple decades ago, who would have thought we could control the temperature in our homes from long distance, never mind store pretty much all our information on a cell phone. And since technology never rests on it laurels, now there’s a “new…

Read More. . .

Conservation: Less CAN Be More!

The so-called “paperless society” that seemed nothing more than fantasy a mere decade or so ago has become reality for many businesses, thanks to software and technology. But a lot of companies and organizations still spend far more on paper and energy to create documents than they need to; in fact, an estimated 1% to…

Read More. . .

Best Practices to Protect Against Dark Web Breaches

While it is impossible to protect confidential information 100% of the time, regular risk assessments and real-time monitoring can go a long way toward ensuring your business does not suffer from breaches via the dark web – a segment of the Internet that isn’t indexed by search engines and that is the bane of existence…

Read More. . .

Business Owners: Pay Attention to the Dark Web

Last time around we talked about the Internet’s “dark web,” which in short cannot be accessed on a standard web browser but instead requires a special network to keep all activity completely untraceable and anonymous. Sounds pretty nefarious? That’s because it can be and although research conducted via the dark web by journalists, law enforcement…

Read More. . .

Beware of the Dark Web

The Internet – what would we do without it? From work-related research, to online shopping and a whole lot in between, “logging on” is a daily routine for most of us…and for a lot of us, online activity is productive and innocent. For the criminally intent, use of the Internet is also productive, but definitely…

Read More. . .

Working from Home: Some Considerations as the Remote Office Environment Expands

Working from home is increasingly commonplace as many companies in response to COVID-19 restrictions have had large numbers of their employees working remotely. Regarding a home office: it’s important to have the proper protocols set up for IT and Managed Network; that’s a topic that we will address in greater detail in other blogs. As…

Read More. . .

Voice Technology – Working Its Way To Your Office

There’s hardly one among us that isn’t familiar with Apple’s “Siri” or Amazon’s “Alexa” – if you want the answer to an obscure sports question, need to know the weather for the upcoming weekend, or just want to hear a song you danced to at your junior prom, “Siri” and “Alexa” are your go to…

Read More. . .

Does that email look suspicious?

Hardly a day goes by that we don’t hear about attempted hacking. While no one is immune to the threat, cyberattacks and cybercrime pose the biggest threat to businesses, hands down. Hacking is deplorable, illegal and sorry to say a big business, with hackers constantly becoming more sophisticated and difficult to detect. Consider these alarming…

Read More. . .