BLOG

  1. Home
  2. /
  3. BLOG
Sep 17

A short guide to mitigating the risk of the dark web

The dark web is a nefarious place, where criminals lurk and communicate, buy, sell, plot, and plunder. The clue, of course, is in the name. Speaking to NBC, FBI Supervisory Special Agent Mark Knoll referred to it as “like your new drug dealer on the corner in the virtual world.” READ MORE

17 Tech Hacks That’ll Make You Feel Like a Boss

No one can resist the power of a game-changing secret, especially when it comes to the gadgets and technologies we use on the daily. If you want to know how to keep earphones from getting tangled or what to do with your favorite square Instagram prints, there’s a hack for that, and we’ve rounded them […]
Aug 20

Why aren’t your employees following your office security policy?

The catastrophic consequences of cybersecurity breaches are no secret. In the past two years, cybercriminals nearly derailed Verizon’s multibillion dollar acquisition of Yahoo!, meddled in the US election, and leveraged a leaked NSA tool to infect more than 200,000 computers across 150 countries in the infamous WannaCry ransomware attack. READ MORE
Jul 24

4 ways to get your IT budget plan funded

Budgeting season for 2019 is here. Are you ready? It’s time to pitch the powers that be on top priorities that absolutely must go into the IT budget plan, like cybersecurity and updated software. But how can you make sure your mission critical projects get funded? READ MORE
Jul 11

Save your unprotected printers from dangerous printer pranks

When printers around the world began spewing silly messages urging recipients to subscribe to a YouTube channel a few weeks ago, many considered the incident a joke. But while social media users laughed off the prank, trading stories and photos of their home and office equipment’s absurd printouts, IT pros came to a chilling realization. […]
Jul 07

Mind the gaps between legacy IT and digital tech

“Mind the gap,” the watchwords of the British rail service, should be fixed on the monitors of all managers overseeing environments that mix legacy IT and newer digital tech solutions. These hybrid environments can create holes in operations and security policy that cause bottlenecks and put organizations at risk for cyber attacks. READ MORE

10 Wi-Fi security tips

Wireless networking can be kind of scary from a security standpoint. It opens up whole new attack vectors that were not present with wired network infrastructures. That doesn’t mean you can’t do it securely, however, and I aim to give you some ideas that can help you in that regard. READ MORE
Jun 26

How can a managed print services partner help you?

Whether it’s marriage, reality TV, or business, successful partnerships are based on compatibility, communication, and trust. Building a managed print services (MPS) partnership is no exception, although it might be a little less dramatic than what you see on reality TV shows. READ MORE