Since the 1990s, computer users have been accustomed to saving their files to the ‘My Documents’ or ‘Documents’ folder on their PCs and Macs. Though these file locations are a useful part of the computer’s local system, it’s time to...
Most businesses rely heavily on their technology resources – so you need to know exactly what those IT resources are. Best practice is to maintain detailed documentation about your IT systems and their support history. Managed service providers document your...
Phishing attacks have been around since 1995 when scammers would pose as AOL employees and request a user’s billing information through instant messages. Today’s email phishing attacks trick users into handing over personal information of all kinds....
The internet is a wonderful tool but, for every website that is helpful to a business, there’s another that is certainly the opposite. A few minutes a day spent catching up on news headlines, or checking personal emails and social media updates probably...
In business, you have to plan for the eventuality that something could happen. Whether it’s a fire, a cyber attack, or a bonehead user error, your data is too important to leave unprotected. Let’s discuss some of the most likely causes of data loss, and...
Do you need an extra workstation? It might seem surplus to requirements and just an unnecessary additional expense. In fact, a spare PC is routinely recommended in business continuity plans. It’s all about being prepared for unforeseen problems that can disrupt...