Cybersecurity & IT Insights
The Perils of Long-Term MSP Contracts
How confident are you that your company will have similar technology needs two years from now as it does today? Most small and mid-size businesses have little certainty around what circumstances they will face in two years’ time. Despite this, there are all sorts of...
Is Your MSP Treating Symptoms or Solving IT Problems?
Do you feel like your MSP (Managed Service Provider) is being kept busy resolving the issues in your office? That may not be a good thing. Of course, it’s a great sign if your managed IT service provider is busy in their first months serving your company. They need...
iOS 11 and Email: A Reminder of the Dangers of Brand New Software
With more than 700 million iPhones in use, it’s easy to think that when a new version of iOS (the phone’s operating system) is released all of the major problems will have already been ironed out. Despite the best efforts of software designers, however, it’s...
The Most Useful Keyboard Shortcuts
Keyboard shortcuts can save a few seconds here and there, but if you add that time up, the most productive ones can save you hours of your life. Unfortunately, most keyboard shortcuts lists are full of complex shortcuts - it’s impossible to remember these lists, and...
Passphrase – The Less Frustrating Cousin of a Password
Computer passwords are a double-edged sword. If you make it too complicated, you’ll forget it. On the other hand, if you make it too simple, it’s relatively easy for anyone in the world to crack, and data theft is extremely common. In fact, it’s so common that most...
Three Questions to Answer Before You Spend a Penny on a Server Replacement
Server replacements only come around every five years or so for most companies, which is a good thing given the high costs of replacing them. And while the servers themselves are expensive, they represent only a fraction of the costs incurred. Replacing a server...
Beware Of a Single Point of Failure
Information Technology professionals frequently talk about the dangers of having a single point of failure. If your data isn’t backed up (and if those backups aren’t tested), you will eventually lose some of it, and there’s a good chance that some of it will be...
Ransomware and Malware Prevention is About User Training, Not Technology
Ransomware and other types of malware arrive on computer networks from several different sources. Some of it is downloaded via links in phishing emails, which are designed to look like they are legitimate but are not. Some links arrive through malicious websites or...
Two Things Every Managed IT Service Plan Needs
Have you ever taken a look at a proposal from a Managed Service Provider (MSP) and wondered if it covers everything your company needs? Some specifications may need to be gathered during the pre-proposal discovery process – for instance, the type of coverage for...