Understanding Cyber Security

A few years ago, cybersecurity was once the responsibility of large corporations and governments. Companies specializing in cybersecurity could make very specialized efforts and expenditures to maintain parity with IT…

Disaster Recovery: Is your Business Prepared?

Disasters take many forms. It’s not just catastrophic events such as hurricanes, earthquakes and tornadoes, also cyber-attacks & equipment failures that can be classified as disasters. Companies and organizations can…

Common IT Pitfalls for SMBs

Small business owners face a lot of pressure to keep overhead low and profits as high as possible to keep their businesses thriving. When it comes to IT, it’s hard…

VOIP vs Analog Phones

Comparing analog phones to Voice over Internet Protocol (VoIP) phone systems is like comparing a basic telephone to a computer. An analog phone is a basic phone you can plug…

Do I need a Firewall?

If your computer is connected to the Internet, the answer is ‘yes’. You are a potential target to an array of cyber threats that attack through unpatched security holes. This…