Social Media Can Increase Productivity and Morale

Watch out Gen x’s this blog is going to sting a little. Today’s workforce is being appropriated by millennials. Is not news that there are many misconceptions surrounding this generation. Every aspect of life in the 21st century has been rocked by these dang millennials. Everything from education, government and economy have been affected by this generational shift. The workforce …

How much time do your employees waste?

Very few employees can honestly say they spend the entirety of their workday actually working. Whether it’s the 15 minutes you spend making your coffee in the morning, or the 10 minutes catching up on Facebook after lunch, the occasional work break is inevitable. A recent study showed that the average worker admits they waste three hours per eight-hour workday, …

Who’s stealing all the bandwidth?

Not so long ago it would have been ridiculous to ask a new employer to give you free TV, free Movies, free Mail, free Music, and a free TV camera and crew at your house in case you wanted to work from home and conduct a meeting with coworkers. Yet, with the internet, all of these things and more are …

Cloud Etiquette 101

Horrible house guests, we’ve all had them. Whether it be that annoying family member that over stays their welcome, or that old college buddy that leaves beer cans and potato chip crumbles all over your couch, we have all experienced those discourteous visits. If you thought that was bad etiquette, you’ve yet to see the worst… Imagine coming home and …

Transitioning to the Cloud

Data loss is not a matter of if, it’s a matter of when – and it happens to every company, big or small. More than half of businesses locate their disaster/backup systems in the same physical location as their primary system – red alert! If you only have one copy of your system’s backup at your office, and your hardware …

To Cloud, or Not to Cloud

Everyone is talking about cloud computing these days and for good reason. The cloud is revolutionizing how computing power is generated and consumed. Cloud refers to software and services that run on the Internet, instead of locally on your computer. When tech companies say your data is backed up “in the cloud,” it has nothing to do with those white …

Fixing Your Weakest Security Link: Your Employees

You can have every piece of security hardware in the books: firewall, backup disaster recovery device, anti-virus; but your employees will still be the biggest vulnerability in your organization when it comes to phishing attacks. How do you mitigate as much risk as possible? Create and Strictly Enforce a Password Policy Passwords should be complex, randomly generated, and replaced regularly. In …

How To Spot A Phishing Attack

Would you know if you were the subject of a phishing attack? Many people claim that they’d be able to tell right away if they received an email from an illegitimate source. If that were the case, there wouldn’t be 1.5 million new phishing sites every month, a 65% increase in attacks in the last year, and hackers would have moved on to …

What Is Phishing & How Are Hackers Using It?

While the number of people falling for sending personal information to the crown prince of Nigeria in hopes of receiving his promised wealth and riches seems to be dropping, phishing remains a major issue. In fact, the number of phishing campaigns pursued by hackers around the world increased by 65% in the last year. What exactly is phishing? Hackers mimic the …

How to Make a Safe Password

Make sure that your passwords are strong and unique.
Don’t use your birth date, phone number, social security number, family members name or your pet’s name – these can be easily guessed by a cyber-crook usually just by looking over your social profiles.