Free Windows 10 Upgrade Ending Soon

Free Windows 10 Upgrade Ending Soon

Just a reminder that Microsoft’s offer to “Upgrade to Windows 10 for Free” officially expires on July 29th. Microsoft made it official in May that the offer would not be extended (although that’s not to say they won’t have another promo,...
Cloud attitude adjustments for success

Cloud attitude adjustments for success

Not every business owner who migrates to the cloud achieves great results. As much as the service is touted with words like “freedom”, “productivity” and “collaboration”, realizing the full benefits of these words is not a given. So if you’re thinking about...
Pitfalls of business continuity planning

Pitfalls of business continuity planning

Like all things man-made and otherwise, business continuity plans are not perfect. They too have pitfalls that can result in your business’s failure if not accounted for immediately. Don’t blame it all on the IT guy, as often times the way a system is designed...

Image uploader security flaw discovered

Unfortunately, we’re confronted with new web security threats every day, and today is no different. Experts have exposed a flaw in ImageMagick, one of the internet’s most commonly used image processors, that could put your site in harm’s way. By learning more about...
Best tricks and shortcuts for Microsoft Word

Best tricks and shortcuts for Microsoft Word

Microsoft Word has become synonymous with document creation in businesses, schools and pretty much anywhere that wants to create electronic text documents. Despite more than one billion users worldwide, several of its most useful productivity features are still...
Server Administration 101: Temperature

Server Administration 101: Temperature

In this day and age almost every business employs some type of server management. If yours is hosted locally, temperature management could mean the difference between running smoothly and running into the ground. Understanding how to properly cool your servers...
4 different types of hackers

4 different types of hackers

Hackers come in all shapes and sizes. From kids trying to gain notoriety on the Internet to political groups trying to send a message, the motives for a cyber attack vary widely. So how can you protect yourself? It all starts with getting to know your enemy a little...

Adobe Flash Player Update

We have had many concerned clients calling about the latest emergency update from Adobe for it’s Flash Player.  Last week, Adobe released this update for what it characterized as a “critical vulnerability”.  A vulnerability that if exploited, would...