If you use an iPad for personal use, you know how convenient it can be.  But, maybe you aren’t sure whether it’s the right tool for your business needs. If so, perhaps the following reasons will convince you that it is. Using the iPad for business helps you: Access your business email. With Microsoft ActiveSync […]

Does it seem like you spend more time than you should preparing documents in Office?  You are if you aren’t using these speedy keyboard shortcuts.   It may take you some time to get into the habit of using computer keys, instead of the mouse to complete tasks, but it will be worth your efforts in […]

Our team of IT security professionals would like to draw your attention to a high rate of malicious email traffic containing Cryptolocker malware that WILL encrypt your organization’s data if executed. The majority of this traffic is coming through trusted free file share programs masked as voicemail messages or faxes. Our IT security experts are […]

Another version of CryptoLocker has just been released by the criminals who created the Australian Electric Company Bill version earlier this week. Except, this version has been improved, with a different mode of delivery. It comes in the form of a plain text email that asks you to click a link to view your fax. […]

Search Engine Optimization, or SEO, is a collection of tactics that help to rank your business website in the first positions of a Google search.  There are many elements to developing a solid SEO strategy, but the following are five tips to help get you going. Link Your Sites. It’s helpful to link your social media […]

If you want to save money and IT resources, there’s no better way than through virtualization.  Studies support this fact. A recent study reports that 70% of businesses rely on virtualization to save them from investing in hardware Another 51% use it to save on software licenses. Virtualization also improves server utilization and application management, […]

Our team of IT security professionals would like to draw your attention to a high rate of malicious email traffic containing Cryptolocker malware that WILL encrypt your organization’s data if executed. The majority of this traffic is coming through trusted free file share programs masked as voicemail messages or faxes. Our IT security experts are […]

Canada’s Anti-Spam Legislation (CASL) goes into effect July 1, 2014.  It is designed to prevent spamming, but it will also impact the way you do business. You must ensure you obtain consent from your customers or prospects before you send emails, newsletters, text messages, software downloads, or other electronic messages.  If you don’t, your business […]

A new ransomware strain, CryptoWall, is attacking businesses and organizations worldwide.  It seems that the cyber criminals who developed the CryptoDefense Ransomware in April 2014, released this strain because CryptoDefense was being blocked by endpoint protection software. Now they’re angry!  Beware:  CryptoWall doesn’t require you, or your staff, to open it. It uses a new […]

While Microsoft Excel is a powerful program, it’s certainly not the easiest application to use. But fortunately, you’ve probably spent a significant amount of time getting to know the majority of features available. And there’s still quite a few beneficial hidden features to learn. Here’s 6 tips and tricks to help you save valuable productivity […]