When Windows 10 Support Stops

August 22nd, 2017 by admin

In July of 2017, some Windows 10 users received an error message when trying to install the Creators Update, stating, "Windows 10 is no longer supported on this PC." This first-of-its-kind problem stems from an incompatibility with a handful of Intel's Clover Trail CPUs found in some of the earliest...
Read Full Story »

Posted in: Uncategorized,

The Internal SMB IT Security Threat: Overconfidence In Cyber Security Preparedness

August 15th, 2017 by admin

According to a 2017 published study by Advisen and Experian, one of the biggest threats facing small businesses comes from within, such as overconfidence in the organization's ability to protect itself and recover from cyber security attacks. While businesses in the survey aren't claiming to have exceptional...
Read Full Story »

Posted in: Uncategorized,

Addressing the Unique Ransomware IT Security Issues in Healthcare

August 8th, 2017 by admin

Ransomware, a type of malware that holds a computer hostage and tries to force the victim to pay money to recover access, is a nightmare for any business, but the healthcare industry faces the more severe side of a ransomware attack. The healthcare industry receives a whopping 15 percent of all ransomware...
Read Full Story »

Posted in: Uncategorized,

Looking at USB/NFC Keys for Extra Account Security

August 1st, 2017 by admin

Hijacked accounts are an IT security nightmare, so it makes sense for your company to look at new technology for better ways to keep your digital assets safe. While security professionals are working out new ways to look at what account credentials are, sometimes with mixed results like with Samsung's...
Read Full Story »

Posted in: Uncategorized,

Is Your Office Router Secure?

July 25th, 2017 by admin

In June 2017, WikiLeaks released secret documents that exposed the tools the CIA uses to infiltrate public and private networks through routers. These documents have shined a light on how easy it is for someone to hack a router. This begs the question, are your business’ IT security practices keeping...
Read Full Story »

Posted in: Uncategorized,

Avoiding Hardware Overkill: IT Consulting to the Rescue

July 18th, 2017 by admin

Spending far too much money on excessively overpowered computer hardware can quickly deplete your company's IT budget, taking funding away from other important expenses. Two exciting products released in June 2017, Apple's new iMac Pro ($4999) and Intel's Core i9 CPU family (starting at $999), are poised...
Read Full Story »

Posted in: Uncategorized,

Flaws in 2-Factor Authentication Methods Could Leave You Vulnerable

July 11th, 2017 by admin

If your business is using 2-factor authentication, or 2FA, methods to secure your important accounts, you may need to investigate better ways to implement the practice. Security experts widely recommend using 2FA, a system which utilizes a second security level of authorization in addition to a password...
Read Full Story »

Posted in: Uncategorized,

Spare Computer Parts: Which Ones To Keep For Disaster Recovery

July 5th, 2017 by admin

It happens in every office eventually: an employee is going about their workday and suddenly their computer or monitor won't turn on. Fortunately, there's gold in those unused desktops and laptops stuck in the storage closet. Aside from the computers having literal gold in some components, your business...
Read Full Story »

Posted in: Uncategorized,

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised security at least once for 79.2 percent of businesses...
Read Full Story »

Posted in: Uncategorized,

Amazon Alexa in the Workplace: What Could You Do With a Virtual Assistant?

June 20th, 2017 by admin

Amazon Alexa, the voice-based intelligent personal assistant you may have seen an early adopter friend use at home, has surprising business use potential to increase productivity in the workplace. Like Apple's Siri, Google Assistant, and Microsoft's Cortana, Alexa is able to perform tasks for the user...
Read Full Story »

Posted in: Uncategorized,

Intranets and Small-To-Medium Business Productivity

June 13th, 2017 by admin

Many small-to-medium businesses (SMBs) have taken to hosting their own intranet to increase productivity in the workplace. For those unfamiliar with the term, "intranet" is not a typo, but rather an internal network that behaves like a private Internet. At their core, intranets help businesses improve...
Read Full Story »

Posted in: Uncategorized,

The Cost of Memory: Trends to Impact Your Upgrade Cycle

June 6th, 2017 by admin

Computer memory market trends could play a role in your business’s decision on when to upgrade or replace employee computers. According to PC World, the technology research experts at Gartner predict that prices for both RAM and Solid State Drives (SSDs) will start to decline in 2018—and then crash...
Read Full Story »

Posted in: Uncategorized,

Android and IOS: Is the Device Just Old, or Is It Obsolete?

May 23rd, 2017 by admin

When trying to determine if a piece of technology is simply old or completely obsolete, keep in mind that there are different criteria for Android and iOS devices than for desktop and laptop computers. An employee stuck using an obsolete device is likely, after all, to argue that replacing it would...
Read Full Story »

Posted in: Uncategorized,

7 Ways VoIP Increases SMB Productivity

May 16th, 2017 by admin

Voice over Internet Protocol (VoIP) solutions can help small and medium businesses  increase productivity by enhancing your communication potential. VoIP isn't just a simple digital upgrade over your existing office analog phone service: It opens the doors for new ways to look at customer management...
Read Full Story »

Posted in: Uncategorized,

Scheduling Security: Take Control of Your OS Updates

May 10th, 2017 by admin

It happens to everyone: You turn your computer back on after you intended to leave the office, or come in early to get a head start on a new project, only to be greeted by a 20-minute operating system (OS) update session. This common workplace frustration turns what should have been a four-minute job...
Read Full Story »

Posted in: Uncategorized,

The Three Copies Rule: Why You Need Two Backups

May 3rd, 2017 by admin

Anyone who has ever lost years of work due to computer failure will tell you that backing up your devices can save you considerable heartache and frustration. Reliable, redundant, and regular data backups are your business's best strategy for disaster recovery—but two copies of your data may not be...
Read Full Story »

Posted in: Uncategorized,

Top 5 Security Tips for Email and Social Media Accounts

April 26th, 2017 by admin

Email and social media accounts provide a wealth of cyber security challenges for businesses. Hackers often look for exploits in account operations to steal information and seize control—both of which can be extremely damaging and difficult to combat. A compromised account is a problem for any business,...
Read Full Story »

Posted in: Uncategorized,

The Dock Returns: Anticipating Trends for Productivity Potential

April 19th, 2017 by admin

Samsung's March 2017 announcement that its flagship smartphone would support first-party peripheral that makes the device work like a desktop computer could mean big changes for how people look at their productivity devices. While this is not the first attempt to treat a smartphone as a computer substitute,...
Read Full Story »

Posted in: Uncategorized,

This Is the End: Microsoft Takes a Hard Stance on Phasing Out Older Windows Versions

April 11th, 2017 by admin

If your business hasn't already made the switch from Windows 10's predecessors to a new operating system, it's time to make the initiative a priority. While your IT staff doesn't need to upgrade every computer in your office, it's necessary to make sure all vital software is compatible with Windows...
Read Full Story »

Posted in: Uncategorized,

Avoiding Disaster: Overheating Computers

April 5th, 2017 by admin

If one of your office computers always seems to shut down or slow to a crawl at the busiest of times, you may have a case of overheating on your hands—especially if IT can't find anything wrong on the software level. Performance hiccups might seem like a mere nuisance, but overheating shortens the lifespan...
Read Full Story »

Posted in: Uncategorized,

Mesh Networking for SMB Offices

March 28th, 2017 by admin

If the sounds of disgruntled employees complaining about poor Wi-Fi connectivity are all too familiar in your SMB, it's time to consider switching to a mesh network. Unlike traditional Wi-Fi networks that use a single point of origin and optional extender networks, mesh networks utilize a series of...
Read Full Story »

Posted in: Uncategorized,

The Benefits of Laptop Docks and At-Desk Peripherals

March 21st, 2017 by admin

With a little bit of effort, your staff can reap all the benefits of a laptop, and many of the perks of a desktop, with a little bit of planning and some additional hardware. It's a common perception that laptops lead in portability, while desktops specialize in expandability. But improvements in peripheral...
Read Full Story »

Posted in: Uncategorized,

Mac- and Linux-Based Malware Targets Biomedical Industry

March 14th, 2017 by admin

The malware infection, discovered in late January, that's been hiding out on Mac and Linux devices for more than two years doesn't mean the security floodgates are open, but it is a reminder that these devices aren't invincible. Apple is calling this new malware "Fruitfly," and it's being used to target...
Read Full Story »

Posted in: Uncategorized,

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

March 9th, 2017 by admin

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices. Because of their simplified nature, NAS devices are typically easier to use and substantially...
Read Full Story »

Posted in: Uncategorized,

8 Spring Cleaning Tips for Your Office Computers

March 1st, 2017 by admin

When it comes to your office computers, a little bit of spring cleaning goes a long way. Sure, cleaning office computers can seem tedious. But think of it like preventative maintenance on a vehicle: In the best-case scenario, you'll never know all the breakdowns you avoided. Keeping your office computers...
Read Full Story »

Posted in: Uncategorized,

Getting a Clean Start: Managing Windows Startup Programs

February 23rd, 2017 by admin

It's quite common that, over time, Windows systems accumulate a laundry list of programs that load when a user signs in. While generally benign, most of these "startup" programs are unlikely to actually benefit the user—so the computer ends up doing a whole lot of work for no reason. Fortunately,...
Read Full Story »

Posted in: Uncategorized,

Digital Sticky Notes: A Time-Saver for Your Entire Team

February 15th, 2017 by admin

It's a familiar sighting in the workplace: the employee with half a dozen sticky notes attached to their computer monitor. While not the most confidential or elegant solution, these employees are on to something. Fortunately, technology has stepped in to embrace this practice and increase productivity...
Read Full Story »

Posted in: Uncategorized,

Breathing New Life into Middle-Aged Computers

February 8th, 2017 by admin

Your employees' computers may not be up to speed anymore after two or three years of use, but in many cases your staff can upgrade or tune up these devices to keep pace with work demands. Upgrades can often be purchased and installed for under $100 a system, offering an inexpensive way to extend the...
Read Full Story »

Posted in: Uncategorized,

Using Snap and Split-Screen Modes for Increased Productivity

February 1st, 2017 by admin

Multi-tasking wizards have a secret: Modern operating systems offer a handy technique for managing multiple windows while maximizing available screen space, significantly increasing productivity. Depending on the OS, this feature may be referred to as "snapping" or "split-screen mode." The concept,...
Read Full Story »

Posted in: Uncategorized,

An Expert's Guide to Avoiding Phishing Scams

January 24th, 2017 by admin

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone. Most often, the culprits seek users' account login...
Read Full Story »

Posted in: Uncategorized,

Virtual Reality: What does It Mean for Your Business?

January 18th, 2017 by admin

Depending on your industry, modern virtual reality (VR) devices could offer impressive options to improve productivity. The video game industry, for one, has been a major player in pushing VR technology. Despite a handful of flops like Nintendo’s 1995 release “Virtual Boy,” products like the “Oculus...
Read Full Story »

Posted in: Uncategorized,

Boost Productivity and Security with Google's Cloud Applications

January 11th, 2017 by admin

For anyone unfamiliar with the Google Applications platform, Google Docs et al. are a Cloud-based spin on mainstay office suite programs that can help your staff work better together. With a zero-dollar price tag (compared with Microsoft Office's hefty annual subscription fees) and the potential to...
Read Full Story »

Posted in: Uncategorized,

Looking Forward: Cloud Services Costs and Opportunities

January 5th, 2017 by admin

If your small-to-medium business (SMB) isn't looking at ways to increase productivity through Cloud services, you could be missing out on exciting opportunities. But while the Cloud offers countless opportunities for business expansion, it can also taking up an ever-increasing share of your company's...
Read Full Story »

Posted in: Uncategorized,

A Primer on Phishing Attacks

December 21st, 2016 by admin

Phishing attacks are a dangerous and devastating method hackers use to steal personal information and accounts—primarily by striking the user instead of the machine. According to the APWG Phishing Activity Trends Report, the first quarter of 2016 saw an explosive 250 percent increase in phishing attacks,...
Read Full Story »

Posted in: Uncategorized,

The End of the Samsung Galaxy Note 7: Device Explosions Trigger Full Recalls

December 13th, 2016 by admin

In a rare move, Samsung fully recalled and discontinued production on its previously well-reviewed Galaxy Note 7 model following several verified cases of the devices catching fire. This unexpected turn of events has left a vacuum in the large smartphone and phablet product space. Businesses often...
Read Full Story »

Posted in: Uncategorized,

Antivirus Software: When One Is Better Than Two

December 7th, 2016 by admin

If your company’s antivirus software is letting you down, you should think twice before installing a second one on a computer: It may actually make things worse. Multiple antivirus programs working in conjunction on the same device is not a case of “the sum is greater than the parts” but rather “less...
Read Full Story »

Posted in: Uncategorized,

Hack of 500 Million Yahoo Accounts Reminds Industry to Increase Security Measures

November 23rd, 2016 by admin

In September 2016, half a billion Yahoo account users received the bad news that their names, email addresses, phone numbers, and security questions were potentially stolen in a 2014 hack. According to CNET, the Yahoo hack is the largest data breach in history. In the wake of a major hack like this...
Read Full Story »

Posted in: Uncategorized,

The Benefits of Backups

November 16th, 2016 by admin

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect. On the flip side, we’ve all breathed a sigh of relief when a recent backup of our computer...
Read Full Story »

Posted in: Uncategorized,

A Primer on Common, Helpful Device Adapters

November 11th, 2016 by admin

In September 2016, Apple announced that the iPhone 7 will not feature a 3.5mm jack—meaning anyone who wants to use standard headphones (or the credit-card scanning Square Reader) will need an adapter. Only time will tell if removing the century-old socket ends up being a step forward or a huge inconvenience....
Read Full Story »

Posted in: Uncategorized,

Massive IoT DDoS Attack Causes Widespread Internet Outages. Are Your Devices Secured?

November 1st, 2016 by admin

As you probably know already, the United States experienced its largest Internet blackout in history on October 21, 2016, when Dyn—a service that handles website domain name routing—got hit with a massive distributed denial of service (DDoS) attack from compromised Internet of Things (IoT) devices....
Read Full Story »

Posted in: Uncategorized,

Low Battery Life: Bringing Productivity to a Halt

October 26th, 2016 by admin

Work-disrupting messages like “please connect charger” and “plug in or find another power source” can be a huge source of frustration—not to mention a major productivity killer—for employees on the go. Nobody wants to see their phone battery go belly-up on their commute to the office, or while waiting...
Read Full Story »

Posted in: Uncategorized,

Think Manually Running Hard Drive Defragmentation Is a Big Deal? Think Again

October 19th, 2016 by admin

Good news: Your IT staff can stop running regular hard drive defragmentation on your office computers. Improvements in technology have rendered this decade-old practice largely irrelevant. One less thing to worry about, as far as we’re concerned. Hard drive defragmentation is a process in which files...
Read Full Story »

Posted in: Uncategorized,

Troubleshooting Step 1: Reboot

October 12th, 2016 by admin

While modern computers are much more stable than their ancestors, trying to get work done on a slow, malfunctioning computer is still a business world rite of passage. Troubleshooting bad behavior on your work computer can, of course, be a tedious process—so wouldn’t it be nice if there was one magic...
Read Full Story »

Posted in: Uncategorized,

Overloaded, Weak Signals: Alleviating Common Wi-Fi Bottlenecks

September 28th, 2016 by admin

If your staff is complaining about slow Internet access at your office, it’s time to consider how well the Wi-Fi network is configured. Slow Wi-Fi is best known, after all, for transforming an otherwise ideal work environment into a slow-boiling pot of aggravation. To increase productivity (and decrease...
Read Full Story »

Posted in: Uncategorized,

IoT Devices to Make Your Office More Efficient

September 21st, 2016 by admin

IoT devices have incredible potential to make your office more efficient. Previously we’ve discussed the caveats IoT devices bring to the workplace a few times, but today we’re going to focus on how these devices can increase productivity. It’s easy to fall back on the old mentality “If it ain’t broke,...
Read Full Story »

Posted in: Uncategorized,

Water-Resistant Smartphones Are Here: What You Need to Know

September 13th, 2016 by admin

Water-resistance probably isn’t on the feature checklist for your employee smartphones—but judging by how many of these devices meet an untimely end via liquid damage, it should be. It probably doesn't come as a surprise that dropping the device is the number one cause of smartphone damage at 30 percent;...
Read Full Story »

Posted in: Uncategorized,

Are Chromebooks Right for YOUR Business?

September 7th, 2016 by admin

Google’s Chromebook platform has the potential to replace traditional laptops and increase productivity for businesses, much like it has in the consumer market at large. For the uninitiated, Chromebooks are Cloud-oriented laptops that run most operations through the Google Chrome web browser instead...
Read Full Story »

Posted in: Uncategorized,

Are Comatose Servers Draining Your Wallet and Leaving You Vulnerable?

August 30th, 2016 by admin

Those old servers your business no longer uses—and keeps running anyway—are more than just a security risk: They’re hurting your firm’s bottom line. The term comatose server describes a functional server, connected to a network, that sits idle virtually all of the time. If your business is running...
Read Full Story »

Posted in: Uncategorized,

How To Select a Second Monitor

August 24th, 2016 by admin

Secondary monitors have incredible potential to increase productivity in the workplace. It might not seem like much, but minimizing, maximizing, and arranging application windows on a single computer monitor can take up a significant amount of time. Adding a secondary monitor increases the screen...
Read Full Story »

Posted in: Uncategorized,

Password Managers and Recovery Strategies

August 16th, 2016 by admin

Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process. Password managers store and, often, automate login credentials for individuals across all secured online platforms for easy, secure, and...
Read Full Story »

Posted in: Uncategorized,

Don’t Forget About Printer Security

August 9th, 2016 by admin

There was a time when printers—in your office or home—were considered relatively "simple" office equipment: plug it in, connect it to the local network, and keep the ink fresh, and there wasn't much else to worry about. But times have changed. Today's business printers—enterprise-level equipment...
Read Full Story »

Posted in: Uncategorized,

Looking at Data Storage Longevity

August 2nd, 2016 by admin

Not all storage devices were built to stand the test of time, so it’s important for every business to ensure its data is backed up on a reliable platform. If you’ve ever needed to reference financial records or court cases from a decade ago, you’ll know how much easy, reliable access to data can boost...
Read Full Story »

Posted in: Uncategorized,

Are “Bandwidth Hogs” Slowing Your Network?

July 26th, 2016 by admin

Last time, we talked about several handy do-it-yourself online tools to measure your office broadband speed. If your online connections aren't quite as fast as you expected from your service provider, don't be afraid to show them the "hard numbers" and ask for a solution. But what if those speed tests...
Read Full Story »

Posted in: Uncategorized,

Is Your Broadband Fast Enough? Here’s How to Check

July 19th, 2016 by admin

How fast is your company's broadband Internet speed compared to ten years ago? Chances are that while your online connection at work back then was faster than your first home Internet service (think of that annoying dial-up modem noise), if you tried using that "primitive" DSL at work today the relatively...
Read Full Story »

Posted in: Uncategorized,

Defend Your Network Against Advanced Persistent Threats

July 12th, 2016 by admin

If you've looked over our previous posts since we've started our blog, you know how serious we are about protecting your company from everyday cyber-threats—mainly phishing, ransomware, and various other malware. Today we'd like to discuss a different form of cyber-threat plaguing businesses over the...
Read Full Story »

Posted in: Uncategorized,

The “Wearable Revolution”: Is Your Company Prepared?

July 7th, 2016 by admin

It's a fair bet that one of your employees has already shown off a trendy new wearable gadget around the office. What began with Bluetooth earpieces would branch off into smartwatches, smart glasses, wrist-worn fitness trackers, and even smart clothing (including a smart bra!) Research firm Gartner...
Read Full Story »

Posted in: Uncategorized,

The “Seven Deadly Sins” of Ransomware

June 29th, 2016 by admin

  Readers of our blog over the past few years know we were among the first in the Bay Area to warn our customers about the growing threats of ransomware—from the emergence of CryptoLocker and CryptoWall to our federal government's startling admission that they're virtually powerless to stop it....
Read Full Story »

Posted in: Uncategorized,

Is It Time to Switch to Flash Storage?

June 21st, 2016 by admin

More and more businesses are switching their storage solutions from hard disk drives (HDDs) to solid state drives (SSDs) for one simple reason: the appeal of faster loading times and increased productivity. However, HDDs can still be the better choice in cases where maximum capacity is more important...
Read Full Story »

Posted in: Uncategorized,

Where's Your Company's WISP? Why You Need One NOW

June 14th, 2016 by admin

A WISP is one of the most important documents for any company doing business over the Internet—which, in this day and age, is pretty much everybody. Who's responsible for drafting and maintaining your company's WISP? Or are you even sure what a WISP is? If not, your company is already at serious risk...
Read Full Story »

Posted in: Uncategorized,

Data Sanitization: Are You Erasing Your Old PCs COMPLETELY?

June 7th, 2016 by admin

One of our pet peeves with some of our new customers is that once we come in to upgrade their IT network, they're careless about disposing their old hardware—specifically, their PC hard drives. They think that by simply deleting their existing files—email, customer records, and other sensitive or proprietary...
Read Full Story »

Posted in: Uncategorized,

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which expose confidential information of 500 or more individuals,...
Read Full Story »

Posted in: Uncategorized,

Windows 10 Free Upgrade Window Comes to an End

May 24th, 2016 by admin

Those “Upgrade to Windows 10” notifications seem to be showing up everywhere, even in the middle of a weather forecast on Iowa television. What would’ve otherwise been an embarrassing interruption turned into a watercooler moment that anyone who used Windows 7 and 8 over the previous year can relate...
Read Full Story »

Posted in: Uncategorized,

How To Choose a Desktop Monitor

May 17th, 2016 by admin

Let’s talk about desktop monitors. In many companies, large or small, an onboarding employee gets whatever display hardware might already reside in their assigned cube—no matter how old it is. But like most computer products, the technology is always improving, while costs for newer models are dropping....
Read Full Story »

Posted in: Uncategorized,

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's nothing wrong with sticking with "obsolete" hardware...
Read Full Story »

Posted in: Uncategorized,

URGENT: Uninstall QuickTime for Windows NOW

May 3rd, 2016 by admin

Today we'd like to pass along a critical security advisory to all our customers: If any of your company's Windows systems still retain Apple's QuickTime for Windows software, uninstall it immediately—as soon as you finish reading this post (if not before!). QuickTime was Apple's original media viewer,...
Read Full Story »

Posted in: Uncategorized,

Are Your Smartphones Properly “Containerized”?

April 26th, 2016 by admin

Earlier today the cashier at the local drive-thru miskeyed the amount of cash I gave him into his register. Somewhat sheepishly, he asked if I had a smartphone so I could verify the correct amount of change. Fortunately, I never leave home without it. In fact, how well could you function today without...
Read Full Story »

Posted in: Uncategorized,

Cybercrime Begins Over the Phone, Too—Don't Let Your Employees Forget

April 19th, 2016 by admin

If you've been a regular reader of our blog, you know we've spent plenty of time discussing phishing, malware, and other cybercrime. It's all part of our modern online world, and we know it will never really go away. We've talked about the tricks scammers use, from links in bogus emails to simply...
Read Full Story »

Posted in: Uncategorized,

The Best Way to Check Your PCs for Malware—Fast and FREE

April 12th, 2016 by admin

A couple months back, we touched on the story of our normally tech-savvy friend who got tricked into allowing his desktop PC to be infected with obvious malware. At first, he had the sickening feeling that comes with a virus-infected computer—but thanks to some quick thinking and online research, he...
Read Full Story »

Posted in: Uncategorized,

Prepare Now or Pay Later: More Ransomware Attacks in the News

April 7th, 2016 by admin

We're only a few months into 2016, but we've already seen two high-profile ransomware attacks—where cyber-crooks heavily encrypt a victim's computer files before demanding payment for a decryption key only they can provide. Two notable incidents grabbed headlines: In January, Israel's Electricity...
Read Full Story »

Posted in: Uncategorized,

The Latest Big Cyber-Threat: Are Your Servers “DROWN-proof”?

March 30th, 2016 by admin

If you think there's a new cyber-threat to worry about every week, you're probably right. The latest vulnerability to send shockwaves through the enterprise security community has been given a rather ominous acronym: DROWN, short for Decrypting RSA with Obsolete and Weakened eNcryption. Publicized...
Read Full Story »

Posted in: Uncategorized,

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. On March 4, researchers at security firm Palo Alto...
Read Full Story »

Posted in: Uncategorized,

IoT Devices: Security Holes?

March 15th, 2016 by admin

Hackers can take advantage of a newer technology prevalent throughout your business to break into your network and compromise security: Internet of Things devices. Your business may have never considered that the handy new Smart Thermostats throughout the building or the Smart TV in the conference...
Read Full Story »

Posted in: Uncategorized,

iPhone “Backdoor”? It Already Exists! Why Your Company Needs It

March 8th, 2016 by admin

February's big story in the tech world was the conflict between Apple and the FBI over the creation of a "backdoor" to retrieve encrypted data on iPhones. The government is looking for any clue as to what—or, more specifically, who—motivated Syed Farook, along with his wife, to gun down his San Bernardino...
Read Full Story »

Posted in: Uncategorized,

The Death (and Second Life) of a Replaced Business Smartphone

March 2nd, 2016 by admin

When it’s time to upgrade employee smartphones, your business needs to worry about backing up data, clearing the memory, and figuring out the best way to get rid of the old devices. According to Business Insider, the average smartphone upgrade cycle reached 22 months in 2012. This time frame could...
Read Full Story »

Posted in: Uncategorized,

Internet Explorer: Upgrade Your Relationship or Break Up?

February 25th, 2016 by admin

The end is here for all versions of Microsoft’s Internet Explorer outside of the most recent version. If your business is still using older versions of the browser, it’s important to switch to a different browser—or upgrade to maintain the latest in security and support. According to Microsoft, support...
Read Full Story »

Posted in: Uncategorized,

New Ransomware Good Reminder to Practice Thorough Data Backup

February 17th, 2016 by admin

A new combination of a sophisticated password-stealing Trojan, powerful exploit kit, and content-encrypting ransomware is making its way around the Internet infecting Windows users. If it hits your business, you’re looking at a considerable loss of time and finances. It’s estimated that businesses...
Read Full Story »

Posted in: Uncategorized,

Upgrading to Windows 10: Why You Should (Still) Wait

February 11th, 2016 by admin

We were as optimistic as anyone about Microsoft's long-awaited release of the Windows 10 operating system. As we discussed last May, we looked forward to real improvements—chiefly a better desktop interface—over its widely unloved predecessor, Windows 8.1. At the same time, we hoped Microsoft had learned...
Read Full Story »

Posted in: Uncategorized,

The Dangers of Free Public Wi-Fi: How To Protect Your Network

February 2nd, 2016 by admin

How dependent have you and your employees become on public Wi-Fi outside the office? Mobile hotspots are almost everywhere now—from coffee houses and fast-food restaurants to hotels and airports (and even aboard most planes). Without Wi-Fi access, many of us feel alarmingly "disconnected"—as if we've...
Read Full Story »

Posted in: Uncategorized,

Transitioning to the Cloud? “Know Before You Go”

January 26th, 2016 by admin

The Cloud is here to stay—and growing before our eyes. Even the customer segment that the marketing world terms late adopters—the last people to "get on the boat" of tech trends—are finally taking a hard look at migrating at least some of their IT to Cloud-based apps. One big reason is that their...
Read Full Story »

Posted in: Uncategorized,

Ransomware Is Getting Even Worse... and The Feds Can't Stop It

January 21st, 2016 by admin

As chaos reigns across much of the Middle East, our government steadfastly insists that "the United States does not negotiate with terrorists—because it will only encourage them in the future." Meanwhile, visitors to our National Parks are warned never to feed bears and other wildlife—because those...
Read Full Story »

Posted in: Uncategorized,

Standing Desks: Could They Improve Your Workplace?

January 12th, 2016 by admin

It's been talked about everywhere from the New York Times to Men's Health and Women's Health: Sitting at a desk all day may be dangerously unhealthy. Medical studies conducted around the world support the same conclusion: When a human body remains seated and inactive, it quickly enters its own "power-saving...
Read Full Story »

Posted in: Uncategorized,

Fake Phishing: The Ultimate Security Training?

January 5th, 2016 by admin

What is the current state of your company's IT security training program—if you have one? Many companies settle for an annual group training session to broadly review the major types of cyber-threats—viruses, malware, and phishing. The problem with once-a-year "standardized" training is that once...
Read Full Story »

Posted in: Uncategorized,

Macs Are Here to Stay. How Well Are You Managing Them?

December 16th, 2015 by admin

Before you take your teenage kids to see the new Steve Jobs biopic, ask them what Jobs' first successful product was. Don't be surprised if they answer "the iPod"! For most of their generation, the original Macintosh is ancient history. Today's Mac computers don't command prime Apple Store floor space...
Read Full Story »

Posted in: Uncategorized,

Blurring the Lines: Hybrid Devices in the Workplace

December 10th, 2015 by admin

Apple announced the iPad Pro in September of 2015. Microsoft announced the Surface Book just a month later. Both devices are blurring the lines between tablets and laptops, offering interesting new opportunities for technology use in the workplace and resolving many of the issues present in the current...
Read Full Story »

Posted in: Uncategorized,

Busting Dust: The Overlooked Cause of Crashes

December 2nd, 2015 by admin

Your business can take a productivity hit and incur unnecessary expenses because of a very common, often overlooked problem: dust buildup in computers. Dust inside computers can decrease their efficiency and even their operational lifespans. These microscopic particles are everywhere—and unless your...
Read Full Story »

Posted in: Uncategorized,

The Future of Fingerprint Authentication… Is There One?

November 24th, 2015 by admin

Earlier this year, the U.S. government revealed a massive cyber security breach which may well bump the infamous Target and Sony attacks down to "small potatoes." The database of the Office of Personnel Management (OPM)—essentially a central HR department for most federal agencies—was hacked multiple...
Read Full Story »

Posted in: Uncategorized,

Mobile Security Exploits: Surviving the BYOD Environment

November 19th, 2015 by admin

IT professionals are more concerned than ever about malicious software infections since smart mobile devices hit the mainstream. Many businesses have been relatively open to the idea of integrating smart devices into their workflow as a way to increase productivity. But news headlines have been quick...
Read Full Story »

Posted in: Uncategorized,

Email Encryption: The Basics

November 12th, 2015 by admin

Chances are you probably have a few USPS "forever" stamps that have been sitting in your desk drawer for a while. When was the last time you actually used them to "snail mail" something—a bill payment or an important letter? Most bills are paid online these days, and most of our day-to-day correspondence...
Read Full Story »

Posted in: Uncategorized,

Treat Your Network As If It’s ALREADY Been Hacked

November 5th, 2015 by admin

Weak IT security generally revolves around the following theory: "We'll keep hackers out of our network—everything's okay until something bad happens." But strong security operates from an assume breach mindset: The hackers have already infiltrated our network, probably for a while now—where and...
Read Full Story »

Posted in: Uncategorized,

Playing It Safe with Windows 10: Upgrading or Maintaining Your OS with Minimal Pain

October 27th, 2015 by admin

Now that the dust has settled around the release of Windows 10, your SMB may be looking to increase productivity by upgrading your OS. Still, you should proceed with caution. The latest version of the operating system offers a more secure computing environment, better disaster recovery options, and...
Read Full Story »

Posted in: Uncategorized,

Lessons of Ashley Madison: How “Crackable” Are Your Passwords?

October 20th, 2015 by admin

The well-publicized recent hack of the Ashley Madison website will probably earn a spot in a "Hacking Hall of Shame"—alongside the infamous Sony and Target breaches—for the sheer amount of grief it may cause millions of marriages. Most of the blame lies with the Ashley Madison administrators for leaving...
Read Full Story »

Posted in: Uncategorized,

3 Incredible Benefits of Protecting Your Cloud Data with Two-Step Verification

October 16th, 2015 by admin

Online security breaches can be expensive and productivity-killing events. When a nefarious third party acquires an employee password, it’s no party at all. Many online businesses have begun using Two-Step Verification, also known as Two-Factor Authentication, to introduce an extra layer of protection...
Read Full Story »

Posted in: Uncategorized,

The “Redirect to SMB” Bug: New Windows, Same Danger

October 6th, 2015 by admin

The big news out of Microsoft over the past couple of months is the much-ballyhooed release of Windows 10. While “Win10” finally addresses those annoying shortcomings of its predecessor Windows 8 (as we've discussed), it still hasn't corrected a dangerous security flaw known in cybersecurity circles...
Read Full Story »

Posted in: Uncategorized,

What You Don’t Know CAN Hurt You: The Dangers of Shadow IT

September 18th, 2015 by admin

Last spring, Hillary Clinton received a barrage of criticism after it was revealed that she used a private email server during her tenure as Secretary of State—seemingly at odds with government security protocols, if not federal laws. Clinton would go on to publicly dismiss the controversy, saying...
Read Full Story »

Posted in: Uncategorized,

BYOD Is Here: Where’s Your Company Policy?

September 11th, 2015 by admin

Once upon a time, IT administrators offered company-issued hardware to employees based upon something akin to Henry Ford's "Model T" approach: "You can have any equipment you want, as long as it's whatever we have for you." In light of the mobile/Wi-Fi revolution over the past few years, times have...
Read Full Story »

Posted in: Uncategorized,

IPv6: Heard of it? You Will...

September 4th, 2015 by admin

In our ever-expanding universe of high-tech acronyms, perhaps one you've recently heard is IPv6. What exactly is it? Why do some IT people embrace it as the foundation of a "new Internet," while the mere mention of it gives others an instant headache? First, think back to the "good old days" decades...
Read Full Story »

Posted in: Uncategorized,

Desktop-as-a-Service: Start with the Right Roadmap

August 27th, 2015 by admin

In this third installment of our blog series on Desktop-as-a-Service (DaaS) and Cloud-hosted virtual workspaces, we'd like to pass along a few pointers about when and how to plan a successful structured deployment within your organization. Everything starts with a plan. When is it time to think about...
Read Full Story »

Posted in: Uncategorized,

Hidden Costs of DaaS Service? Know What to Look For

August 19th, 2015 by admin

Back in July, we talked about the emergence of Cloud-based Desktop-as-a-Service (DaaS). From overall cost to scalability, mobility, and security, more IT decision-makers are recognizing DaaS as simply a better alternative to traditional networks of standalone computers. As with any other new technology,...
Read Full Story »

Posted in: Uncategorized,

The Importance of Being Proactive: Why You Need A Breach Response Plan

August 6th, 2015 by admin

Each month, Microsoft releases a new security bulletin. In May of 2015, forty-six vulnerabilities had been identified and fixed, spanning products such as Windows, Internet Explorer, and Office. In June, it was even more. While some of these vulnerabilities were low-threat, others were more critical,...
Read Full Story »

Posted in: Uncategorized,

DaaS and the Virtual Workspace: The Next Big Thing?

July 30th, 2015 by admin

We've recently received quite a few questions regarding "virtual workspaces." Particularly in light of the imminent release of the next version of Windows (which, as we've discussed, won't come cheaply for enterprise users), will virtual workspaces be a cost-effective alternative to full computers...
Read Full Story »

Posted in: Uncategorized,

Is Your Server Room Too Noisy? Take Steps to Fix It

July 22nd, 2015 by admin

When we conduct our complimentary IT assessment for a prospective customer, one question we're frequently asked is "Can we do anything to cut down on the noise in our server room?" Most older office facilities in the Bay Area simply weren't designed to accommodate heavy computer equipment operating...
Read Full Story »

Posted in: Uncategorized,

Malvertising: The Next Big Cyber Threat

July 16th, 2015 by admin

We've spent plenty of time here talking about safeguarding your company against phishing and other forms of cyber-attack. As we've discussed, the first line of defense against phishing is to make sure your employees remain vigilant by avoiding email links and shady websites. But there's a bigger threat...
Read Full Story »

Posted in: Uncategorized,

Small Business Disaster Recovery Solutions

July 10th, 2015 by admin

“Disaster”: the word itself is synonymous with trauma. Of course, even after a traumatic event, there is an opportunity to rebuild. Restoring your data is a critical part of rebuilding your infrastructure and your business after a physical or virtual disaster. For businesses, especially small- to medium-sized...
Read Full Story »

Posted in: Uncategorized,

Time To Think About Your Company's Next Tech Refresh?

June 24th, 2015 by admin

As the Bay Area moves into the warmest months of the year, you can enjoy the summer knowing your annual home spring cleaning is behind you—when you tackled all those chores in (literally) one clean sweep over a weekend. With that taken care of, now’s a good time to review your company's tech refresh...
Read Full Story »

Posted in: Uncategorized,

The Cloud: An Eco-Friendly Alternative?

June 11th, 2015 by admin

April 22 marked the annual worldwide observance of Earth Day. This made us think about the role small businesses play in the "Go Green" movement. Many companies have a genuine concern for preserving our planet's natural resources—even if many hotels use going green as a convenient excuse not to provide...
Read Full Story »

Posted in: Uncategorized,

It's Nice to Be Important, But It's More Important to Be Nice

June 4th, 2015 by admin

Let's face it—the humor on Saturday Night Live is pretty much hit-or-miss these days. But one classic SNL sketch from the late '90s remains our favorite: Nick Burns, Your Company's Computer Guy. Why are Nick's condescending remarks toward his fellow employees so darned funny? Because so many of us can...
Read Full Story »

Posted in: Uncategorized,

Is Tape Storage (Completely) Dead?

May 28th, 2015 by admin

If you're over 40, you probably remember the original Sony Walkman—the freedom of listening to a single cassette tape in portable stereo. Even if you still have a few favorite cassette tapes packed away somewhere, where could you listen to them today? Tape is just so… ancient. Ask your kids. Magnetic...
Read Full Story »

Posted in: Uncategorized,

Cyber Insurance: Good for my Company?

May 20th, 2015 by admin

We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover you've still been hacked? An insurance policy...
Read Full Story »

Posted in: Uncategorized,

Changes Ahead for Windows: A First Look

May 13th, 2015 by admin

It was about a year ago that Microsoft officially ended support (most importantly, automatic security patches) for Windows XP. Particularly for business users, running a computer on XP after April 8, 2014, became about as wise as leaving keys dangling from the front door. Many XP die-hards stuck it...
Read Full Story »

Posted in: Uncategorized,

Apple TV for Presentations in the Workplace

May 1st, 2015 by admin

Apple TV, typically used as a video content streaming device for Netflix, YouTube, and iTunes, is fairly common in homes across the U.S. However, this crafty little device that can fit in your palm also has some impressive applications in an office setting through its AirPlay screen mirroring features....
Read Full Story »

Posted in: Uncategorized,

Know Your Enemy: These New Phishing Schemes are Hard to Spot

April 16th, 2015 by admin

A friend called me recently to gripe about his personal email account. His ISP has done a pretty good job of virtually eliminating the annoying spam he used to receive (remember your inbox way back when?), but now he's the target of two particularly relentless phishing schemes I'd like to share with...
Read Full Story »

Posted in: Uncategorized,

Uncle Sam Won't Stop Cyber-Crime—It's Up To You

April 1st, 2015 by admin

You probably know President Obama recently hosted a high-profile cyber-security summit at Stanford. The basic idea was to discuss how to expand the federal government's role in combating cybercrime against American businesses—from simple theft to outright corporate terrorism. As you'd expect, most of...
Read Full Story »

Posted in: Uncategorized,

The $100,000 Phone Bill: Is Your Office VoIP Phone System the Next Target?

March 20th, 2015 by admin

How would you react if your company's next phone bill revealed a major cost spike—to the tune of over $100,000? It's actually happening now to small businesses across the U.S., thanks to international VoIP toll fraud—perhaps the fastest growing cyber-threat today. While many small companies have adopted...
Read Full Story »

Posted in: Uncategorized,

Welcome to the IoT: Will Your TV Be Watching YOU?

March 12th, 2015 by admin

We've talked recently about the potential dangers of the rapidly expanding Internet of Things, or IoT. As we discussed, the IoT consists of embedded sensors collecting data from dozens of devices in your daily life—your car, your health and fitness equipment, and even your home thermostat. All that...
Read Full Story »

Posted in: Uncategorized,

Is Your Law Firm HIPAA Compliant? Should It Be? Are You Sure?

March 4th, 2015 by admin

When the Health Insurance Portability and Accountability Act (HIPAA) took effect in 1996, a number of legal "gray areas" existed in that original law. At the top of the list: to what extent was a law firm obligated to protect the confidentiality of Protected Health Information (PHI) stored in their...
Read Full Story »

Posted in: Uncategorized,

Do Surveillance Cameras Always Keep Your Company Safer? You'll Be Surprised

February 20th, 2015 by admin

You probably remember the 2001 blockbuster remake of Ocean's Eleven starring George Clooney and Brad Pitt. While George and Brad's grand scheme—robbing a secret multi-casino vault underneath the Las Vegas Strip—may have been pure Hollywood, a key element of the plot is actually quite realistic, if not...
Read Full Story »

Posted in: Uncategorized,

Surprising New Study: Email an Essential Cross-Generational Business Asset

February 12th, 2015 by admin

What was cutting-edge in the 1990s is still relevant today — at least, when it comes to Email technology. According to a new PewResearch report, 61 percent of office workers say Email is “very important” to their work productivity. That same study placed the Internet and landline phones at 54 and 35...
Read Full Story »

Posted in: Uncategorized,

Disaster Recovery: Smart Ways to Work Around a Broken System

February 4th, 2015 by admin

Computers have a knack for breaking at the most inconvenient time. Murphy’s Law is alive and well. But you don’t need to wait for IT repairs in order to get an employee back to work: smart techniques and planning can minimize your downtime so you can maintain productivity and take back otherwise lost...
Read Full Story »

Posted in: Uncategorized,

Watch Out! Protect Your Home and Office against the Internet of Things

January 28th, 2015 by admin

Internet of Things (IoT) devices provide a powerful way to utilize technology to enhance everyday machines in your home or office, from wrist fitness bands to refrigerators to thermostats. The ability to monitor your home security cameras while you’re on vacation, or tell your coffee machine to skip...
Read Full Story »

Posted in: Uncategorized,

The Cloud: A Better IT Choice for Law Firms… or Not?

January 21st, 2015 by admin

Several years since you probably first heard about it, "the Cloud" remains among the trendiest buzzwords in the tech world—particularly here around Silicon Valley. Several of our Bay Area law firm clients have approached us asking if migrating their IT into the Cloud is the right choice for them, especially...
Read Full Story »

Posted in: Uncategorized,

Stay Productive with IT Managed Services

January 14th, 2015 by admin

It doesn’t take a psychic to know that one of your business goals is improving efficiency and productivity. You can do both with an IT managed service provider. MSPs specialize in finding technical solutions to streamline your work environment and preemptively stop work interruptions. The end goal of...
Read Full Story »

Posted in: Uncategorized,

'Tis the Season—for Small Business Cybercrime. Here’s How to Protect Your Company

January 7th, 2015 by admin

The holiday season means more than shopping and gift giving. It also now marks prime season for cybercriminals and hackers around the world — and they're coming after small businesses in the U.S. "Targeting" Target—via Small Businesses You may have seen a segment on the November 30 broadcast of 60...
Read Full Story »

Posted in: Uncategorized,

Increase Productivity with Cloud Systems

December 23rd, 2014 by admin

Cloud-based applications have the potential to increase productivity for your business. By de-localizing your computing resources, your employees can benefit from ease of access, broader device compatibility, and reliance on local hardware. IT Managed Service Providers are available today to help you...
Read Full Story »

Posted in: Uncategorized,

Stay Productive with IT Managed Services

December 12th, 2014 by admin

It doesn’t take a psychic to know that one of your business goals is improving efficiency and productivity. You can do both with an IT managed service provider. MSPs specialize in finding technical solutions to streamline your work environment and preemptively stop work interruptions. The end goal of...
Read Full Story »

Posted in: Uncategorized,

Close Enough to Know You, Small Enough to Serve You

November 13th, 2014 by admin

If you've been reading our blog for a while, you know why we believe managed IT services are the smart choice over "going it alone" — particularly for a small business. Over the past few years alone, we've seen several major tech companies — some of the really big names — branch out into the outsourced...
Read Full Story »

Posted in: Uncategorized,

Disaster Recovery: Is Your Data Protected From the Next Catastrophe?

November 6th, 2014 by admin

Last month, the Bay Area commemorated the 25th anniversary of the Loma Prieta earthquake. Those of us who lived through that experience remember the sudden, unexpected jolt — and how the event disrupted our lives for several weeks afterward. Of course, we were a lot less reliant on technology back in...
Read Full Story »

Posted in: Uncategorized,

Handling Your Growing Network with IT Managed Services

October 31st, 2014 by admin

Small and medium-sized business (SMB) computer networks are more of a living project than a one-and-done IT expense. Network-focused IT managed services guides you through the possibilities and challenges presented by changes in personnel and office environments that can squeeze your bandwidth and...
Read Full Story »

Posted in: Uncategorized,

The Ultimate IT Provider Checklist for Financial Service Firms and Investment Advisors

May 3rd, 2014 by admin

Registered Investment Advisories and other Financial Service Firms Must Choose an IT Provider Wisely Effective and reliable Information Technology plays a critical role in running a Registered Investment Advisory (RIA) firm or other financial services firm. Best-in-class technology systems are necessary...
Read Full Story »

Posted in: Uncategorized,

Homeland Security Issues Warning Over Serious Internet Explorer Bug

April 30th, 2014 by admin

Serious Security Flaw Found in IE A security flaw or bug has been discovered in Microsoft Internet Explorer (IE), which affects all versions of IE from 6 to 11. This flaw allows a hacker to potentially gain access to your computer and hard drive when a bad link be clicked. At this time, the U.S. Department...
Read Full Story »

Posted in: Uncategorized,

Use IT to Increase Workplace Productivity - Get the Whitepaper!

April 21st, 2014 by admin

It is vital that Information Technology enhance workplace productivity, rather than hinder it. With proper IT systems and management in place, it is possible to accomplish your work faster and with far less risk of downtime and technology inefficiencies. A productive IT environment also helps increase...
Read Full Story »

Posted in: Uncategorized,

Critical Action Points to Protect Yourself from Heartbleed Bug Vulnerability

April 11th, 2014 by admin

We don't want to inundate you with more background information about the Heartbleed bug (you've been bombarded with it across the internet and daily news since it was announced Tuesday!), but rather outline the critical takeaways and action points you should take right now to protect yourself from possible...
Read Full Story »

Posted in: Uncategorized,

R.I.P. Windows XP. Current Users Now at Greater Cyber Risk

April 8th, 2014 by admin

Microsoft Corporation has just announced it will stop supporting Windows XP, one of the world's most popular and successful operating systems. Though Microsoft XP will not magically disappear from the desktops of anyone currently using it (which is a LOT of people!), Microsoft will stop supporting it....
Read Full Story »

Posted in: Uncategorized,

Beware Email Spoofing! Protect Yourself Now!

April 4th, 2014 by admin

We have recently seen a rise in a disturbing phishing scam called email spoofing. Email Spoofing A spoof email is an email that looks as if it came from a trusted friend or acquaintance, but is actually malicious in nature. These emails are particularly nasty because they really look like they are...
Read Full Story »

Posted in: Uncategorized,

Happy 31st Birthday, MPA Networks!

April 1st, 2014 by admin

We are incredibly proud to launch into our 32nd year of business today! Thank you to our clients and wonderful team for making MPA Networks all it is today. "Without an amazing team, this simply does not happen," says Michael Price, CEO. Please take a look at our 30-year Anniversary timeline for more...
Read Full Story »

Posted in: Uncategorized,

Three Misconceptions about Cloud Computing Every SMB Owner Should Know

March 27th, 2014 by admin

By this point, nearly every small and medium sized business owner has heard of the cloud and has a basic understanding of cloud computing. A majority of them have probably even considered moving their data and applications to the cloud, not wishing to appear behind the times to both clients and employees,...
Read Full Story »

Posted in: Uncategorized,

To Cloud or Not to Cloud: a Heated IT Debate

March 18th, 2014 by admin

With all the hype surrounding cloud computing, it may seem like any business that is NOT in the cloud is woefully behind the times. As an IT Managed Services Provider, we hear the following questions from clients and prospective clients all the time: "Should we move to the cloud?" "The cloud is faster...
Read Full Story »

Posted in: Uncategorized,

MPA Networks Named to CRN's Pioneer 250 List of Top US Managed Service Providers

February 24th, 2014 by admin

We are thrilled to be named to CRN’s Managed Service Provider (MSP) 500 list as one of the MSP Pioneer 250. CRN is the leading media outlet for technology vendors and solution providers attempting to understand sales and service channels. The annual list recognizes the top technology providers and consultants...
Read Full Story »

Posted in: Uncategorized,

Use IT Standardization to Enhance Workplace Productivity and Limit Downtime

February 22nd, 2014 by admin

What is IT Standardization? Standardization refers to the general uniformity of desktops and laptops across an entire business. Ideally, all workstations and laptops should be identical (or as identical as possible), including uniform software versions and configurations. This process of standardization...
Read Full Story »

Posted in: Uncategorized,

How do I Love my Managed Service Provider? Let me Count the Ways

February 14th, 2014 by admin

In honor of Valentine's Day, let's take a moment to spread some MSP love and appreciate IT Services providers everywhere. How do I love my Managed Service Provider and hotshot team of network support engineers? Let me count the ways:   They deliver IT Peace of Mind.  They give technology therapy...
Read Full Story »

Posted in: Uncategorized,

3 Tips to Leverage Your IT Labor Costs

February 7th, 2014 by admin

I'll make a decent bet that your greatest Information Technology costs are not related to hardware and software. In fact, they're probably not related to physical technology at all. What is Your Greatest IT cost? Support labor! IT labor costs can be incredibly expensive, especially when an IT Services...
Read Full Story »

Posted in: Uncategorized,

Want Information Technology with Strong ROI? Take this Critical First Step.

January 30th, 2014 by admin

Escape the Dreaded 'IT Money Pit' Information Technology is the backbone of modern business - it is the infrastructure on which businesses run and employees work. It is the wheel that keeps everything rolling smoothly. As such, it makes perfect sense our IT should be reliable and contribute to solid...
Read Full Story »

Posted in: Uncategorized,

The Remarkable Truth about Information Technology and your ROI

January 24th, 2014 by admin

If we asked you a very simple question — what is Information Technology? —  how would you respond?  What would come to mind? We're guessing you would focus on computers, flashing lights, monitor screens, and server rooms, right?  Perhaps even throw in printers, phone systems, and mobile devices - really...
Read Full Story »

Posted in: Uncategorized,

Resolve to Maximize IT Productivity in 2014!

January 16th, 2014 by admin

The new year's festivities have come and gone, and for better or worse, it's time to get back in the saddle. This first month back at work is the perfect time to consider business goals for the coming year and determine how to make your business more productive, profitable, and enjoyable for you and...
Read Full Story »

Posted in: Uncategorized,

Important IT Security Message for MPA Networks’ Clients

December 19th, 2013 by admin

One Malicious Email Could Cost you Thousands of Dollars and Take Down your Entire Network – Don’t be a Victim; Learn the Facts! Ransomware viruses are on the rise and their explosive growth in the past few months has been startling.  We want to help our clients be up-to-date on this issue and understand...
Read Full Story »

Posted in: Uncategorized,

Quiz Answers - Can you Find the Malicious Email?

December 18th, 2013 by admin

Ready for the answers to our quiz? Drumroll please... Every single email is malicious EXCEPT for this one: “eFax message from “4082459385″. 1 page(s). Caller-ID: 408-245-9385″  -  eFax Yep, that eFax message is 100% legitimate! Now let's discuss why Unless you are an eFax client and know what their...
Read Full Story »

Posted in: Uncategorized,

Quiz - Can you Find the Malicious Email?

December 12th, 2013 by admin

Can you Spot the Malicious Emails/s?! After reading through our Cryptolocker and Ransomware blog series and learning how to identify a malicious email, it's time to put your new virus sleuthing skills to the test. Read through the list of email subject lines and from names below.  Which email/s  are...
Read Full Story »

Posted in: Uncategorized,

How to Identify a Malicious Email

December 4th, 2013 by admin

Continuing our blog series about Cryptolocker and Ransomware virus attacks, it is necessary we explain the basic fundamentals of identifying a malicious email or attachment. Only through education and proper awareness can we effectively avoid Ransomware and other malware attacks. Identifying a Malicious...
Read Full Story »

Posted in: Uncategorized,

The Single Most Reliable Method for Preventing a Ransomware Attack

December 3rd, 2013 by admin

Last week, we wrote about the rise of Cryptolocker and Ransomware viruses, the new breed of malware virus infecting host computers through malicious email attachments, and spreading rapidly through its use of commercial-grade RSA encryption and Bitcoin, a universal, virtual currency. Unfortunately, it...
Read Full Story »

Posted in: Uncategorized,

Protect your Business from Cyber Threats with this 5 Point Checklist

November 21st, 2013 by admin

  About half of all small business owners believe their business is too small to be a potential victim for virtual thieves and hacking. The facts, however, say something quite different. The majority of cyber attacks are actually perpetrated against businesses with fewer than 100 employees....
Read Full Story »

Posted in: Uncategorized,

Cryptolocker & Ransomware - What You Need to Know

November 15th, 2013 by admin

CryptoLocker CryptoLocker is a new, and particularly malicious, breed of ransomware discovered only a couple months ago. CryptoLocker is a Trojan horse malware that encrypts and restricts access to the infected computer while demanding payment for the recovery and decryption of files, typically within...
Read Full Story »

Posted in: Uncategorized,

5 Things you should do TODAY (and everyday) to preserve your IT systems

November 6th, 2013 by admin

The 5 basic tips below are essential to maintaining the health and efficiency of your network, servers, and computer systems. Please consult an expert IT Consultant or Managed Service Provider for more information about protecting your IT systems. 1. BACKUP - Data loss is a very real threat and can...
Read Full Story »

Posted in: Uncategorized,

How a Managed Service Provider Can Increase ROI and Influence Long-Term Business Success

September 30th, 2013 by admin

Partnering with a Managed Service Provider (MSP) is one of the most important decisions you can make to ensure the longevity and productivity of your SMB. Why? An experienced MSP is a true business partner, reduces and streamlines IT costs, and takes a proactive approach to your IT and long-term business...
Read Full Story »

Posted in: Uncategorized,

4 Crucial Benefits of a Managed Service Provider

August 27th, 2013 by admin

Managed Service Providers - or MSPs - are tasked with the critically important job of managing IT to help businesses run smoothly. Information Technology is the foundation upon which businesses operate, communicate, and grow, and must therefore be well monitored and cared for. What many business owners...
Read Full Story »

Posted in: Uncategorized,

The Real Cost of IT Downtime

August 18th, 2013 by admin

Downtime - it isn't always what you think! When you think downtime, I'm sure you're picturing the results of a total IT disaster - perhaps a flood destroying the server room or a malicious virus that hacks the network, forcing everyone to close up shop. This is the kind of downtime that may take...
Read Full Story »

Posted in: Uncategorized,


Back to Top

Copyright © 2019 MPA Networks, Inc.

Atomic8Ball Web Presence Management