Blog

Why Peter Pan’s cloud migration would thrive

Productivity, collaboration, freedom. These words are often touted when the benefits cloud technology are mentioned. But do all businesses that make the cloud switch achieve these? Unfortunately the answer is no. Some businesses flounder in the new technology, and some even become less productive because of it. So how can you avoid such a fate? […]

Aspects of virtualization: licenses

Software licensing has been a thorn in everybody’s side for as long as we can remember. It’s no surprise that as software begins to help us to consolidate and combine pieces of hardware through virtualization, we’re confronted with this problem yet again. SMBs are often unfortunate victims of licensing models that favor individual or enterprise […]

Engage your audience with Google Slides

Slideshow presentations are only as good as the tools used to create them. With Google’s recent update to its Slides software, that baseline just got a huge boost. One of the biggest advantages of Google’s Drive software suite are the cloud-based features, and with the newest update to the Slides program you can explore a […]

5 tricks for thwarting VoIP threats

May 23rd, 2016 VoIP

As SMBs continue their steady transition away from traditional telephony services in favor of VoIP, threats of cybercrime and fraud are more common than ever before. Risks to VoIP systems are distinctly unique from those posed to your other networks and understanding how to combat them is critical. Here are 5 tips for securing your […]

How business continuity plans can fail

Just because your IT provider has a plethora of awards and certifications under its belt doesn’t mean that you can blindly hand over your business’s future to them. Often times, there are some aspects in your business continuity plan that tend to be overlooked by your provider. We have rounded up some of these issues […]

Are your site’s images hiding an attack?

ImageMagick, one of the internet’s most widely used image processing services, is susceptible to attacks that may put your site at a huge risk of exploitation, according to recent reports. The discovery of this vulnerability means attackers could potentially steal your site’s data, or corrupt it entirely. Let’s take a look at what your SMB […]

A more secure cloud-based Microsoft Office

Earlier this month, Microsoft made a huge announcement regarding Office that hasn’t received much attention. While there is a lot of interest in web-based versions of Microsoft Office, many organizations avoided the Office Online services for fear of compromising their privacy and security. However, they’ve announced a new version that allows businesses to host an […]

IFTTT connects the apps you love.

Create simple connections between apps like Facebook, Dropbox or Gmail – or any physical device that links to the web, such as your fridge, thermostat or light dimmers. The beautifully simple concept "IF This, Then That" connects a Trigger (If This) with an Action (Then That). For instance, a movement detected by your Nest camera at home sends you an e-mail, text or other warning.

Fear Not!

There is a Japanese proverb, "Fear is only as deep as the mind allows."

Fear, while an instinctual part of each and every one of us, should not control us or drive our actions, except in the case of extreme danger, like being attacked by a shark or other such creatures.

Your #1 Data Security Threat (And How To Defeat It)

If you thought spam (junk e-mail) was just an annoying nuisance, think again.
Unfortunately, human beings communicating by e-mail often turn out to be the weakest link in your network's defenses. That's why cybercriminals often rely on spamming to inject their toxic code into their victims' computers.

ClickCease