Posts by amadden

Outsourcing? Not Only OK – It Can Save Time and Money!

Outsourcing? Not Only OK – It Can Save Time and Money!

By on Jan 10, 2020 in Technical | 0 comments

Almost by definition, small business owners and entrepreneurs cringe at the concept of outsourcing. Those who start their own companies like the control and autonomy it provides them. Unfortunately, that preference for control and autonomy may have some bad side effects when it comes to managing the IT infrastructure of their business. Small business don’t...

Read More
Understanding Managed Services and Their Benefit to SMBs

Understanding Managed Services and Their Benefit to SMBs

By on Dec 17, 2019 in Technical | 0 comments

Small to medium sized businesses (SMBs) receive a lot of calls each day from slick sales people peddling the next technology trend that’s going to save them money and revolutionize how they do business. They’re all too quick to caution that if you don’t listen to them, you’ll fall behind the times, and eventually be swimming in a sea of debt...

Read More
Five Tips to Deflect a Ransomware Attack

Five Tips to Deflect a Ransomware Attack

By on Oct 21, 2019 in Security | 0 comments

Ransomware is malicious software designed to lock computers or data storage until a ransom is paid – keyword malicious. The cyber-criminals who write the code for these attacks mean business, to the tune of millions of dollars lost annually. Here are five tips that could help deflect a ransomware attack on your small to medium sized business.

Read More
5 Tips to Spot a Phishing Email

5 Tips to Spot a Phishing Email

By on Jul 24, 2019 in Security | 0 comments

Phishing emails are an attempt to obtain sensitive or personal information such as usernames, passwords, financial or personal details by scammers who have disguised themselves as a legitimate business or person. The intent is to use this information for illegal purposes. While the hacking world is constantly changing and evolving its methods to fool the end user, below are 5 things to look for that are immediate red flags an email is a phish.

Read More