Blog

How Apple made FaceTime and iMessage safer

How Apple made FaceTime and iMessage safer

We have become acclimatized to ever-present threats to the security of the information and files we share and store online. But we all still want our data to be as secure as possible and, following high-profile breaches such as the celebrity photo leaks of 2014, if anything the issue of online security is even more prominent in our minds.

How to plan for IT disasters

How to plan for IT disasters

Disasters, whether man-made or natural, can happen to anyone. While most people will admit this, a lot of us still have the mindset of “it won’t happen to me.” However, according to one study, storms and extreme weather alone have personally affected one-third of small business owners.

How to virtualize for newbies

How to virtualize for newbies

Virtualization…the very sound of the word may have you excited about the new opportunities it holds, or your heart pounding in fear of a foreign technology that sounds far too scary. Whatever the case, virtualization isn’t going anywhere. Thousands of businesses are taking advantage of its ability to cut costs and free up office space.

Microsoft’s Power BI is now free

Microsoft’s Power BI is now free

We’re all familiar with Excel. It’s safe to say that it’s a great tool for tracking data. But what if there was a way to keep track of information from not only Excel, but a multitude of frequently used applications and services? And what if you could find this information by typing a simple phrase such as, “sales for [new product name here] 2014”? Microsoft has made this possibility a reality.

3 IT security take-aways from the Sony hack

3 IT security take-aways from the Sony hack

Any business can become the victim of security breaches on a mass scale, as shown by the debacle which recently eclipsed Sony and forced it to temporarily cancel the release of blockbuster movie The Interview. Beneath the dramatic headlines are lessons for small business owners everywhere in how simple errors in IT security management can have grave consequences.