Blog

Utilizing Google’s Cloud Print service

When you picture cloud computing and printing devices, you might think of endless copies of clouds flying out of the printer. But that analogy wouldn’t quite apply for Google’s Cloud Print service, though. This cloud-computing hybrid allows you to access both regular and internet-enabled printers through the Internet.

An old virus gets a new shot at virtualization

Virtualizing your desktops comes with a number of benefits, one of which is improved security. Unfortunately, nothing perfect lasts forever, and the virtualization industry is facing a frightening new form of malware. Although this threat is nothing more than a facelift on an old virus, it is just as dangerous as it was the first time it made headlines.

How to protect against VoIP call hacking

VoIP has become the ultimate communication tool for enterprises, but it has also become another vulnerability that hackers exploit. Because voice is essentially transferred as data, the risk of digitized messages being intercepted and heard by unauthorized ears increases.

Type and talk on enhanced Google Assistant

By now, that voice on your smartphone that you constantly rely on to search for recipes or movie schedules may already be part of your Googling routine. As helpful as it is, barking commands at your Google Assistant, an intelligent personal assistant, isn’t always the best way to go.

Cyber security and managed services

Cyber security is something you hear about a lot these days. Sometimes it’s thrown around to scare business owners, other times it has proven to be a cautionary tale, one that small businesses can learn from to fend themselves from online threats that can leave devastating impact.

Why consider disaster recovery for 2017

The new year is well upon us, and with it comes an equally new IT budget. Judging by the advancements in computing technology, many 2017 business wish lists probably include powerful onsite servers, workstations, and the Internet of Things. But as tempting as these purchases may be, it’s important that you don’t dismiss an old yet essential IT resolution: disaster recovery.

Facebook’s group voice calling

“What’s your Facebook name?” is not a question you’re often asked when someone needs your contact details. In the first place, Facebook messaging isn’t everyone’s voice call app of choice, especially for group conversations. As of now, Skype rules that arena, especially for business communications.

Flaw allows thieves to open locked iPads

Have you ever worried about your tablet’s security? If not, you should. Networked gadgets are becoming increasingly interconnected every day, and just one social media account saved on a compromised iPad could lead to breaches on any number of other, more sensitive devices.