IT Policy: How Often Should You Change Your Passwords?

Anyone who’s ever created a login has no doubt bumped up against seemingly arbitrary and annoyingly complex password composition rules. For digital citizens, one of the most frustrating hoops to jump through is the forced inclusion of special characters. But wait, not THAT special character… or that one… or that one… or that-- okay, a

2018-10-19T00:21:23+00:00October 19th, 2018|Security|

Why Is My Computer So Slow?

There are few things more infuriating than clicking on a file when you’re pressed for time, only to have to wait the span of a full commercial ad break for it to open. The seconds tick slowly by, your fingers drum against your desk, and before even the first minute passes you’re no doubt running

2018-10-12T00:28:52+00:00October 11th, 2018|Systems|

The Truth About Spam

We’re not referring to the delicious potted meat you’ve grown to love (or hate), though it’s certainly named for its ubiquity. Spam in its most loathsome form — the unsolicited, commercial email sent indiscriminately and in bulk, rarely for non-nefarious purposes — is serious business. On the Seriousness of Spam Anyone who gets spam a

2018-09-21T19:32:16+00:00September 21st, 2018|Articles, Security|

App Spotlight: PandaDoc

Have you ever thought about how long it takes you to build a quote or draft a business proposal? Like most business owners or customer relationship managers, you probably haven’t: it’s just something you do, because that’s how it is. While the length of time it takes to create business documents varies wildly industry to

2018-09-07T19:33:39+00:00September 7th, 2018|Systems|

Does your company have a “Shadow IT” department?

“Shadow IT” can be defined as IT solutions deployed within a business without the knowledge or approval of the IT department. It is put into place by employees who are looking for ways to be more productive and find going through the proper channels to get IT services approved to be cumbersome and time consuming. Employees

2018-07-10T22:56:53+00:00July 10th, 2018|Security|

“F” Is For Phishing: How To Identify The Fake, False, Fraudulent Emails Already In Your Inbox

It’s 2 AM, and you’re sound asleep. A sudden DING slaps you awake. In a sleepy haze, like a moth to a flame, you fumble for the glowing screen. A new notification floods your bedroom with light:  an email from your boss. That’s odd, she’s never awake at this hour. Your finger hovers over the

2018-06-22T23:11:12+00:00June 25th, 2018|Security|

Website Security: SSL and making your website safe for your customers

How safe is your company’s website? If the URL starts with the letters HTTPS, that is a good start. But there is another important element your website needs to ensure it is safe for your visitors and customers. Please read on for important reasons why you need the right SSL certificate and what that means

2018-06-13T17:20:48+00:00June 12th, 2018|Security|