Blog

Reframing Your Business Processes for Cloud

Reframing Your Business Processes for Cloud

By: Dan Bremner

I've been thinking a lot lately about reframing - the idea of changing your perspective in order to see something in a completely different light. It struck me that often when we look at something brand new, we see it through the lens of our experience with the old thing that is being replaced.

The basics of app virtualization

The basics of app virtualization

App virtualization is a term that gets thrown around by professionals quite often. Vendors say it’s a necessity for small business owners. But for a service that claims to make your life easier, it’s ironic that small business owners are left even more confused with what app virtualization actually is.

How to fix these 4 El Capitan problems

How to fix these 4 El Capitan problems

Apple’s El Capitan OS has been out for awhile now and, at this point, most users are likely to have found a few kinks in its armor. While overall many users are likely to feel it’s a positive update to their old OS, it is certainly not perfect. Here are some of the more annoying issues that pester El Capitan users and a few ways to fix these problems.

Microsoft’s new app strategy: will it work?

Microsoft’s new app strategy: will it work?

When it comes to smartphones, Windows phones have largely gone unnoticed. Some say iOS and Android phones are just better. While some experts claim that Windows phones entered the market too late to make a lasting impact. However, one of the big reasons why Windows phones are not as successful is because of a lack of support for apps.

Master your messages with these Gmail hacks

Master your messages with these Gmail hacks

Gmail has become a powerful email option for businesses since it can be attached to your domain. Easy to use, accessible from anywhere and always up-to-date, it has a lot to offer business users. But if you only use Gmail to send and receive emails, you’re barely scratching the surface of its true capabilities and lesser known features.

Different types of hackers defined

Different types of hackers defined

Know thy enemy. When it comes to hackers, most business owners get hung up on the technical and mechanical details of a cyber attack forgetting another important aspect: motive. Why are they attacking people and organizations in the first place? And who are they targeting? By answering these questions you’ll have a better understanding of what resources need the most protection in your business.

How to optimize your VoIP performance

How to optimize your VoIP performance

You’ve likely heard of VoIP: the innovative telephony solution that can dramatically cut costs and replace your traditional phone line. While it may sound appealing, you might have a few reservations. What if the call quality isn’t up to par? What if your staff is confused by the technology? What if you have to deal with the complexity and costs of installing an additional network? These are all assumptions that hold little truth.

How is BYOD a security risk?

How is BYOD a security risk?

Bring your own device (BYOD) strategy is when an employee uses their personal mobile device to work with your company from anywhere. This strategy can bring about many advantages to your business such as increased efficiency and convenience. However, this can also bring a number of security risks for your IT infrastructure and data.

Connectors: the new Office 365 update

Connectors: the new Office 365 update

At work, we depend on several apps to be more productive around the office. However, with so many of them open in our web browsers, it can be a drag to constantly click in and out of tabs just to get the information we need. Fortunately, Office 365 Connectors for Groups allows you to stay on top of all the third party services your company is using.