Need A New IT Company? Call Today! (403) 775-7444

Does the Recent Amazon Outage Show a Need for Better Planning?

Does the Recent Amazon Outage Show a Need for Better Planning?

The incident concerning Amazon’s S3 Service shows that it is dangerous to put all your resources on one service. So, it makes sense while your company may use one provider for web services it uses another provider for backup and disaster recovery services.     On February 28, 2016, users of Amazon Web Services went […]

read more »

Weekly Tech Tip: Protect all pages on your public-facing websites, not just the checkout and sign-up pages

How Managed Services Helps Small and Medium-sized Businesses Thrive

How Managed Services Helps Small and Medium-sized Businesses Thrive

Small and medium-sized businesses often don’t have the budget or a justification for a full-time IT department and are turning with ever-increasing regularity to cloud-based computer managed IT services. It was the mid-twentieth century when computers began finding footholds in business operations. Most often, computers were used for back office operations. Today, computers are ubiquitous […]

read more »

How Auto-Fill Can Leave Your Business Vulnerable to a Phishing Attack

How Auto-Fill Can Leave Your Business Vulnerable to a Phishing Attack

Relying on the pervasiveness of auto-fill, hackers have developed a new phishing technique that uses this standard browser feature and which could put your business’ data security at risk. Many employees rely on their web browser’s auto-fill feature to make day-to-day Internet tasks easier and more convenient. From Safari and Firefox to Google Chrome and […]

read more »

How to Use Your Chrome Browser to Your Advantage

How to Use Your Chrome Browser to Your Advantage

Your Chrome browser has many settings to protect your privacy and keep advertisers from viewing your browsing history. Google’s Chrome web browser is popular for many reasons. It’s a fast, efficient browser and includes a wide library of extensions available to the more savvy internet user. From reduced memory usage to being able to hide […]

read more »

Weekly Tech Tip: Create a mobile device action plan

Weekly Tech Tip: Create a mobile device action plan

Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals from stealing information while the phone is on public networks. Be sure to set reporting procedures for […]

read more »

Take Your Next Coffee Break On Us!

Down Arrow

Book Your Free Technology Consultation with Caffeinated and We Will Bring The Coffee!

Connect With Your Managed IT Service Team