Author: Brian Martin

Are Smart Speakers Spying on You?

Over the past couple of years, more and more people are using smart speakers to help them manage their day-to-day lives. Some people use them as their personal assistants, some just use them to help them remember things they would tend to forget otherwise, others just use them as extremely complex thermometers. Regardless what the use is, one question will always be near the surface about these devices: Are they secure? Let’s take a look at the many issues surrounding smart speaker security.

VoIP Delivers for Businesses with These Features

Business has changed, so the tools your organization uses must evolve as well. One element of your business that has not only got more affordable, but also offers robust integrated features is your telephone system. Today, you can get some pretty impressive features as a part of a hosted VoIP implementation. With collaboration being more important than ever to keep costs down, having the tools you need at the ready is more crucial than ever.

Tip of the Week: Instant Messaging Strategies that Work

Instant messaging can solve a lot of problems for small businesses, and it can make for a much more dynamic work environment compared to the passive one created by sending endless emails. However, this is only true if you are using instant messaging correctly. How does one go about doing that?

How Smart is Your Smart Technology When It Comes to Network Security?

Smart devices have brought about unprecedented amounts of connectivity in aspects of running a business or owning a home that never could have been dreamed of in the past. People can now unlock their front doors, turn up their thermostats, and even switch the lights on and off through their smartphone. Unfortunately, the part that people don’t like to talk about with these applications and devices is security—big surprise, right?

AI Is Being Used By Hackers, Too

Artificial intelligence, commonly known as AI, is used in several different ways in various industries, but one of the most impactful has been with cybersecurity and its automation. On the other hand, however, are the hackers who use AI in ways that fly in the face of the efforts of these cybersecurity professionals and use AI for cybercrime. What are some ways that AI is used in cybercrime, and why is it so scary for businesses to handle?

Should You Archive That Email or Delete It?

What do you do with your old email messages? Do they just sit around in your inbox and collect dust? If so, this is certainly a wasteful practice, as those emails can accrue over time and take up a sizable chunk of space. The question then becomes, what do you do with the emails to keep them from taking up so much space, especially when you might be paying for the space?

Small Businesses are Finding Places to Fit In Automation

If you ask a person that has been using the same technology for years what they would like to see in new technology, you’ll often get the answer, “for it to do the work for me.” This is a popular response that is almost always delivered as a joke. With technology going the way it is, it’s not as funny as it once was. Today, automated tools are being developed that work to actually do a lot of that work for you. This can be both a detriment and a benefit for your staff. Today, we’ll take a look at both.

You Can’t Afford to Ignore Your Data Backup

It doesn’t take a rocket scientist to understand that a lot can go wrong with business just about every day. If something were to go horribly wrong and you lost access to your data infrastructure, what would you do? Let’s take a look at some of these disaster scenarios and how much data backup and disaster recovery can make a difference for your organization.

What Happens When You Get Ransomware?

We often discuss how your business can avoid the impact of ransomware, but what we don’t often discuss is what happens to businesses that do, in fact, suffer from such a devastating attack. We want to use today’s blog as an opportunity to share what your business should (and should not) do in the event of a ransomware attack, as well as measures you can take to avoid suffering from yet another in the future.