Blog

Secure your passwords now

Secure your passwords now

For years, we’ve been told that strong passwords include three things: upper and lower-case letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why and how it involves you.

Top productivity hacks for computer users

Top productivity hacks for computer users

We’re all obsessed with finding new ways to become more productive. Business gurus often emphasize the importance of time management and taking breaks to avoid burnout. But aside from motivating yourself to work more efficiently, there are plenty of tools that increase your daily output.

Answering Common Questions About Meraki Access Points

Answering Common Questions About Meraki Access Points

It's no secret that Meraki systems offer incredible benefits -- in fact, at the end of 2016, Meraki had an installed base of 160,000 customers. However, with its cloud-based solutions comes the demand for technical expertise. It's always best to leave your IT needs to Meraki specialists, but if you're in need of Meraki support, it's important to have a basic understanding of the systems your businesses use.

Equifax’s Leak: lessons learned

Equifax’s Leak: lessons learned

No business owner wants their customers’ data leaked, but no matter how well your prevention plan is, the unexpected can happen. And when it does, what will determine the fate of your business is how well you respond to it. So before you start planning an incident response, read the following story and recite this: Don’t walk in the footsteps of Equifax.