KEEPING YOU IN THE LOOP

Latest News

 

 

The 3 Necessities of True collaboration: A Primer

  The 3 Necessities of True collaboration: A Primer Today’s blog is a basic primer on what a complete File, Sync, and Share (FSS) solution includes.Very simply, FSS is a software service that allows you to share all manner of files, documents, spreadsheets and images...

The big picture on access: Is it time for a policy?

The big picture on access: Is it time for a policy? Autotask offers a set of tools that allow you to ensure optimized collaboration across all levels within and outside the organization. A key part of this collaboration is the security features that permit you to...

Does two-factor identification matter for file sharing?

Does two-factor authentication matter for file sharing? Today, let's look at two-factor authentication and its value in protecting your file sharing efforts. First, what is it? Two-factor authentication requires two different forms of identification to verify an...

End Version Control Nightmares

End Version Control Nightmares Did you send out a Word document for a client or colleague to review today? If you answered yes, here are four reasons to stop doing this: Time delays - Edits cannot happen in real time. You write the document, send it, they review and...

Use FSS as a Good Branding Opportunity

Use FSS as a Good Branding Opportunity   Are you letting your employees use any file sharing solution they want? Are they collaborating with clients over different platforms? Sharing files via email, text and consumer-grade File Sync & Share (FSS)? Aside from the...

The 3 Necessities of True collaboration: A Primer

  The 3 Necessities of True collaboration: A Primer Today’s blog is a basic primer on what a complete File, Sync, and Share (FSS) solution includes.Very simply, FSS is a software service that allows you to share all manner of files, documents, spreadsheets and images...

The big picture on access: Is it time for a policy?

The big picture on access: Is it time for a policy? Autotask offers a set of tools that allow you to ensure optimized collaboration across all levels within and outside the organization. A key part of this collaboration is the security features that permit you to...

Does two-factor identification matter for file sharing?

Does two-factor authentication matter for file sharing? Today, let's look at two-factor authentication and its value in protecting your file sharing efforts. First, what is it? Two-factor authentication requires two different forms of identification to verify an...

End Version Control Nightmares

End Version Control Nightmares Did you send out a Word document for a client or colleague to review today? If you answered yes, here are four reasons to stop doing this: Time delays - Edits cannot happen in real time. You write the document, send it, they review and...

Manufacturer? Protect Your Company by Adding Business Continuity to the Assembly Line

As a manufacturer, you’re producing real, tangible products each and every day. Your company’s ability to produce high volumes at low costs can determine where you fall among your competitors. In the age of technology, your equipment relies heavily on the computers...

Use FSS as a Good Branding Opportunity

Use FSS as a Good Branding Opportunity   Are you letting your employees use any file sharing solution they want? Are they collaborating with clients over different platforms? Sharing files via email, text and consumer-grade File Sync & Share (FSS)? Aside from the...

Don’t allow Bring Your Own Device (BYOD)? Yes, you do.

Don’t allow Bring Your Own Device (BYOD)? Yes, you do. It is most likely your company allows some or all your employees to use their own devices in lieu of work-issued laptops, tablets and mobile devices. There is almost no way to enforce a no-BYOD policy outside...

How Much Does Downtime Really Cost Your Business?

Many SMB owners think IT downtime only costs them a few productive hours, but there’s a lot more at stake when your systems go down. Customer satisfaction and loss of brand integrity are just two of the key losses apart from the more evident costs such as lost...

Is That a Business Continuity Plan in Your Pocket or a Bunch of Jargon?

Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business continuity....

Is That Email a Phishing Scheme?

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number...

Has Your Website Been Optimized for Mobile Users?

Did you know that this year there will be more mobile web surfers than stationary ones? That means more prospects are accessing your business website more through their smart phones, tablets or other mobile devices than with a laptop or PC. If you thought you had time...

Five Ways Your Business Can Improve Its Search Engine Rankings

In an age where most business happens online, not showing up in Google search results can really hurt you. While there’s no real shortcut to showing up consistently on web searches, there are a few quick fixes to get your site to show up on your potential customer’s...

Five Things You Should Do Right Now to Preserve Your Network and Systems

1. Backup Files Every Day - As catastrophic as data loss is, the number of businesses that still are not backing up their network is unbelievable. According to the Symantec Small to Medium Size Businesses (SMB) data, only 23% of SMBs are backing up their data on a...

Business Trade Shows Part I: Before the Event

Going to a tradeshow for the first time? Don't make the mistake of viewing this as a 1-2 day discreet marketing event. Instead, view your exhibit at a tradeshow as the central feature of a much longer and holistic marketing plan that builds to the event, and then...

Can You Really Afford Not to Have a Backup Plan?

According to Symantec SMB, 50% of SMBs admit to having no backup and disaster recovery plan in place. 41% of those surveyed confessed that they had never even given much thought to implementing a disaster recovery or business continuity plan. If you are one of them,...

Is Your Website Mobile Optimized?

Smaller firms often struggle just to keep up with maintaining a website. Worrying about a scaled­ down version for mobile users seems like just too much trouble. Today's blog is all about why this matters to you and why should you bother with a mobile version. A bit...

CEO, Patty Krieger Awarded the CRN 2018 Women of the Channel Award!

Congrats to our CEO, Patty Krieger on her CRN 2018 Women of the Channel Award.   Power 100: The Most Powerful Women Of The Channel 2018 Power 30 Solution Providers. The 2018 Power 100 Each year, CRN honors women whose channel expertise and vision are deserving of...

10 Reasons End User Security Awareness Training Is A Must

Security Awareness Training is a Smart MSP Investment Cybersecurity breaches are expensive. Even if you provide industry-leading cybersecurity services, modern malware tactics are too sophisticated to guarantee 100% that your clients will stay safe. A single breach at...

Password Basics That Are Still Ignored

You can have all the locks on your data center and have all the network security available, but nothing will keep your data safe if your employees are sloppy with passwords.There are many ways data can be breached, and opening some link they shouldn't is one of the...

Netrix IT shuts down cyberthreats at point of entry

Managed services provider delivers more advanced security protection to clients while reducing time spent on troubleshooting security issues Bitdefender-PAN-Testimonial-Netrix-creatent155-A4-en-EN-GenericUse The Challenge Netrix Information Technologies, Inc. (Netrix...