Blogs

Top tips for first-time virtualization users

February 15th, 2018

Unlike most solutions, virtualization technology is not plug and play. It requires you to understand your IT environment and know which aspects could and should be virtualized. This is not something we expect first-time virtualization users to grasp right away, so if you’re planning to implement it, follow these tips.

What you need to know to select a VoIP service

February 14th, 2018

Voice over IP (VoIP) technology epitomizes every small-business owner’s IT goals. It’s affordable, flexible, and full of features that make it a valuable long-term investment. There are countless worthwhile VoIP options. You just need to know your priorities and what to look for.

Office 365 enhancements for iOS and Mac

February 13th, 2018

Good news for Office 365 subscribers who use Apple devices: Microsoft apps now seamlessly integrate with the Apple ecosystem, which means working on documents is now much easier on an iPhone, iPad, and Mac. Here are some of those key capabilities.
Co-authoring in Word, Excel, PowerPoint
Apple users can now co-edit documents in Word, Excel, PowerPoint, and Outlook.

How to turn off intrusive Windows 10 settings

February 9th, 2018

With Cortana following you around -- from spamming helpful suggestions based on what you’re typing to displaying extremely precise and personalized ads based on your online search -- Windows 10 can often feel intrusive. Here are a few tips you can follow to leave Microsoft’s watchful eye behind.

Distributed spam hides illegal activities

February 8th, 2018

Cybercriminals are fairly experienced at avoiding detection. By the time you notice they’ve infected your computer with malware or hijacked your account, serious damage has most likely already been done. To make matters worse, they have another way to hide their illegal activities, and it involves sending thousands of spam emails.