Ask Ali: March 2020 – What should we know about “Working from Home” given the recent virus pandemic going on?

By |2020-03-13T18:11:09-08:00March 13th, 2020|IT Blog|

Q:  What should we know about “Working from Home” give the recent virus pandemic going on? A: Businesses are struggling to decide how to prevent their employees or themselves from being exposed to the coronavirus outbreak that was just announced as pandemic! As a general rule, if you have ANY symptoms of a flu or [...]

Using IT to combat the effects of Coronavirus

By |2020-03-04T22:59:09-08:00March 4th, 2020|IT Blog|

We've all been hearing in the news lately about outbreaks of the novel coronavirus and its effect on other countries and their economies, workplaces, schools, and general daily life. Whether or not an outbreak will occur in our communities (hopefully not), current events have posed an interesting question: if an emergency arises, how can businesses [...]

Dark Web: How to Protect Your Sensitive Data and Information

By |2020-02-26T17:34:05-08:00February 26th, 2020|IT Blog|

Nowadays, identity theft, compromised or breached  email accounts, hacked computers, have become a daily occurrences.  For those have become a victim or affected by them, they have to deal with the time consuming data and identity repair and costly consequences.  Unfortunately, too many of us don't take the steps necessary to effectively guard against identity [...]

Switching your IT Support Company? Take These Steps in to Consideration

By |2020-02-19T19:21:58-08:00February 19th, 2020|IT Blog|

Most of the referrals we receive, have one thing in common, they are not happy with their current IT company.  The reason could vary, such as the client has outgrown the one man band IT guy/IT company, the IT company made a major faux pas, the solutions they received did not perform as promised, IT [...]

Why it’s Important to Upgrade to Windows 10

By |2020-02-12T23:51:22-08:00February 12th, 2020|IT Blog|

Although we keep warning about this issue, still there are many Windows users that have not upgraded.  If you’re still running Windows 7 or Windows 8, or Windows Server 2008 and 2008 R2, you could be vulnerable to a range of risks. That’s because Microsoft has ended support for them as of 1/14/2020. Additionally, Microsoft discontinued [...]

What to do to defend against Cyber Security threats

By |2020-02-05T23:57:21-08:00February 5th, 2020|IT Blog|

Every day, we read about another company getting hacked or  massive amount of data being breached.  Nowadays, it seems like most people have reached the state of numbness or filter these kind of news until it happens to them. They experience the pain of data loss and identity theft and wonder why they were not [...]

How to Protect your Mobile Device from Hackers

By |2020-01-29T23:57:52-08:00January 29th, 2020|IT Blog|

Ah, you would say “Now I have to worry about my mobile device not getting compromised by hackers too? As if worrying about your computers and your identity was not enough, now hackers are after my mobile devices?” You may not realize but your cell phone  has huge amount of sensitive data, being private messages, [...]

How to Leverage Technology to Move Your Business Forward?

By |2020-01-15T22:22:06-08:00January 15th, 2020|IT Blog|

As we are starting a new decade and contemplating ideas on how to thrive versus how to survive, leveraging technology should be one of our main options.  Although this is a wide and deep subject, I want to concentrate on the fact that many small businesses continue doing the business as before and not embracing [...]

New Year – Tech and Business Resolutions

By |2020-01-08T22:49:05-08:00January 8th, 2020|IT Blog|

Happy New Year! The year 2020 is here and it is the beginning of a new decade.  How exciting!!! As it is customary, you may have set some new goals for yourself and business already,  The ultimate business goal is to be more efficient and provided a faster and better service and experience to your [...]

Go to Top