The #1 Security Threat to Local Small Businesses

There are many types of risk in business: the risk that a new competitor will come on the market and steal market share, the risk that top staff memb

keep Reading

How to Make Calls with Amazon Alexa

  Did you know you can use just about any Amazon Echo device to make phone calls for free? You can do the same in the Alexa app on iOS or Android,

keep Reading

The Problems With Computer Repair Companies in Albany, NY

For business owners and management, broken computers mean expensive downtime and lost productivity. It’s no wonder that computer repair companies in

keep Reading

Your Windows 7 Checklist

When you’re working hard to grow your business, you can get caught up in things that take your attention away from your technology. Before you know

keep Reading

How CEOs Can Use Their Blog To Communicate With Staff & Customers

As a CEO, you have tremendous influence over your company’s brand, messaging, values and strategies. You also have a personal brand that increasing

keep Reading

Important Warning From The FBI

Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According t

keep Reading

Which Application Rules Supreme: Outlook or GMail

Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that

keep Reading

Outsourcing IT Makes Sense for Small Businesses: 7 Reasons

If you’re a small business owner, you have plenty of things to worry about. IT shouldn’t be one of them. We think it makes complete sense for mos

keep Reading

How Much Should A Small Business Spend On Information Technology?

For small businesses, information technology spending is always a balancing act. On the one hand, you need to keep to your budget to maintain financi

keep Reading

How to Create a Strong Password You’ll Remember

Nearly every site or service we use online requires a username and password. Remembering hundreds of unique passwords is just about impossible, and re

keep Reading