Here’s a question you’ve probably never asked yourself about your I.T. service but will now probably keep you awake tonight (sorry). If your I.T. guy went away, would you know […]
Category Archives: Blog
We’re often asked by our clients and their team members if they should leave their computer on all the time or turn it off when they are not using […]
If You Thought Cryptolocker was Bad, Meet Jigsaw and Locky Ransomware Updated June 22, 2016 Back in December 2015, we shared with you a few Crypolocker stories about a number of clients […]
Hacked Websites? How to Keep them From Becoming Zombie Minions for Hackers & Cyber Thieves by Max Sullivan, Web Developer and Beth Bridges, V.P. of Digital Identity Don’t Let Hacked […]
Trying to get your website found on the internet is like swimming in the ocean. You’re a tiny speck in a massive environment that is always in motion. You think […]
A web development company without a programmer is like a home-builder without an architect. A train without an engineer. A rebel without a clue. All those designers and help desk […]
Have you heard of Virtual Private Server Hosting? It’s the high-end, top-of-the-line version of website hosting versus shared hosting which is what you get with GoDaddy, BlueHost, and other web companies. Yes, it can […]
Why did the Death Star get blown up? Because there was a data breach in the Empire. Yes, Luke Skywalker and his rag-tag band of rebels attacked the Death Star with […]
Dan Russell, a “search anthropologist” at Google, has studied thousands of computer users. He’s found that 90% of people don’t know how to use the keyboard shortcuts command “Ctrl-F” to find a word in […]
Do You Really Want Me to Keep the Door Unlocked for Just Anyone? “You have some very strict security policies in place.” Normally, this is a compliment. Any I.T. firm […]