News

Stay up to date with industry news. Let us know if there is something specific that you would like to know about. And of course, feel free to share.
24/03/17

Technology explained: Capped vs Uncapped

Our clients often ask us about the difference between Capped vs Uncapped and why we always recommend capped accounts for our business clients.  I found this nice explanation from Johan Botha. When it comes to Capped vs Uncapped Internet, here’s a breakdown of the pros and cons, to help you decide which to choose: Let’s start with Shaping. This is...
Read More
24/03/17

Domains vs Workgroups

What is the difference between a domain and a workgroup? Computers on a network can be part of a workgroup or a domain. The main difference between workgroups and domains is how resources on the network are managed. Computers on home networks are usually part of a workgroup, and computers on workplace networks are usually part of a domain. In...
Read More
Featured image for “Data Backup Essentials – What Every Company Must Know”
08/03/17

Data Backup Essentials – What Every Company Must Know

Any loopholes in managing company data can have serious consequences. Take, for example, Morgan Stanley which had to pay up financier Ronald Perelman a whopping $1.45 billion, in part because the global giant could not produce all the critical email communication during the trial’s disclosure phase. Whether yours is a small, medium-sized, or large business, you must put the necessary...
Read More
Featured image for “4 Common IT Mistakes That Small Companies Make”
12/09/16

4 Common IT Mistakes That Small Companies Make

A vast majority of small companies rely on the latest technology to run efficiently. For these companies, making smart IT decisions can affect daily operations, as well as long-term success. Here are 4 common IT mistakes that small companies should avoid: 1. Failing to Plan for Growth Many small companies fail to properly account for IT within their growth strategy....
Read More
07/07/16

Ransomware Information and Protection

Ransomware stops you from using your PC. It holds your PC or files for “ransom”. This page describes what ransomware is and what it does, and provides advice on how to prevent and recover from ransomware infections. You can also read a Microsoft blog about ransomware: The 5Ws and 1H of ransomware. What does ransomware do? There are different types...
Read More
07/12/15

Zimbra Connector For Outlook (ZCO): Setting Up Out Of Office Assistant

Zimbra Connector For Outlook (ZCO): Setting Up Out Of Office Assistant One of the added benefits of utilizing the Zimbra Connector for Outlook (ZCO) is the Out of Office Assistant feature. You can setup the ZCO’s Out of Office Assistant to send automatic responses to individuals who send you messages when your are out of the office. It is important...
Read More
07/12/15

How to use the Out of Office Assistant in Outlook

Summary This article describes how to use the “Automatic Replies (Out of Office)” and “Out of Office Assistant”. Note This feature is only available with an Exchange account that used by many organizations. Home users typically do not have the Exchange account. To enable Automatic Replies feature for non-Exchange account, please go to this section: How to enable Automatic Replies...
Read More
Featured image for “Can VoIP Save Your Company Money?”
01/12/15

Can VoIP Save Your Company Money?

The economy might technically be out of recession, but businesses are still doing everything in their power to cut costs and save as much as possible. One possible avenue for savings is switching from a traditional business phone plan to a VoIP plan. VoIP is a technology that has been around for a little over a decade now, and allows...
Read More
07/10/15

6 IT Policies to Help Protect Your Company

Many companies rely on IT to help run their businesses. For this reason, they often depend on a set of IT policies to ensure the productive, appropriate, and legal use of IT resources. IT policies establish expectations and regulations for behavior related to company computers and networks. In addition, IT policies detail consequences for employees or customers in the event...
Read More
30/09/15

Service Agreements or Ad Hoc?

Businesses often task the receptionist or another person to make a few phone calls in order to obtain pricing from 2 or 3 IT service companies on their hourly support rate. Often the motivation for this ranges from obtaining cheap IT support on the one end of the spectrum, all the way to obtaining reliable and responsive IT services at...
Read More
Featured image for “6 Ways to Keep Your WordPress Site Secure”
10/09/15

6 Ways to Keep Your WordPress Site Secure

More than 60 million sites depend on WordPress. Unfortunately, WordPress is also popular with hackers. To attack WordPress sites, hackers often exploit vulnerabilities found in the plugins that extend WordPress functionality. These attacks are becoming ever more common, and frequently end up affecting hundreds of thousands of sites. However, there are ways to minimize the risks involved in running a...
Read More
Featured image for “5 Ways to Secure Your Company’s Wireless Router”
17/08/15

5 Ways to Secure Your Company’s Wireless Router

Wireless routers are used by companies around the world. They typically serve as the core of a company’s network, enabling both wired and wireless devices to connect to each other and access the Internet. The setup for a wireless router often involves connecting it directly to the Internet, exposing it to possible attacks. Despite the obvious dangers, many companies fail...
Read More

Join our mailing list

Please phone or email us, or if you would prefer to just receive news and updates, please submit your email address below.