Human Resources and Cloud Computing

The benefits of Cloud computing for HR professionals

Michael Anderson Cloud, IT Best Practices, IT Managed Services

Keep your feet on the ground, and your human resources in the Cloud; how to improve employee communications in the Cloud. Most organizations think of the Cloud as a place to hold their software and data, but the Cloud can also help transform how businesses communicate with people and implement HR processes. HR handles several key functions – and a…

Microsoft Office 365 OneDrive versus Sharepoint

When to use OneDrive for Business or SharePoint for Teams

Michael Anderson Cloud, IT Managed Services, Microsoft 365, Microsoft OneDrive, Software

OneDrive for Business and SharePoint for Teams are included with Office 365 for Business. In fact, they complement each other; it’s ideal for small- to medium-sized businesses to set up both for better document management and collaboration. Both are Cloud-based services that allow you to store, share and sync files from a number of devices with access to the Internet….

IT Security Audits

Securing your network data begins with an IT security audit

Michael Anderson IT Best Practices, IT Managed Services, IT Security

The growing complexity of cloud services, data networks, and disaster-recovery backup services make comprehensive IT security audits a must for business owners – without an audit, your business may be at serious risk. Why your business needs an IT security audit: 1. Your data is more valuable than ever Malicious hacks and ransomware, such as Cryptolocker, cause downtime and are…

Property Management

Property managers need IT too

Michael Anderson Business Talk, IT Best Practices, IT Managed Services

Technology is changing and impacting the property-management landscape. Consider electronic transactions, online financial and tenant data-storage, and smart devices that are now regularly installed into offices and residences (also known as the Internet of Things). As building systems, processes, and tenant information become increasingly connected to the internet, the chances of a cyberattack and a privacy or data breach grows….

The Cloud Backups

The four biggest benefits of cloud-based backups

Michael Anderson Cloud, IT Managed Services

Cloud technology has truly changed the way businesses operate. Almost every business, from gigantic multinational enterprises to small businesses, is using at least one cloud storage system. Your business shouldn’t overlook the advantages of the cloud. A cloud-based backup is one of the most powerful ways that you can protect your data from breaches, hardware failures, and natural disasters. For…

Microsoft Windows 7 Support Ends

The final countdown: Windows 7 support ends in 2020

Michael Anderson Business Talk, IT Best Practices, IT Managed Services, Software

On Jan. 14, 2020, Microsoft will no longer release security updates or patches for the Windows 7 operating system. After the support ends, your organization’s computer, network, and data are vulnerable to attacks, security risks and viruses if you don’t upgrade your systems. Microsoft does not support operating systems (OS) over 10 years old, and it moves these systems from…

Three Dangers of Running an Unsupported Operating System

Michael Anderson IT Best Practices, IT Managed Services, IT Security, Software

“Nothing lasts forever.” – every IT professional Truer words were never spoken, as constant innovations in computers, software, and systems phase out older IT infrastructure. This can pose a problem for small- to medium-sized businesses with tight IT budgets. With limited funds, how do you keep a strategic IT technology plan to standards, yet provide your IT infrastructure with the…

12 Network Tests

12 Tests to Boost your Network Security

Michael Anderson Cybersecurity, IT Managed Services, IT Security

Network security not only protects your business’ data and systems, but makes it more efficient, organized, and profitable. Here are 12 tests you can perform to make sure your network security is as strong as it needs to be: 1. Network Layer Vulnerability Scanning: Uses a network layer Vulnerability Assessment (VA) scanner. Why use it? Vulnerability scanners identify security risks on every…

Ransomware Security

Five ways to protect your business from ransomware

Michael Anderson Cybersecurity, Disaster Recovery, IT Managed Services, IT Security

When it comes to cyberthreats, there is a lot to think about – from Trojan horses to worms. In 2017, ransomware attacks rose an astounding 250 per cent, according to AO Kaspersky Lab (2017): IT Threat Evolution Q1 2017. Ransomware is a type of malicious software that encrypts critical data on computers or mobile devices and blocks the owner from…