Blog
The ROI of Moving a Small Business to the Cloud
It’s official. The Cloud is now mainstream and the ROI of moving a small business to the Cloud is only increasing. The number of companies adopting it as their core IT strategy is only going up, and that includes the number of small businesses alongside mid-market and...
Essentials of a Successful Business Continuity Plan
In last week’s blog on ‘What is Business Continuity Planning and Why it’s Essential’, we looked at why a successful business continuity plan is essential, what it is, and a quick look at how to build it. Now we’ll dig into the essential elements of creating a plan...
What is Business Continuity Planning and Why it’s Essential
Whether they liked it or not, most companies received a crash course in business continuity planning in the last few years. From social unrest to the pandemic, businesses who didn’t previously have an eye on their technological stability became quickly aware of it...
Tips on How to Identify an Email Phishing Scam
Even with all the media and information floating the web, did you know that over half of all users end up opening fake emails? And many even fall for them? Think of the person you work closest with at your company. One of you is likely not going to open one in the...
3 Innovative Ideas That Can Increase Your Data Security
Cybercriminals are constantly innovating their tactics and tools to breach yesterday’s defenses. That’s a huge problem because organizations today work with more customer data than ever before. A single data breach can not only bring productivity to a halt, but it can...
Keep Your IT Guy and Outsource IT Services Too
Most companies who start out with an in-house “IT guy” eventually wind up with two paths in front of them: invest in the talent and infrastructure needed to build out their own IT department or outsource some of the IT services that are essential the company’s...
Weighing the Pros and Cons of Working from Home
The pandemic has had many unexpected consequences, from the great toilet paper shortage to the return of endangered Ganges dolphins to the ghats of Kolkata. One that businesses hear about (and experience) regularly is the sudden move to remote work, which is still...
Why You Need to Keep Employee Mobile Devices Updated
What’s the first thing the average employee reaches for when they wake up in the morning? Shockingly, it’s probably not coffee. It’s their smartphone. Due to the fact that this little hand-held computer can let you do almost anything online (including work items),...
10 Email Security Facts that Reveal the Truth About Email Threats
For most small businesses, email is the most valuable tool they have, providing a direct connection between them and their customers. The problem is that this connection is open to anyone who has an interest in exploiting communications to get to sensitive data or...
How to Protect Yourself from the Dark Web
The Dark Web is not an ‘old wives’ tale’ or a story made up by the IT industry to sell more services. It’s a real online world that’s essentially a marketplace for cyber criminals. If they get their hands on stolen data, the Dark Web is the online ‘underground’ where...
7 Things Your Website Must Have
First, do you have a website? If the answer is “yes” then great, move to the information below. If it’s “no,” then stop reading and go talk to a hosting provider right now. In the digital age, it’s imperative (this word can’t be stressed enough) that you have a...
Benefits of Using VoIP Phones Over Landline and Cellular Phones
In a world that’s increasingly more connected, missing a phone call or not looping in an important employee or staff member into a conversation can be trouble for any small business. Add to that the need to keep overhead costs down, and it’s easy to understand why...
Passwordless Authentication: It’s Time to Stop Using Passwords
If you think that passwords are one of the fundamental pillars of modern security, then you’re absolutely correct. The problem is that this pillar is so full of cracks and other structural weaknesses that even a small gust of wind can send it tumbling to pieces....
Facts Are In: Small Businesses Are Now the Top Target of Cyberattacks
It’s true that we only hear about cybersecurity issues when they’re happening to big companies—like when Colonial Pipeline was hacked in May making both the national and local newspapers, and when a hacker recently stole more than 50 million customer records from...
Don’t Make These IT Mistakes as You Grow
We routinely come across small businesses who aren’t happy with the how their IT shaped up over the years. They feel their IT investments never really showed the kind of returns that they expected, and they come to us hoping that we can change that trend. As a part of...
Understanding Social Media Impersonation Attacks (and what to do about them)
Does your company have any social media profiles? It should. Even for strictly Business to Business (B2B) companies, LinkedIn should be kept up with at a minimum (and here’s why). But just like everything else in the IT world, benefits always come with risk. So...
7 Common Password Mistakes to Avoid (and Their Solutions)
According to the Verizon 2021 Data Breach Investigations Report, credentials are the #1 way that a cybercriminal hack into an organization, with 61% of breaches attributed to leveraged credentials. That means that by way of clone phishing, domain spoofing or one of...
Help Desk Cavalry on 2021 Inc 5000 Fastest Growing Companies in America List
Help Desk Cavalry Listed as One of Only Four WA State Information and Communications Technology (ICT) Businesses to Be Honored on the Inc Magazine’s Inc 5000 Fastest Growing Private Companies in America 2021 List Help Desk Cavalry celebrates its second consecutive...
Is Remote Work Too Much of a Cybersecurity Risk?
Even if your company has already adopted remote work (or hybrid work, as in some on-site and some remote) as a standard method, this question has probably crossed your mind. Maybe it still is. Kudos to you and your team for taking the security risks seriously and for...
How to Protect Smartphones from Cyber Threats
Not that long ago, you would be happy if your mobile phone had enough memory to store 100 contacts, and you would be ecstatic if it could also store the same number of text messages. Today, your smartphone can not only store a virtually infinite number of contacts and...
How to Prioritize Employee Experience (ESAT) While Keeping Your IT Costs Down
Modern organizations need their technology to be just that: modern. And that also means that they need modern ways of working to be productive and competitive. Last year’s work routine upheaval (hello, barking dogs and curious toddlers) led to pretty much everyone...
New phishing method discovered: Consent Phishing
A new phishing method has recently been identified and is now on the rise. And because of its well-crafted mimicking abilities, it’s hitting small business end users at an increasing rate. Consent phishing is a new technique that attackers are using in response to the...
Tips on Cybersecurity Employee Training
Of all the cybersecurity tools, tricks, software, and processes, none is more important than employee training. It must always be at the heart of your cybersecurity plan. That’s because no amount of cutting-edge technology can protect you from the one thing that is...
5 Ways You Can Improve Your Search Rankings (SEO)
These days every company knows the acronym “SEO”, but for most, the real story behind improving it remains a mystery. While there’s no real shortcut to high rankings on web searches, there are a few quick fixes to get (and keep) your site’s content optimized so you...