Category Archives: General Articles B

New malware tests virtualization security

2017January20_Virtualization_B_PH

One of the core principles of virtualized technology is the ability to quarantine cyber security threats easily. For the most part, vendors have been winning this security tug-of-war with hackers, but that may change with the resurrection of a long-dormant piece of malware that targets virtualized desktops. If your business employs any form of virtualization, […]

Also posted in Virtualization | Tagged | Comments closed

Office 365 simplifies calendar sharing

img-calendar-900px-op2

Calendar sharing is one of those mundane yet vital components of effective scheduling. The task of sharing one’s calendar hasn’t always been easy, and many wonder why. Microsoft has recently improved upon its calendar sharing features in Office 365 for all users, and here are some of the reasons you should accept the latest advancement […]

Also posted in Office | Tagged , , , , , , , , , , , , , , | Comments closed

5 useful commands for Google’s AI assistant

2017January18_Android_B_PH

Voice-powered AI systems are enjoying a resurgence. With improved bandwidth, both on desktops and on mobile devices, software vendors can easily relay complex voice commands to the cloud to be analyzed by more powerful computing software. Everyone has seen Siri do it on Apple phones, but how many realize that Android has its own AI, […]

Also posted in Android | Tagged , , , , | Comments closed

Avoid voice attacks with security updates

2017January17_VoIP_B_PH

Malware delivered via email should be the least of businesses’s worries. Aside from common malware, businesses have to protect their VoIP systems from call jacking, eavesdropping, and denial-of-service attacks. So how exactly can you protect your business from these serious threats? The answer: a session border controller (SBC) with the latest security patches. What is […]

Also posted in VoIP | Tagged , , , , , , | Comments closed

New Google Assistant allows typing

2017January16_Google_B

An intelligent personal assistant in the form of Google Assistant made searching much easier by letting you speak to it for all kinds of searches. If you’ve used this tool for a while now, you’ve probably noticed that speaking to your trusty assistant doesn’t always work. If you are ever caught in situations where making […]

Also posted in Google | Tagged , , , , | Comments closed

Addressing Window 10’s user complaints

img-windows10-900px-op2

Windows 10 had a rough year. It’s been flooded with numerous complaints from users claiming that they were “tricked” into upgrading Windows 7 and uncontrollable OS updates. The new year is a time for new things, and that’s exactly what Microsoft is planning to do in 2017. It’s been speculated that Microsoft plans on addressing […]

Also posted in Windows | Tagged , , , , , , , , , , , , | Comments closed

Managed services for cyber security

2017january12_security_b_ph

Ransomware, Trojan horses, spyware and malware are things small businesses like yours don’t ever want to come across. While the term cyber security was once thrown around to scare businesses into purchasing security software, today’s sophisticated threats can leave immense impact, something that antivirus solution alone can’t handle. With that in mind, we’ve rounded up […]

Also posted in Security | Tagged , , , , , | Comments closed

Don’t dismiss disaster recovery for 2017

2017january11_business_b_ph

Over the previous months, you’ve probably heard about new and disruptive trends like virtual assistants, smartphones, and automation technologies. Some of these IT solutions may even be placed on top of your business priority list. However, with floods, fires, and power outages just around the corner, disaster recovery and business continuity plans should always have […]

Also posted in Business | Tagged , , , , , | Comments closed

Group voice call now possible on Facebook

2017january10_socialmedia_b_ph

With communication apps such as Skype, WhatsApp, and Slack aiming to conquer audio and video calling, what is a social networking giant like Facebook to do? In a move to enhance its already ubiquitous Messaging app, Facebook is all set to follow suite and occupy a space alongside some of the most dominant VoIP apps […]

Also posted in Social Media | Tagged , , , , | Comments closed

Stolen iPads susceptible to security flaw

img-ipad-900px-op2

There’s nothing worse than hardware vulnerabilities that put even the most cautious of users at risk. We could lecture you about how even unimportant tablets with little to no personal information are still a security liability, but until Apple releases a patch to the iPad’s newest vulnerability, everyone who owns one is at risk of […]

Also posted in Apple | Tagged , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.