Category Archives: General Articles C

New virus threatens virtual machines

2017January20_Virtualization_C_PH

Before some of our clients have even had a chance to wrap their heads around what virtualization is and how it works, hackers have already started attacking the new and exciting technology. By updating a virus from several years ago for virtualized environments, hackers hope to totally wipe the data off your hard drives. If […]

Also posted in Virtualization | Tagged | Comments closed

Let Office 365 help you save the date

img-calendar-900px-op3

When you’re planning a reunion, going back and forth with your friends is frustrating, to say the least. Imagine a similar scenario in your office. The benefits of sharing your calendar with colleagues include knowing when to hold meetings, set project deadlines as well as knowing the best time to talk with clients. Knowing this, […]

Also posted in Office | Tagged , , , , , , , , , , , , , , | Comments closed

Android AI: 5 helpful requests for Google Now

2017January18_Android_C_PH

Google is synonymous with some of the best internet search technology on the market. But for some reason, one of the most effective ways to utilize Google search has flown mostly under the radar. If you’re jealous of Apple’s Siri, you may not even realize that you have your own AI assistant sitting in your […]

Also posted in Android | Tagged , , , , | Comments closed

Why you should update your SBC

2017January17_VoIP_C_PH

Did you know that your VoIP systems are especially vulnerable to cyber attacks? When it comes to VoIP, hackers will go to great lengths to intercept messages over a network or even use denial-of-service attacks to shut yours down. To protect your network, firewalls and antivirus software may be your first options, but they simply […]

Also posted in VoIP | Tagged , , , , , , | Comments closed

Google Assistant lets you type on new version

2017January16_Google_C

Your own personal assistant is supposed to make life easier. Designed to let you dictate your searches instead of typing them, Google Assistant was made to accomplish just that. While talking to your phone is undoubtedly a convenient way to search for information, it’s not always practical. Fret not; Google’s tech team is working on […]

Also posted in Google | Tagged , , , , | Comments closed

Windows 10: user complaints addressed

img-windows10-900px-op3

Over the past year, Microsoft received major backlash for ‘forcing’ the Windows 10 update as well as future updates on PC users. Fortunately, the tech leader is taking steps to address customer complaints. This article takes a look at what changes we can expect from Microsoft this coming year. A patch and a glitch away […]

Also posted in Windows | Tagged , , , , , , , , , , , , | Comments closed

Statistics for cyber security during 2016

2017january12_security_b_ph

As cyber attacks continue to rise, businesses large and small need to stay one step ahead with IT services that keep them protected no matter what. What once were minor nuisances have now become advanced threats that can actually put you out of business. In fact, these cyber attack statistics will prove to you that […]

Also posted in Security | Tagged , , , , , | Comments closed

2017 IT essentials: disaster recovery plan

2017january11_business_c_ph

When disaster strikes, organizations need to put their business continuity plans into action and recover their IT systems as quickly as possible. Failing to do so can mean serious financial and reputational repercussions. Despite this, investments in disaster recovery are set aside each year for high-tech IT investments, and every year companies and employees continue […]

Also posted in Business | Tagged , , , , , | Comments closed

Group voice call on Facebook

2017january10_socialmedia_c_ph

Skype used to dominate an area of VoIP communications that serves a special function: group video calling. With apps like Snapchat, WhatsApp and, most recently, Slack nipping at its heels, it comes as no surprise that social network behemoth Facebook takes a slice of the cake with its recently rolled out desktop group voice calling. […]

Also posted in Social Media | Tagged , , , , | Comments closed

iPads allow thieves to bypass lock feature

img-ipad-900px-op3

Nobody wants to spend the day stressing about dangerous scenarios and “what-ifs,” but in some cases we really must insist. In a recent development, it was discovered that one of the iPad’s anti-theft measures can be easily bypassed with little to no special training. And although no one wants to assume his or her tablet […]

Also posted in Apple | Tagged , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.