Category Archives: General Articles C

SDN & virtualized networks: how they differ

We’ve talked about network virtualization on this blog before, but there was some recent confusion over whether or not that service is different from software-defined networking. It’s not a big difference, but no, they’re not the same. Let’s take a look at what sets them apart. Software-defined networking (SDN) Managing storage, infrastructures, and networks with […]

Also posted in Virtualization | Tagged , , , | Comments closed

WebRTC: internet calls without the software

2017March9VoIP_C_PH

Making calls over the internet has been one of the greatest advancements for small- and medium-sized businesses in several decades. And although some are calling the newest addition to this field detrimental, we think it’s an awesome addition. For business owners who believe in staying ahead of the times, WebRTC is worth checking out. What […]

Also posted in VoIP | Tagged , , , , , | Comments closed

Office 365: What plan is the right one?

2017March8Office_C_PH

There’s a lot to like about Office 365. You have access to cloud-based productivity suites, Microsoft email servers, SharePoint, and more. But not all Office 365 license plans offer the same features and services. When looking for an Office 365 plan for your business, make sure to follow these tips. Business or Enterprise? If you’re […]

Also posted in Office | Tagged , , , , , , , , , , , , | Comments closed

Four helpful Cortana commands

900px_shutterstock_435798757

Like Apple’s Siri and Google’s Google Now, Cortana is an intelligent personal assistant that assists you with a variety of tasks such as making phone calls, setting reminders, as well as searching for files. All of this is possible, with the right commands of course. In order to fully utilize Cortana, we’ve created an unofficial […]

Also posted in Windows | Tagged , , , , , , , , , | Comments closed

Healthcare software: a healthy development

2017March6Healthcare_C_PH

Some healthcare companies see HIPAA and other compliance regulations as a bane to their business, mainly because of the lengthy and complicated requirements. Poring over authorities’ regulations and ensuring that all areas of operations remain compliant call for a high level of expertise, something that small- and medium-sized businesses may lack. The rising popularity of […]

Also posted in Healthcare | Tagged , , , | Comments closed

Fileless malware: who are the targets?

2017March3Security_C_PH

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic…yet. Getting acquainted with this new malware today could save you from a headache in the future. What is this new threat? To oversimplify the matter, […]

Also posted in Security | Tagged , , , , , | Comments closed

Russian hackers target Mac OS X users

2017Mar2Apple_C_PH

While plenty of malware target Windows and Android operating systems, Apple products also get some unwanted attention from cybercriminals. In February, Fancy Bear, the Russian hacking group accused of leaking information from the US Democratic National Committee, have created advanced malware for Macs and iOS backups. Here’s how the exploit works. According to antivirus provider […]

Also posted in Apple | Tagged , , , , , , , , , | Comments closed

New smart search engine for G Suite users

900px_shutterstock_357803567

The newest tool launched for business customers is Google Cloud Search, which allows users to search across G Suite products such as Drive, Gmail, Sites, Calendar, Docs, Contacts and more with ease and efficiency. It was previously known as Springboard and was compared to something like Google Now for enterprise workers. Google Cloud Search is […]

Also posted in Google | Tagged , , , , , , , , , | Comments closed

Real-world audits: disaster recovery plans

2017February28_Business_C_PH

Failing to stop a cyber attacker, or to pass a disaster recovery plan (DRP) audit could be the product of focusing your efforts on the wrong educational resources. Because no matter how many conferences you attend, or how many certifications you receive, nothing beats real-world case studies. If that’s what you’re looking for, a state […]

Also posted in Business | Tagged , , , , | Comments closed

Attacks on WordPress websites

2017February27_WebandCloud__C_PH

WordPress is currently the most used web platform, with a market share of 40-50% out of all Content Management Solutions (CMS) platforms. It powers various types of websites, from personal sites to those of small- and medium-sized businesses as well as multinational corporations. If you run a website on WordPress, yours may have been one […]

Also posted in Web & Cloud | Tagged , , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.