Important Warning From The FBI

Hackers Now Using HTTPS To Trick Victims Via Phishing Scams Everything you’ve heard about the safety of https sites is now in question. According to a recent FBI public service announcement, hackers are incorporating website certificates (third-party verification that a site is secure) when send

Read Full Article

Which Application Rules Supreme: Outlook or GMail

Currently, 30% of email addresses change every year. The majority of these changes are business related. No one wants to deal with the problems that come with changing personal contact information. Quite often, personal emails are attached to personal bills and subscriptions as well. When the big c

Read Full Article

Outsourcing IT Makes Sense for Small Businesses: 7 Reasons

If you’re a small business owner, you have plenty of things to worry about. IT shouldn’t be one of them. We think it makes complete sense for most small businesses to outsource their IT needs to a managed service provider (MSP). Here are 7 reasons. 1. Focus on What Makes You Unique This first r

Read Full Article

4 Strategies For Super Strong Passwords

Some days it seems like everything in our lives requires a password: banks, apps, debit and credit cards, online banking, business applications, healthcare accounts . . . the list is literally endless. Technology professionals recommend that you use a different and highly secure password for each s

Read Full Article

Was Your Photo and License Plate Number Breached?

 CBD Reports 100,000 Photo and License Plate Breach The U.S. Customs and Border Protection (CBP) reported today that nearly 100,000 travelers’ photos and license plate data were breached. If you’ve driven in or out of the country within the six-week period where the data was exposed, you could

Read Full Article

3 Reasons to Regularly Test Business Systems

Protecting your business requires more time, effort and energy from your technology team than ever before. Business systems are increasingly complex, requiring staff members to continually learn and adapt to changing conditions and new threats as they emerge. It’s not unusual for a single ransomw

Read Full Article

Managed IT Services Buyer’s Guide: Introduction

Many companies in all industries have realized the benefits of finding just that right strategic partner to outsource their IT services to. When you have a great Managed Service Provider (MSP) who can work within your needs and budget, it lifts a huge load off your shoulders. You no longer have to w

Read Full Article

How Much Should A Company Invest In Information Technology?

The rapid increase in technology use in businesses has affected every industry. Across all businesses, the need to keep up with the competition means paying attention to what technologies are available and incorporating the right tech tools as they become viable. Whatever your business, you know th

Read Full Article

LabCorp Data Breach: What We Know

Are You One Of Many Affected By The LabCorp Data Breach? Financial & Personal Information of 7.7 Million Exposed Just yesterday we wrote about the Quest Diagnostics’ breach affecting nearly 12 million. Today we’re writing to tell you about a LabCorp breach affecting 7.7 million people. Both of

Read Full Article

How to Get the Most From Your Android Battery

Battery technology has come a long way in the past several decades. Today’s lithium-ion batteries are a pretty amazing feat of engineering, offering high capacity, low power leakage, and comparatively long life. That said, they aren’t perfect, and they don’t last forever. Getting the most use

Read Full Article
IT support buffalo