by Susan Mangina | Mar 25, 2020 | Android, Business, IT Support, Mac OS, Mobile Computing, Productivity, Small Business, Tech Tips for Business Owners, Technology, Video
John Kalli, CEO, Trinity Worldwide Technologies recently co-hosted a webinar with Eric Acevedo, Owner of Visual Media Online. In watching this recorded video you will learn to set up a Zoom Account, schedule your first meeting, and more tips to get you started.
by Susan Mangina | Mar 25, 2020 | Business, Small Business, Tech Tips for Business Owners
In response to the uncertainties presented by Covid-19, many companies and universities have asked their employees to work remotely. While close to a quarter of the U.S. workforce already works from home at least part of the time, the new policies leave many employees...
by Stephen Gross | Sep 6, 2018 | Business, IT Support
As the managed services provider market matures, CIOs should resist the urge to go with the lowest-cost provider in favor of partners that understand your business and can help you achieve strategic goals. Leaning on a managed service provider (MSP) for a subset of...
by Stephen Gross | Jul 10, 2018 | Business, Mobile Computing, Security, Tech Tips for Business Owners, Technology
Owning a small business means owning data. You’re constantly acquiring new information related to your customers, your financial details, and all the vendors and contractors with whom you work. One cyber criminal, though, one lucky hack, and you’ve just exposed your...
by Stephen Gross | Oct 6, 2016 | Business, IT Support, Security
Enterprise privacy and training programs lack the depth to change dangerous user behavior, Experian study finds. More than half of organizations attribute a security incident or data breach to a malicious or negligent employee, according to a new survey. Sixty-six...
by Stephen Gross | Apr 29, 2016 | Business, E-mail, Mobile Computing, Security, Tech Tips for Business Owners
Of all the money-making schemes hackers employ, the most prevalent is perhaps ransomware, a malware that is usually delivered through infected email attachments and hacked websites or websites featuring ads. Ransomware encrypts files on a user’s computer and renders...