Skip To The Main Content
IT Support Services
IT Support Plans
Emergency IT Support
Customer How Tos
Custom Website Development
Identity Design & Branding
Digital Marketing Services
Private Cloud Service
Why Choose Us
Reshore Your IT!
IT Reshoring News
Magpie Tech Tips
Sitefinity CMS Insider Blog
Skype for Business Insider Blog
Skype for Business
Emergency IT Support: 510-344-1203
IT Reshoring News
Magpie Tech Tips
Sitefinity CMS Insider Blog
Skype for Business Insider Blog
April 06, 2017
Avoid Laptop Theft When Traveling: 7 Precautions to Take
Need some tips on how to keep your laptop safe while traveling for work? We've got 7!
March 09, 2017
5 Big Benefits Your Company Gains from SOX
For publicly-traded companies, SOX is a necessity, but there are some unexpected benefits. Five to be exact.
February 09, 2017
How to Defend Against Ransomware—With Versioning
Defense against ransomware involves more than backing up data. Versioning of backups is the practice that can make your data ransom-proof.
January 10, 2017
Sorry! A USB Drive is Not a Safe Business Backup
Where are your backups stored? If they're on an external drive in the server room, your data is still at risk. Start 2017 off right—make sure your backups are tested, reliable, and off-site!
December 06, 2016
Are There Holes in Your Network? Locate Them Now with Vulnerability Testing
Vulnerability testing can help locate potential security holes in your network. Running vulnerability tests regularly means you close those holes before a cybercriminal breaches your network!
November 02, 2016
The Dangers of Using Outdated Software
Even software has a lifespan. Some people still decide to put off the inevitable and not upgrade, and do so for several reasons. In this month's WOOF! article, we provide reasons people don't upgrade, as well as the potential ramifications.
October 07, 2016
When it’s Time to Replace Servers: Should You Move to the Cloud?
When it's time to replace servers, which is better? Staying on-premise, or moving servers to the cloud? The answer depends on how your business operates, and what goals you have. In this month's WOOF! article we lay out criteria to help you make the choice.
September 08, 2016
Servers - How Old is Too Old?
How old are your servers? If they're over 3 years old, you may need replacements soon. Why so short a lifespan? Many factors affect servers as they age. Find out how to tell if your server needs replacing in this month's WOOF.
July 05, 2016
5 Reasons Microsoft Bought LinkedIn (and What the Acquisition Means for Businesses Who Use It)
Now that Microsoft has acquired LinkedIn, what changes should we expect? LinkedIn News in Office 365? Cortana with full access to your LinkedIn profile (and everyone else's)? In this month's WOOF! we address the potential reasons for the acquisition, and the potential risks to your privacy they create.
May 31, 2016
H-1B Visa Fraud, Abuse and Government Corruption: Highlights from "Sold Out"
"Sold Out" lays bare the true extent of government-corporate collusion on H-1B visa fraud. It goes further than even we knew. American IT workers face a growing threat to their livelihoods and futures. Read the details for yourself, right here in WOOF!.
April 29, 2016
The Malware War: The State of Malware on Mac
We interviewed Thomas Reed, Malwarebytes' Director of Mac Offerings, about the state of malware on the Mac & mobile platforms. He says that adware was about the worst Mac users had to deal with for a while. But now, it's getting worse.
March 28, 2016
The Malware War: Expert Advice from the Front Lines
We interviewed Adam Kujawa, Head of Malwarebytes Intelligence, on the growing dangers of ransomware this month. He urges everyone to take it seriously. Ransomware doesn't target computers...it targets you.
February 23, 2016
"Smart" Network Camera Security to Protect Your Business
Video surveillance has become "smart." Now you can watch your building for your phone, record video in HD, store footage on your servers instead of tapes, and more. In this WOOF! issue we look at the video surveillance's advancements, and what they can do to protect your business.
January 25, 2016
Windows Server 2016 Coming Soon! Should You Prepare?
The next version of Windows Server will release this year. With all the new capabilities - new virtualization tools, easier upgrade process - we recommend you start preparing now.
December 17, 2015
9 Technology Changes We’re Thankful For
2015 saw tremendous technology changes, both for good (new software, cloud services, cybersecurity) and bad (malware, data breaches). In our December WOOF! we're highlighting 9 of those technology changes for which we're thankful - like the new Skype for Business, iOS 9, ransomware defenses and more.
November 24, 2015
Be On Guard for New Cybersecurity Threats in 2016
As technology evolves, so do cybersecurity threats. Research indicates that not only are threats like ransomware and integrity attacks evolving, but new threats are on the horizon. Here's what to expect, and some advice on how you can stay on-guard.
October 23, 2015
IT Survival Guide: Document Your Network Now
If your IT manager had an accident, could someone else do their job? They can if you document your critical IT processes. Read about how to document the mission-critical IT, and why you must do so before anything happens.
September 28, 2015
Servers Racked in the Bathroom, and Other Bad Ideas
Is a bathroom a good place to put a server? Not at all. Yet some businesses place servers in downright toxic environments. In this month's WOOF! we discuss examples of "Bad Ideas" for server conditions, and the risks to watch out for.
August 06, 2015
Hardware/Software Leasing: When Does It Make Sense?
Buying new IT hardware costs a lot up front. What if you could cut that cost down - by leasing the hardware instead? In this month's WOOF! we ask a leasing agency about the pros & cons of leasing IT hardware.
July 15, 2015
What You Need to Know About Windows 10
Windows 10 launches July 29. Coming to a Windows 7 or 8.1 PC/tablet near you. In this WOOF! article we talk about the six Windows 10 versions (or Editions), what features to look forward to in each, and which version you'll get.
June 03, 2015
Are Coffee Shop Wi-Fi Connections Safe for Work? Umm, No.
Using free Wi-Fi at the coffee shop, hotels & airport is convenient. It's also a huge security risk. You could have data stolen right off your computer in a matter of minutes, and you'd never know it. These are the dangers lurking on public Wi-Fi networks, and how you can protect yourself.
May 07, 2015
Introducing Skype for Business: Microsoft's Universal Communications Platform
Skype for Business 2015 is replacing Lync Server 2013. A new client look & feel, Skype connectivity, and new calling features for users. But what's Microsoft's goal with the new version? Every communications tool you'd need, no matter where you are.
April 08, 2015
Corporate Lessons from the Hillary Clinton Email Scandal
Hillary Clinton used personal email while Secretary of State. Exposing her office to theft, spying and legal trouble--risks that can affect your business as well, if anyone in the office uses a personal email account for work purposes. Read about these risks, and 7 things you can do to prevent them.
February 03, 2015
Custom Web Design vs. Templates
A frequent question we get is, "Should we use a template for our new site?" While website templates are easy to work with, they suffer from serioues issues. One being that they make your business look like a thousand others! Here in WOOF! we make the case for custom web design. We talk about "what you see" - your branding, content and user experience.
November 19, 2014
How to Manage Your Passwords (and Why You Need To)
When was the last time you changed your passwords at work? If you aren't sure when, you need to read this month's WOOF. Using multiple passwords, and changing them frequently, is one of the most important - and least used - IT security practices.
October 02, 2014
U.S. Networks are Vulnerable to Offshore Cyberattacks. So is our Power Grid.
Hundreds of cyberattacks are taking place right now. Most target datacenters, particularly in the U.S., after private data. But datacenters aren't the only target of attackers--power grids are also at risk. And the U.S. electrical grid is vulnerable.
September 03, 2014
16 Ways to Reduce Your Desktop Support Costs
IT Support is necessary, for computers and for network operations. But that doesn't meanyou have to pay high support costs. In fact, there's a lot of ways to reduce your support costs with simple practices. Here are 16 examples, direct from our own Support Team.
July 28, 2014
3 Reasons to Limit Social Media Use in the Office
Facebook manipulates its users' emotions. It and other social media networks drain away employees' time. And malware is flooding in. What can we do to curb social media use in the office?
June 30, 2014
Where IT Hardware is Made and Why It’s Important
Where do your computers come from? Your servers? Wireless? Where a piece of hardware is made, and who makes it, is more important to your business' operations and security than you might think.
May 30, 2014
Should the Internet be Open or Closed?
Should the Internet be open (Net Neutrality) or closed (paid priority)? Most Web users are on the side of Net Neutrality...but if we look closer, we'll see that the issue is not so black-and-white. This WOOF examines the possible consequences of both classifications, and what the future may hold.
May 01, 2014
ICANN Looking for a New Home – What Does This Mean for the Internet?
ICANN, the organization responsible for the "roots" of the Internet, is looking for a new oversight body. The U.S. has decided to transition ICANN to a more global governance. Does this move risk the Internet's safety? What sort of issues could result? We tackle those questions in this month's WOOF.
March 25, 2014
Does Using XP after April 8 Force Healthcare Organizations Out of HIPAA Compliance?
If you're a healthcare organization (and thus subject to HIPAA regulations), it's said that using Windows XP after the April 8 deadline will immediately push you out of HIPAA compliance. Is this really true? There are situations where it is. Read this month's WOOF to find out what you can (and should) do about it.
February 26, 2014
Why Sending Emails to 50 or More People from Outlook/Exchange is Bad News
Ever wondered why people use email service providers like Constant Contact? It's because sending out hundreds of emails through your company's Exchange Server is dangerous. It can even prevent your entire organization from sending ANY emails. Read about how, and what you should do the next time you want to email a bunch of customers at once, in this month's WOOF.
January 16, 2014
Starting Smart & Secure: IT Recommendations for Startups
Many startups use public cloud services like Google Apps and Amazon to get started fast. But these services pose a serious security risk for a startup's new intellectual property. There's a smarter way to start.
December 04, 2013
Why and How to Add Video to Your Web Marketing
Do you use video in your online marketing? If not, now's the time to start. Video is one of the most powerful marketing tools on the Web - and more affordable to make than ever. This month's WOOF examines video's widespread influence, why it works so well in business, and how you can start making videos.
October 31, 2013
Are You Archiving All Your Email? The Electronic Discovery Act Requires It
Are you archiving all emails, instant messages and blog posts into your regular backups? Could you find a specific email if needed? The California Electronic Discovery Act says you must be able to do so. Here's what the Act is about, and how you can stay in compliance.
October 27, 2013
Is It Time to Upgrade Your Network? – Part 2: Things You Need to Know
So you've determined that you need help with your network. In order to save time and money, it's best to have some technical information on-hand when a networking consultant arrives. What kind? That's what our checklist will help you with.
September 30, 2013
The Dangers of Using Personal Email for Work
What's the harm in employees using personal email for work purposes? Plenty, in fact: privacy violations, falling out of legal compliance, potential for data theft and other risks. This WOOF article documents those risks, and gives advice on how to stop employees from using personal email at work.
August 26, 2013
10 Ways BYOD Threatens Network Security AND Your Private Data
How dangerous is the BYOD trend? We can count 10 ways employees using personal devices risks network security and the privacy of your data. We're also sharing several ways to protect against those privacy risks...and none require overhauling the network.
May 30, 2013
Time to Secure Your Network? Part 2: The Very Real Threat of Cyber Espionage
We often think of cyber-thieves as a Hollywood archetype. But they're very real, and very damaging. Cyber-espionage is running rampant, gigabytes of private data stolen every day. Read about where cyber-espionage comes from, how it works & and what you can do to stop it.
April 09, 2013
Time to Secure Your Network? Part 1: Protecting Trade Secrets from Employee Theft
No one wants to suspect their own employees of violating security. But the scary fact is, U.S. businesses lost $300 billion to trade secret theft in 2012...and most of that came from internal theft. This is how it happens, why, and what you can do.
February 06, 2013
Is It Time to Upgrade Your Network? – Part 1: Things to Think About
Slow Internet speeds? Dropped connections? Errors popping up on workstations? Your network is showing signs of age. Is it time to upgrade? Bill Wester, a 20-year networking expert, begins a series on network hardware & upgrades to think about.
June 27, 2012
Inside the Mind of an Award-Winning Web Designer
We're taking a break from our usual fare in WOOF! this month. Instead of a big informative article on web design, we went straight to our own award-winning web designer, Mike Woodburn. And asked him what's happening with web design.
May 03, 2012
Does Private Cloud Service Trump the Public Cloud?
Despite the similar names, there are big differences between public cloud computing and private cloud service. Private Clouds are better on security, you have more control over which applications to run, and son. Today's WOOF! lays out the differences.
March 01, 2012
The 4 IT Staffing Models: Pros & Cons
Your IT Staffing Model determines who you hire (and when) to build and support your technology infrastructure. What's the best approach: full-time workers only? Outsource to IT consultants? A mix of both? And how does the Cloud play into it?
February 02, 2012
What Connects Your Office? A Primer on IT Communications Hardware
It's easy to overspend on communications hardware if you don't know the ins and outs. Today's WOOF! lays out the technologies that bring the Internet to your office. And make communication within the office possible.
December 01, 2011
What to Know Before You Write Next Year's IT Budget
Are you budgeting out the next year's IT expenses? We researched IT spending trends & predictions for 2012-2014. Find out what your competitors will spend on IT in this month's WOOF!.
Success! Thanks for filling out our form!
- Select -
How can we help you?
Emergency IT Support
Request a Quote