fbpx Skip to content

NASHVILLE IT BLOG

Four helpful Cortana commands

By Chris Butler / March 7, 2017 /

Like Apple’s Siri and Google’s Google Now, Cortana is an intelligent personal assistant that assists you with a variety of tasks such as making phone calls, setting reminders, as well as searching for files. All of this is possible, with the right commands of course. In order to fully utilize Cortana, we’ve created an unofficial…

Read More

Fileless malware: who are the targets?

By Chris Butler / March 3, 2017 /

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic…yet. Getting acquainted with this new malware today could save you from a headache in the future. What is this new threat? To oversimplify the matter,…

Read More

Russian hackers target Mac OS X users

By Chris Butler / March 2, 2017 /

While plenty of malware target Windows and Android operating systems, Apple products also get some unwanted attention from cybercriminals. In February, Fancy Bear, the Russian hacking group accused of leaking information from the US Democratic National Committee, have created advanced malware for Macs and iOS backups. Here’s how the exploit works. According to antivirus provider…

Read More

New smart search engine for G Suite users

By Chris Butler / March 1, 2017 /

The newest tool launched for business customers is Google Cloud Search, which allows users to search across G Suite products such as Drive, Gmail, Sites, Calendar, Docs, Contacts and more with ease and efficiency. It was previously known as Springboard and was compared to something like Google Now for enterprise workers. Google Cloud Search is…

Read More

Real-world audits: disaster recovery plans

By Chris Butler / February 28, 2017 /

Failing to stop a cyber attacker, or to pass a disaster recovery plan (DRP) audit could be the product of focusing your efforts on the wrong educational resources. Because no matter how many conferences you attend, or how many certifications you receive, nothing beats real-world case studies. If that’s what you’re looking for, a state…

Read More

Popular printer brands are prone to attacks

By Chris Butler / February 23, 2017 /

Do you have security measures in place for your office’s printers? By “security,” we don’t mean locked doors or watchful guards; we’re referring to security against hackers that use printers as a weapon. Despite many companies going paperless, printers are still essential in most offices. And based on recent reports, popular printer brands are targeted…

Read More

Virtualization troubles: 3 common pitfalls

By Chris Butler / February 21, 2017 /

Implementing a virtualized data storage solution at your business is no small feat. It’s a complicated process that requires immense amounts of technical expertise. Unfortunately, getting it up and running is only half the battle. For the most efficient solution possible, watch out for the three most common management issues outlined in this post. Poorly…

Read More

Why sign up for the Office Insider program?

By Chris Butler / February 17, 2017 /

With Office 365, users can access the latest cloud productivity features available. But for those who want to get a leg up on Office features, opt for the Office Insider program. In a nutshell, the Insider program allows Office 365 subscribers to preview and test upcoming Microsoft builds. Business owners who are enthusiastic about technology…

Read More

Free Windows 10 upgrade for SMB’s

By Chris Butler / February 16, 2017 /

SMB stands for small- and medium-sized businesses, not Sorry Microsoft none of your Business. To clear up this misunderstanding, Microsoft has decided to offer Windows 10 upgrades to SMBs that previously refused to update. If you’re still unsure about it all, you can decide after reading this. “They’re extending the free upgrade to this segment…

Read More

5 great ways to prevent cyber-attacks

By Chris Butler / February 15, 2017 /

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational aspects of our cyber-security would most likely put you to sleep before convincing you of our expertise. But if…

Read More
Scroll To Top