by Bob Martin | Sep 6, 2016 | Data Security, EMV Chip
All of the major credit card schemes and card issuing banks have been transitioning to payment by chip card, also known as EMV. It’s an older but highly secure technology that is almost impossible to hack. The move to this type of credit card is in direct...
by Bob Martin | Sep 1, 2016 | Data Security, Malware
Most of our readers are computer savvy. They know the basics of how their IT works and are mindful of cyber threats and data security risks. But, we all have that relative or friend who is a late adopter of computers, networks, smartphones and the internet. They may...
by Bob Martin | Aug 30, 2016 | IT outsourcing, Managed IT Services, Managed Services
Many business leaders assume that by handling Information Technology (IT) management in-house and having greater control over the process, they’ll be able to minimize costs and inefficiencies. It’s actually a fallacy, and here are five signs you need to watch out for....
by Bob Martin | Aug 26, 2016 | Server Monitoring
Monitoring your company’s server is critical to the smooth day-to-day operations of your business as well as maintaining satisfied clients. Unfortunately, some companies only casually observe daily issues involving the server, often allowing small, correctable...
by Bob Martin | Aug 24, 2016 | Computer Problems, Computer Repair
Your old computer is outdated and it’s time to upgrade. You spend time researching the right machine and finally, you find just the right one. You open up the box and breathe in the scent of unused hard drives, empty caches, and perfect processing speed. But,...