Truth is, a great US, Puerto Rico and the Virgin Islands IT services company does a lot more than simply keep your systems secure and reliable. So what does a great US, Puerto Rico and the Virgin Islands IT services company do differently? That’s simple: they truly care about your business – maintaining a good relationship and meeting with you once per month to review your IT

Verizon Wireless has been receiving warnings for months from cybersecurity experts stating that they’ve been putting their customers’ privacy at risk. Computer codes used by Verizon to tag and follow their mobile subscribers are leaving them vulnerable to hidden tracking. It’s been reported this month that Turn – an advertising software company – was using

Oh, for the days when work didn’t follow you wherever you go. Sure, it’s nice to be able to check your email or make a client call from home sometimes (let’s you work in your pyjamas, and who doesn’t enjoy that?), but it also means that work never ends. It means there’s always something more

Over 1.3 billion people log into Facebook every day. Cybercriminals DROOL at the thought of all the scams they could run on even a tiny fraction of the user base. Too many people are eager to click the wrong link and end up downloading malware or leaking sensitive data that opens bank accounts, locks down

BYOD A recent boom in the implementation of BYOD (bring your own device) policies in the workplace has come along with a number of benefits and possible risks. Often times, when employees are given the ability to bring their personal computer devices into work and use them for company business, the result is employee satisfaction,

What does this mean for you, and why you should upgrade. On January 13, 2015, Microsoft announced they are stopping mainstream support for Windows 7. Windows 7 is a popular operating system. This creates concern for many. So what now? Stopping mainstream support doesn’t mean the end of Windows 7. It means no more: Service packs

Know the Risks & Reap the Rewards! Is your company, like several others in today’s constantly evolving technology age, ready to make a BYOD (Bring Your Own Devices) policy part of your common practice? The most important step to successfully implementing BYOD for your business is to understand the potential risks and recompense when implementing

When you’re looking for a new IT Services Firm, deciding on a company responsible for providing your businesses IT services and support will be an incredibly important choice. Check out our Infographic on the 5 most essential questions to ask

Be on the lookout for suspicious emails that claim to be from a federal agency – they could be a trap to steal your private information! A new campaign of email phishing attacks has been reported by US-CERT. The subject lines of these emails reference the Affordable Care Act, and they claim to be about