Blog

9 Surprising Ways Converting to Remote Work May Benefit Your Company in the Long Run

COVID-19 has demanded hard, fast change from business owners and workers alike. After facing the pain of suddenly converting to remote work, you might also discover some surprising advantages. Here are just a few ways working remotely may benefit your company and your team over time: Reduced commutes = time saved and a generally happier team.Less absenteeism. With fewer impediments…

Read More icon

Creating a Disaster Recovery Plan in the Age of COVID-19

While it may seem like working through a pandemic is your worst-case scenario, you should still take time to cover all the bases. With your location quiet and your team disbursed, you may be more vulnerable than ever to emergency situations. Take time to shore up your IT Disaster Recovery Plan to protect your business from other disasters such as…

Read More icon

Business Location Security in the Age of COVID-19

Your team has gone remote and your location is either not in operation, or only partly so. However, your office space is still home to valuable equipment and data. While you’re away from the office, don’t neglect oversight of your business location security. Here are some of the areas you should consider when auditing your business location security in the…

Read More icon

Remote Work Series: Laptop Provisioning, Management, and Safety

In the midst of a hard pivot to a remote work model, it's easy to become lax in the provisioning and management of company devices. In fact, whether you're shipping out laptops to a slew of new hires or you're converting to a bring-your-own-device (BYOD) model, your IT team is bound to have their hands full. While COVID-19 has made…

Read More icon

Assessing Your IT Systems and Protocols After Going Remote

In the brave new world of COVID-19, remote work is the new norm. For many companies, the transition to remote work has involved a fast, hard pivot...often a painful one. The abrupt nature of this transition means that you may have not had time to prioritize the safe management of your information. Meanwhile, the word is out that many companies…

Read More icon

The 4 Mythic Characters of IT

The 4 Mythic Characters of IT Company owners often view IT through the lens of headache cure or damage control. And yes, when you’re dealing with the pain of unstable systems built on outdated equipment, all you want is relief. But when you only look to your IT team for palliative care, you may miss the opportunity to tap some…

Read More icon

Mega-List of Bay Area Startup Resources

Mega-List of Bay Area Startup Whether you’re still hatching your idea or you’re a seasoned veteran of the startup scene, here are 50+ Bay Area startup resources to help you launch and grow your dream business. San Francisco Office and Coworking Spaces If you’re not ready to sign a lease for your own location, you could head over to a…

Read More icon

Crypto Ransomware Threats: A Growing Concern

Crypto Ransomware Threats: A Growing Concern We just wanted to warn our community about some virulent ransomware attacks that are currently circulating. At this point, none of our clients have been affected, but businesses in many industries (including banks, hospitals, and government institutions) have. The fallout has included loss of money, time, reputation, and public trust. "Locky," "Robin Hood," "Bart"....you…

Read More icon

Should You Hire an IT Consulting Firm?

For today's blog, we wanted to take a moment to discuss the question of whether or not you should hire an IT consulting firm. Working with an outside IT provider is not a good fit for everyone. We'll be describing the kinds of scenarios where this does or does not make sense. Who should not hire an IT consulting firm?…

Read More icon

How to Encrypt Your Mac With FileVault

What is FileVault? FileVault is a data encryption software that is included in all Apple computers (OS X 10.7 or higher). When FileVault is enabled, all the data on the computer is locked until a password is entered, meaning all data is safe from unauthorized users. Why Use FileVault? Enabling FileVault is a good protective measure to have in place,…

Read More icon
1 2 3 12