How to manage Google reviews

How to manage Google reviews

Google is shaking things up yet again. Reviews from sites like Facebook and Yelp will now be displayed in search results with well-placed keywords and link-worthy content. Here’s how you can efficiently manage your business’s reviews How Google changed search results Google now automatically aggregates and includes online reviews to display in the Knowledge Panel […]

IT policies to protect your business

IT policies to protect your business

Employees are one of your biggest security holes. There is no foolproof prevention method for human error, which is why employee mistakes are one of the most common causes of a security breach. To reduce potential risks, we’ve suggested a few IT policies you should implement to protect your business. Internet In today’s business world, […]

The lowdown on virtualization and the cloud

The lowdown on virtualization and the cloud

Virtualization and cloud computing are sometimes used interchangeably, and it’s easy to see why people confuse the two. To set the record straight, virtualization is NOT cloud computing. But these two revolutionary technologies often overlap. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. If one day […]

Google reviews: how to make them count

Google reviews: how to make them count

Google has recently modified their search results to display ratings from review sites like Facebook and Yelp. While this may seem like a small change, it has actually made reviews more important than ever in terms of SEO. With the following tips, your company can shine in the Google search results. How Google changed search […]

Spoofed email takes down NBA team

Spoofed email takes down NBA team

The NBA Finals may now be over but for one team, the losses keep coming. Yahoo! Sports reported that the Milwaukee Bucks fell victim to a spoofed email scam last month. Names, addresses, Social Security numbers, compensation information and dates of birth of the players were unknowingly sent to a hacker and created a massive […]

How to best utilize mobile tech for staff

How to best utilize mobile tech for staff

Love it or hate it, mobile technology in the workplace is here to stay. While more and more companies are utilizing it as a way to up their productivity, there is a right and a wrong way to go about it. Here are four tips to help you successfully integrate mobile devices into your organization […]

IT Security Policies you need to implement

Most business owners have an employee handbook. But when it comes to the online security of their business, often times this portion is either not adequately addressed, or not addressed at all. However, with cyber crimes an ever increasing threat, and the fact that employee error is one of the most common causes of a […]

Patients want electronic communication

More and more people are clamouring for the ability to communicate with their doctor through email and social media. In fact, a recent study from the Journal of General Internal Medicine reports that 37 percent of patients have emailed their doctor while 18 percent used Facebook to get in touch with their physician. It behooves […]