Founder and CEO of Kerkhoff Technologies Inc and Crafty Penguins
Online reputation can make or break your chances of landing and retaining clients. That’s why managing this aspect in your business is critical. Your store, whether brick-and-mortar or online, looks great. And your product or service may have struck a chord with the target audience. So, you might think there’s not much more you can…
Skilled hackers can easily access your system and steal precious business information. Upgrading your cybersecurity can help address this problem. Taking your cybersecurity seriously is a must. Otherwise, you leave the door open for criminals to compromise your business’s privacy and cause legal troubles. Now, you might think that cybercriminals only target large companies due…
The reality is, mobile devices are less safe than desktop computers. Boosting security on such devices is essential if you use them in business. Technological breakthroughs have streamlined your operations in several ways. Primarily, you can now use mobile devices to make your communication and data sharing more convenient. But this technological advancement also means…
Regardless of where your Windows or Linux servers are located, how confident are you that in the event of a major disaster, that your business can continue as usual? Have you run a “fire drill” recently to prove that belief? While there are many awesome SaaS cloud solutions that don’t require any servers, the reality…
The letter you’ve received is a “Software Asset Management” (SAM) review invitation from a Microsoft Partner. The important thing to note, these SAM reviews are not coming from Microsoft directly, but from one of their partners whose aim is to sell software. Yes, they are working with Microsoft using Microsoft’s tools, but they are not…
Do you think you’re safe because you have anti-virus, a firewall, and you are pretty careful with what links you click on? Ian, Curtis and I presented a special webinar where we discussed and showed (with a live demo) how: Hackers expand their access in your network Why even strong passwords are not enough to…
Earlier this month we hosted a webinar where we discussed the power of modern phone systems (with a focus on the 3CX software solution), and how key VoIP features (some lesser-known) can drastically improve your workflow and productivity, whether working out of an office/store or at home or a combination. When working from home, are your…
Our 2nd newsletter is on the way in the mail for you and your team; click here to access it What a crazy month it’s been! The newsletter includes the blog posts that our team has personally written and published recently. • Training materials from LinkedIn on how to embrace working remotely, including communication, culture,…
Are you ramping up your Remote Work efforts? Especially if you’re already paying for a Microsoft Office 365 subscription already, you should check out Teams. Chances are that you’ve probably heard about it before. This is included with almost every subscription at no extra charge. It’s a powerful way to share documents, files, have discussions,…
I’ll jump right to the point here. Make sure your team is careful with what they click. Things aren’t always what they seem – crooks will use world events to trick unsuspecting users into giving away their passwords, opening attachments they shouldn’t, and to run viruses. Being able to quickly recognize telltale signs (red flags)…