New Ask A Technician Resource

In our March newsletter we shared our first “Ask a Technician” article where we interviewed a member of our team to answer questions ...

Memorial Day Tech

One aspect of Memorial Day that is often forgotten is how much we benefit from the technological developments of our military. ...

Metzger Trucking: Customer Testimonial

Pictured: Susanna Chapman, Dan Metzger, Cara Roe (holding Steve, the office dog), Nick Keene, and Micah Metzger ...

Cisco Express Networking Specialization

It was a big month for our team, and we want to say a big CONGRATULATIONS to both Jon Helman and Brett Shaske ...

Secure, Remote, Mobile Business? NOT A PROBLEM!

I was recently having lunch with a friend who works in a local financial company. He was sharing the struggles their ...

Cyber Security Threats

With the recent news surrounding the Cyber Security threat, WannaCry, we felt it was important to address questions surrounding the vulnerability of your business to these kinds of threats. We've provided a special gift for you to help you map out your steps to protect your data. ...

How To Keep Your Employees From Leaking Confidential Information

Back in 2014, Code Spaces was murdered. The company offered tools for source code management, but they didn’t have solid control over sensitive information — including their backups. One cyberattack later, and ...

Watch Out For Invoice Emails That Include Encrypted Docs

Hackers have once again pushed the envelope. They’ve again come up with a new way to infect target computers and get around whatever detection software is in place. The latest twist is ...

Some Google Maps Listing Links Sending People To Malware Sites

Each month, hundreds of millions of people rely on Google Maps. It has become the replacement for GPS in most of our cars. We rely on the service for everything from getting ...

Microsoft Word Vulnerability Being Used To Victimize Email Users

Microsoft is taking some heat, thanks to a nasty exploit in Microsoft Word that is being used to install malware on the PCs of unsuspecting users. The exploit was discovered by both ...