Blog

Hackers come in all shapes and sizes

Hackers are known by the general public as cybercriminals, especially with so much news about nude celebrity photos beings released to the cloud, millions of customer information being stolen across many industries, and government agencies paying the ransoms hackers demand so that the former can regain access and control of their systems. However, did you […]

AI-powered VoIP: What businesses can expect

Business automation is quickly becoming a necessity for most organizations. While human input is still essential, automating processes — and powering them with artificial intelligence (AI) — has allowed for more efficient and effective operations. As telecommunications continue to play a big part in running most business operations, AI developers are also introducing advances in […]

Does your company have a Remote Work Plan?

 

By Mike Gilmore, RESULTS Chief Compliance Officer

 

Does your business have a contingency plan in case a large number of employees need to work from home? Remote working is becoming easier than ever and is a smart way to prevent the spread of germs.

Understanding IT Governance

 

By Mike Gilmore, RESULTS Chief Compliance Officer

 

Community Banks carry an on-going burden of compliance for information technology (IT). Examiners expect the bank to undergo annual IT audits, penetration tests, policy reviews, and complete comprehensive technology plans, risk assessments and cybersecurity self-assessments all while trying to do the real work of banking in the community.

Simple PC tricks to improve your productivity

Working in front of a computer has its pros and cons. There are many useful work applications that are available on your desktop or laptop. But there are also so many distractions on-screen vying for your attention that it’s easy for you to lose focus on important tasks. Here are a few tricks to avoid […]

How scammers launch phishing attacks via VoIP

In a vishing scam, scammers may pretend to be a bank representative, a government official, or any type of legitimate entity requesting confidential information via Voice over Internet Protocol (VoIP) platforms. With expanding avenues of cyberattacks, remaining vigilant is more important than ever. Learn why vishing campaigns are effective. VoIP makes it easy to create […]

Using Workplace Analytics to boost productivity

Microsoft’s Workplace Analytics uses data gathered from email, documents, calendar, and other Office 365 applications to present a clear picture of both employee and manager productivity. It’s a clear upgrade from MyAnalytics, which allowed employees to view just their own data. How does Workplace Analytics work? A paid add-on to Office 365 enterprise plans, Workplace […]

Here’s how to speed up Google Chrome

Google made its foray into web browsers with Chrome in 2008. With its remarkable speed and ease, Chrome was welcomed by many users. However, over time, the browser becomes a bit sluggish, especially if you’ve installed extras such as extensions. Follow these easy steps to ramp up your Chrome browser’s speed. Clear your browsing data […]

Benefits of technology business reviews

Is your IT infrastructure still driving value for your company? If you want to ensure everything is running smoothly, it’s important to conduct technology business reviews whenever possible. A technology business review reveals the strengths and weaknesses of your company’s IT framework.

What is bloatware, and how can you remove it?

Bloatware is software that nobody asked for but is on your computer, taking up valuable space. These software apps come with your hardware pre-installed, and very often, it isn’t always apparent how to delete them properly. Superfish In mid-2014, Lenovo users noticed that something was awry with their web browsers: banner ads were breaking webpage […]