Recent Posts

Categories

See all

Archives

See all

TNP Blog

Real-world audits: disaster recovery plans

Failing to stop a cyber attacker, or to pass a disaster recovery plan (DRP) audit could be the product of focusing your efforts on the wrong educational resources. Because no matter how many conferences you attend, or how many certifications you

Read more

Attacks on WordPress websites

WordPress is currently the most used web platform, with a market share of 40-50% out of all Content Management Solutions (CMS) platforms. It powers various types of websites, from personal sites to those of small- and medium-sized businesses as

Read more

Social media platforms that suit your SMB

Facebook might be the biggest name in social media, but that doesn’t mean it’s the only one. Since there isn’t a one-size-fits-all platform, there are trendier options such as Instagram and Snapchat, with a burgeoning millennial base to choose

Read more

Popular printer brands are prone to attacks

Do you have security measures in place for your office’s printers? By “security,” we don't mean locked doors or watchful guards; we're referring to security against hackers that use printers as a weapon. Despite many companies going paperless,

Read more

Virtualization troubles: 3 common pitfalls

Implementing a virtualized data storage solution at your business is no small feat. It’s a complicated process that requires immense amounts of technical expertise. Unfortunately, getting it up and running is only half the battle. For the most

Read more

Do businesses need office phones any more?

As VoIP stormed onto the small business scene over a decade ago, a lot of businesses wanted to get in early. The only problem with doing so was that early iterations of this technology didn’t include advanced call-forwarding and “Follow-me”

Read more

5 great ways to prevent cyber-attacks

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational

Read more

Office 365 and G Suite

Google’s G Suite or Microsoft’s Office 365? That’s the question. One that many business owners ask themselves but often put aside because weighing the individual functionality seems like a monumental task! We’re here to help end that

Read more

Our 4 favorite web browsers

Internet browsers are a unique type of software. No two browsers share the same list of features and functions, and almost all of them are free. That means you have a lot of options when choosing which is right for you, and that decision isn’t

Read more

Business opportunities with IoT

Many IT experts predict that more businesses will gravitate towards the Internet of Things (IoT). This statement is hard to dispute considering that smart thermostats and refrigerators are already in widespread use. But internet-connected

Read more

The new face of e-marketing: IG stories

Scroll, double-tap, repeat, might have been the original Instagram-ing routine, but not anymore. After partnering with global advertising giants, IG is introducing its latest feature: Stories. With it, you can share short videos, or even

Read more

What hyperconvergence means for you

 

Modern web network and internet telecommunication technology, big data storage and cloud computing computer service business concept: server room interior in datacenter in blue light
Read more

Tips for a cloud-based unified communications

The number of small businesses that will move their unified communications to the cloud is predicted to increase from 10% to 48%, while medium-sized firms and large enterprises follow, albeit in smaller percentages. These numbers are not

Read more

Recent Posts

Categories

See all

Archives

See all