Recent Posts

Categories

See all

Archives

See all

TNP Blog

The Network Pro

Recent Posts

Fileless malware: who are the targets?

Business owners have spent the last couple months fearful of cyber attacks from the “fileless malware” plastered across headlines. The reality of this new threat doesn’t actually call for panic...yet. Getting acquainted with this new malware today

Read more

Real-world audits: disaster recovery plans

Failing to stop a cyber attacker, or to pass a disaster recovery plan (DRP) audit could be the product of focusing your efforts on the wrong educational resources. Because no matter how many conferences you attend, or how many certifications you

Read more

Attacks on WordPress websites

WordPress is currently the most used web platform, with a market share of 40-50% out of all Content Management Solutions (CMS) platforms. It powers various types of websites, from personal sites to those of small- and medium-sized businesses as well

Read more

Social media platforms that suit your SMB

Facebook might be the biggest name in social media, but that doesn’t mean it’s the only one. Since there isn’t a one-size-fits-all platform, there are trendier options such as Instagram and Snapchat, with a burgeoning millennial base to choose from.

Read more

Popular printer brands are prone to attacks

Do you have security measures in place for your office’s printers? By “security,” we don't mean locked doors or watchful guards; we're referring to security against hackers that use printers as a weapon. Despite many companies going paperless,

Read more

Virtualization troubles: 3 common pitfalls

Implementing a virtualized data storage solution at your business is no small feat. It’s a complicated process that requires immense amounts of technical expertise. Unfortunately, getting it up and running is only half the battle. For the most

Read more

Do businesses need office phones any more?

As VoIP stormed onto the small business scene over a decade ago, a lot of businesses wanted to get in early. The only problem with doing so was that early iterations of this technology didn’t include advanced call-forwarding and “Follow-me”

Read more

5 great ways to prevent cyber-attacks

As technology consultants, we’re stuck between a rock and a hard place. We want to provide our clients with enterprise-level IT, but that requires that we specialize in overwhelmingly intricate technology. Explaining even the most foundational

Read more

Office 365 and G Suite

Google’s G Suite or Microsoft’s Office 365? That’s the question. One that many business owners ask themselves but often put aside because weighing the individual functionality seems like a monumental task! We’re here to help end that indecisiveness,

Read more

Our 4 favorite web browsers

Internet browsers are a unique type of software. No two browsers share the same list of features and functions, and almost all of them are free. That means you have a lot of options when choosing which is right for you, and that decision isn’t

Read more

Recent Posts

Categories

See all

Archives

See all