<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>Apogee Complaince Group, Inc.</title>
    <link>https://www.apogeemsp.com</link>
    <description />
    <atom:link href="https://www.apogeemsp.com/feed/rss2" type="application/rss+xml" rel="self" />
    <item>
      <title>Monitoring your employees online: Is it a good idea?</title>
      <link>https://www.apogeemsp.com/2020/07/monitoring-your-employees-online-is-it-a-good-idea</link>
      <description>The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we have some helpful tips on how to implement it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The case for monitoring

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here are several reasons why monitoring your employees’ activities on company devices is a good idea. It can help you:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Sadly, many business owners who monitor their employees often discover that their staff members aren’t focused solely on the company’s success.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Arguments against employee monitoring

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Of course, you should also be aware of the potential downsides to monitoring. These include:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Monitoring guidelines to follow

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you decide to monitor your employees, here are a few tips you should follow.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      1. Create written policies
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
When you monitor your employees, ask yourself: “Am I doing this for security purposes? Is it to ensure my employees aren’t wasting time on games or social media?” If your monitoring policies are too strict, you could create an atmosphere of distrust.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Set guidelines for acceptable use of email and social media, web browsing, instant messaging, and downloading software and apps. Also, make sure to include how monitoring will be carried out and how data will be used, secured, and destroyed.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      2. Tell your employees
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
It’s important to inform your employees about the scope of your monitoring policies. If they find out you’re doing it secretly, you could face legal issues. By being transparent, you may actually see a boost in productivity by deterring employees from wasting time on the web.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you tell your employees, explain why you’re doing it and the risks your business faces from misuse of digital assets. Reassure them you’re not doing it to spy on their personal life, but to create a compliant and law-abiding workplace. Because their activities will now be less private, encourage your staff to use their smartphones for personal matters. Also, provide your employees a copy of your written policy for them to read and sign.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      3. Get the right technology tools
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
You don’t need to know each and every employee activity, so look for apps and software that alert you of the most relevant problems, so you can focus on more important tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If implemented correctly, employee monitoring makes your business more secure and productive. For more information about security and other IT support tools, get in touch with us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/07/monitoring-your-employees-online-is-it-a-good-idea/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1424303438.jpg" length="35152" type="image/jpeg" />
      <pubDate>Wed, 01 Jul 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/07/monitoring-your-employees-online-is-it-a-good-idea</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1424303438.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Prevent hackers from stealing healthcare data</title>
      <link>https://www.apogeemsp.com/2020/06/prevent-hackers-from-stealing-healthcare-data</link>
      <description>Advances in IT have transformed paper medical records into digital files that can easily be accessed and stored. Sadly, this development has also resulted in sensitive healthcare data, or personal health information (PHI), becoming a bigger target for hackers. Because of this, healthcare providers must remain vigilant against all forms of cyberattacks. From financial information […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Advances in IT have transformed paper medical records into digital files that can easily be accessed and stored. Sadly, this development has also resulted in sensitive healthcare data, or personal health information (PHI), becoming a bigger target for hackers. Because of this, healthcare providers must remain vigilant against all forms of cyberattacks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  From financial information to medical information

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In the past few years, cybercriminals have focused on stealing financial data, including credit card numbers, online banking credentials, and other personal information. But things are taking a turn, with financial institutions fortifying their database security and raising client awareness on the growing problems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Stronger data protection measures in the financial industry have forced criminals to turn their attention to medical data, which is typically much less secure. Patient data includes date of birth, medical and physical records, and social security number — information that can’t be easily reset, and is significantly more valuable than credit card data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Securing healthcare data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Healthcare data has become more attractive to criminals, and it’s crucial that medical institutions take necessary precautions to secure their patients’ information from data thieves. Here are some best practices to secure those pieces of information:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It is important for healthcare providers to secure sensitive patient data. Learn how your organization can better protect your patients’ information by giving us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/?p=35772"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/165653712.jpg" length="27049" type="image/jpeg" />
      <pubDate>Fri, 26 Jun 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/06/prevent-hackers-from-stealing-healthcare-data</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/165653712.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cut your IT costs by investing in thin and zero clients</title>
      <link>https://www.apogeemsp.com/2020/06/cut-your-it-costs-by-investing-in-thin-and-zero-clients</link>
      <description>Cutting costs is great for business, but only if doing so does not result in lower-quality products or services. You can achieve this kind of compromise in your IT system, too. Instead of investing in expensive computer hardware, you can opt for affordable but powerful thin and zero clients. What are thin and zero clients? […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cutting costs is great for business, but only if doing so does not result in lower-quality products or services. You can achieve this kind of compromise in your IT system, too. Instead of investing in expensive computer hardware, you can opt for affordable but powerful thin and zero clients.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What are thin and zero clients?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Thin clients are stripped-down computers with minimum processing power and memory. They rely on a basic operating system (OS) and a network connection to access a more powerful system where almost all computing processes take place.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Zero clients work the same way. The only difference is that there’s no local storage or OS installed on the device; all the software, storage, and processing power sits on a server until you need it. This setup makes a zero client ideal for cutting costs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What are the benefits of using thin and zero clients?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Reduced hardware costs
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
If you want computers with low upfront costs, choose thin and zero clients. Conventional desktops start at $600 per user, while thin clients can go as low as $250 per user. And since they have no hard drive or other moving parts, lean devices tend to be more durable and have a longer life span than their traditional counterparts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Simplified IT management
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Another benefit of thin and zero clients is that they can be managed from a server. Suppose a new software update is released. Instead of manually downloading the patch on each computer, you can simply install the update on your server and roll it out to all thin and zero clients.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Apart from installing updates, you can also make backups, security configurations, and application deployments in the data center. This quickens setup, reduces downtime, and increases employee productivity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Minimized security risks
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Thin and zero clients also help you prevent costly malware attacks and data breach incidents. Your employees and poorly managed endpoints are the biggest vulnerabilities with traditional desktops. Thin and zero clients reduce these problems by limiting direct access to the OS. This prevents employees from copying sensitive data to removable media and installing software, malicious or otherwise.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your thin or zero client is damaged or corrupted, you don’t have to worry about your data, as it’s originally stored in an impenetrable server.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Decreased energy consumption
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Because processing is done locally, traditional desktops generate a lot of heat and require more power, resulting in huge power and cooling bills. In contrast, thin and zero clients consume only 4 to 6.5 watts of power, almost 1/50th of thick client requirements. What’s more, they require little to no cooling, allowing you to enjoy significant cost savings.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Do not overlook thin and zero clients if you’re searching for ways to cut costs without compromising outcomes. The reduced hardware costs, power bills, and security risks are just too good to pass up.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you’re still unsure about this technology, give us a call. We’ll assess your tech needs and determine whether or not thin or zero clients can help you succeed.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/06/cut-your-it-costs-by-investing-in-thin-and-zero-clients/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/957096827.jpg" length="35099" type="image/jpeg" />
      <pubDate>Wed, 24 Jun 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/06/cut-your-it-costs-by-investing-in-thin-and-zero-clients</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/957096827.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What you need to know about HTTPS</title>
      <link>https://www.apogeemsp.com/2020/06/what-you-need-to-know-about-https</link>
      <description>Most people don’t question the padlock icon that sometimes appears in their web browser’s address bar. If you’re one of those who didn’t know, it’s a security feature that authenticates websites and protects the information users submit to them. Another indicator you’re in a secure site is the HTTP before the site’s URL. But why […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most people don’t question the padlock icon that sometimes appears in their web browser’s address bar. If you’re one of those who didn’t know, it’s a security feature that authenticates websites and protects the information users submit to them. Another indicator you’re in a secure site is the HTTP before the site’s URL. But why do these things matter?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  HTTPS encryption

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The “s” in HTTPS stands for “secured”. It was introduced in 1995, so older websites that have been left on its own without regular maintenance usually don’t have it. But even to this day, unsecure websites exist, and fraudsters can easily take advantage of them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you visit a site with an HTTP connection, everything you type or click on that website is sent without encryption. This means that anyone who intercepts the data transferred between the website and your computer can readily view them. Cybercriminals can exploit this fact to gain access to your personal data, Social Security number, credit card information, and the like. This puts you at risk of identity theft and other fraudulent activities.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  HTTPS certificates

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you visit a website, your computer uses an online directory to translate its alphanumeric name into a numerical address. It then saves that information on your computer, so that it doesn't have to check the online directory every time you visit the same website.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In the event that your computer gets compromised, it could be tricked into directing a perfectly safe web address like www.google.com to a malicious website. Most of the time, users are sent to sites that look exactly like the legitimate site, but are actually fake copies designed to trick them into divulging their credentials.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To prevent such things from happening, the online directories mentioned earlier issue 
    
  
  
                    &#xD;
    &lt;a href="https://www.cloudflare.com/learning/ssl/what-is-an-ssl-certificate/#:~:text=SSL%20certificates%20are%20what%20enable,identity%2C%20along%20with%20related%20information."&gt;&#xD;
      
                      
    
    
      an ecosystem of certificates
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     that turn HTTP into HTTPS, making it impossible for anyone to be redirected to a fraudulent website.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How does this affect our daily browsing habits?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We often visit a multitude of websites in a short period of time without checking each one for padlocks and certificates. Unfortunately, we can’t ignore the importance of HTTPS, so here are a few things to consider the next time you browse the internet:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      If you want to learn more about safer browsing habits and endpoint security, give our office a call.
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/?p=35719"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1285965587.jpg" length="61479" type="image/jpeg" />
      <pubDate>Wed, 17 Jun 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/06/what-you-need-to-know-about-https</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1285965587.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How MSPs are helping businesses navigate the challenges of COVID-19</title>
      <link>https://www.apogeemsp.com/2020/06/how-msps-are-helping-businesses-navigate-the-challenges-of-covid-19</link>
      <description>IT services are more critical than ever before, proving their value in the face of a health crisis and the abrupt shift to remote working. Here are some ways managed IT services providers (MSPs) are helping small companies leverage technology to support their remote teams and go about business as usual. Providing infrastructure and service […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    IT services are more critical than ever before, proving their value in the face of a health crisis and the abrupt shift to remote working. Here are some ways managed IT services providers (MSPs) are helping small companies leverage technology to support their remote teams and go about business as usual.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Providing infrastructure and service desk capabilities

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In today’s digital work landscape, MSPs are keeping their noses to the grindstone to fulfill customer demands and help keep businesses running. While many small companies have taken the first step of transitioning to remote work, they still need help managing the logistics.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Right now, MSPs are providing customers with IT infrastructures and taking on a host of network tasks, including configuring hardware, establishing remote connections, and managing backup and storage options, among other activities. These all help to ensure that company networks are reliable enough to facilitate a remote workforce.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    MSPs are also offering service desk capabilities, providing companies with a centralized resource for employees, customers, and business partners to answer questions, troubleshoot problems, and facilitate solutions. Appropriate and timely support is crucial, especially in times of great uncertainty.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Simplifying cloud adoption

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud solutions are ideal if IT environments must be quickly modified to meet changing demands or difficulties, which is why MSPs are now helping businesses leverage a variety of cloud technologies and even move their data and applications online.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    And because cloud migration can get complex, many MSPs are also offering managed migration plans that help companies transition key workflows and processes to the cloud safely and efficiently.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Offering remote support where possible

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The current travel restrictions and social distancing measures make work-related travel difficult and risky. And with highly distributed workforces, many companies would rather source local service technicians for break/fix assistance, cabling, and other IT solutions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Partnering with MSPs ensures that systems and networks are protected all the time and critical support is provided within 24 hours. What’s even better is that some providers have technicians in different locations, making it easy to provide tools, resources, and support even in hard-to-reach areas.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Delivering flexible solutions

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As business needs continue to shift, MSPs must move in lockstep and provide support wherever they can. Here are some other ways MSPs are helping their clients navigate these trying times:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Assisting with IT projects
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Because of how broad and challenging IT projects can be, it’s not uncommon for companies to lack the right skills and resources to handle them. MSPs are helping them by providing the expertise and technologies needed to pursue these projects, allowing companies to keep moving forward.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Foregoing long-term contracts
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Some companies need IT support and services but can’t afford to commit to long-term contracts. Similarly, some want to augment their IT only for the duration of the COVID-19 pandemic. What's great is many MSPs are providing flexible IT solutions, giving customers all the services and support they need, when they need them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Offering faster response times
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Especially now that downtime could likely spell the end of a business, companies seek quick turnaround times. Since MSPs typically offer 24/7 support and tout specialists with a wide range of experience and knowledge, they can proactively address issues and ensure that IT infrastructures are working as efficiently as possible.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Providing better customer service

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As many businesses are still adjusting to the new normal, providing positive customer experiences will go a long way to earning trust and ensuring customer loyalty post-crisis. By being compassionate and empathetic to the situations of their customers, MSPs are showing companies that they're navigating these trying times together.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Call our IT experts today to help configure the perfect remote work setup for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/?p=35715"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/858355596.jpg" length="46511" type="image/jpeg" />
      <pubDate>Mon, 15 Jun 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/06/how-msps-are-helping-businesses-navigate-the-challenges-of-covid-19</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/858355596.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>New Android malware detected!</title>
      <link>https://www.apogeemsp.com/2020/06/new-android-malware-detected</link>
      <description>If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures. This threat can put your data and business in jeopardy, so […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures. This threat can put your data and business in jeopardy, so it’s important you fully understand what DEFENSOR ID is capable of.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is DEFENSOR ID?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    DEFENSOR ID is a banking Trojan that minimizes its malicious capabilities to sneak past security checks and infiltrate the Google Play Store. The malware’s primary function is to request access to an Android device’s Accessibility Service, which would allow hackers to execute a variety of commands.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For starters, if unwitting users grant access to DEFENSOR ID, the malware can observe any launched apps and send sensitive information back to hackers. This means hackers can steal anything from passwords and private emails to banking information and one-time SMS activation codes for two-step verification processes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    DEFENSOR ID also allows hackers to remotely uninstall apps, launch programs, and perform gestures (e.g., tap, swipe, click) within the launched program. In theory, this feature can enable hackers to empty a victim’s bank account with minimal effort.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What’s more, the Trojan extends the lock screen timeout to 10 minutes so that cybercriminals have enough time to perform their malicious operations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Beware of apps leveraging Accessibility Services

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    According to researchers, DEFENSOR ID targeted Brazilian users and was downloaded over a dozen times. But despite its small success rate, it’s possible that more malware will leverage these techniques to steal sensitive information and control user devices. In fact, earlier in 2020, McAfee researchers discovered Android/LeifAccess malware that exploited Accessibility Services to leave fake reviews on the Google Play Store.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Plus, a common Android issue is that many independent software developers can upload their apps to the Google Play Store and easily circumvent security checks. So, if users aren’t thoroughly vetting the apps they download onto their devices, attacks similar to DEFENSOR ID will become more widespread.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Malware that can abuse Accessibility Services may even give rise to more deceptive online scams or massive-scale data breaches that can shut down businesses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How to defend against DEFENSOR ID

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Developing a healthy skepticism of apps in the Google Play Store is the best way to prevent malware attacks like DEFENSOR ID. This involves training your staff to get in the habit of evaluating an app before downloading it. More specifically, they should be verifying whether user reviews seem authentic, checking the total ratings and downloads, and consulting with security experts whether an app is safe.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses should also use endpoint security software to control what apps users can install on their company-registered devices. By limiting downloads to a few, fully verified apps, you can minimize your company’s exposure to mobile malware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to keep your business safe from malware and other cyberthreats, it’s in your best interest to call cybersecurity experts like us. Not only do we provide top-notch security solutions, but we also offer proactive maintenance services to protect your IT at all times.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/?p=35706"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3422240740.jpg" length="53017" type="image/jpeg" />
      <pubDate>Wed, 10 Jun 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/06/new-android-malware-detected</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3422240740.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Spotty home Wi-Fi? Try wireless repeaters and access points</title>
      <link>https://www.apogeemsp.com/2020/06/spotty-home-wi-fi-try-wireless-repeaters-and-access-points</link>
      <description>Residential Wi-Fi connections are slower and less reliable than enterprise-grade ones. But now that more people have shifted to remote work, having a fast and stable wireless connection at home is more important than ever. What can you do to ensure you don’t suffer dropped Wi-Fi signals while you’re in a videoconference or finishing up […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Residential Wi-Fi connections are slower and less reliable than enterprise-grade ones. But now that more people have shifted to remote work, having a fast and stable wireless connection at home is more important than ever. What can you do to ensure you don’t suffer dropped Wi-Fi signals while you’re in a videoconference or finishing up a report? Look into getting wireless repeater devices and additional access points.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Both wireless repeaters and access points are simple and inexpensive, and getting either or both of these devices can improve your home Wi-Fi.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Wireless repeaters are devices that extend the limited reach that Wi-Fi routers tend to have, especially in structures with thick walls and multiple floors. They receive a signal from a Wi-Fi router and rebroadcast it as a new network. This new network is an extension of the main network, enabling the signal from your router to be transmitted over long distances or to the other side of obstructions, such as a wall, post, or ductwork.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    On the other hand, access points are devices that allow wireless devices to connect to a network. Your router at home is actually an access point, and while most access points have built-in routers, others have to be connected to a router. Access points are usually hardwired to network switches or modems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Getting started

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But before you go out and buy these devices, conduct a survey of the Wi-Fi signal throughout your home first. This will help you map out where to place repeaters and access points to maximize your Wi-Fi connection. This involves:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Based on your analysis, identify the best places to put the repeater and access point. For instance, if your router is in the living room and you can’t get a good signal in your bedroom down the hall, place the access point outside the living room and the repeater in the bedroom. The signal will be extended by the access point and picked up by the repeater, which will then broadcast it to nearby devices. Note that wireless repeaters must be set up in areas where the signal is poor, not in dead zones.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Setting up wireless repeaters and access points

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most brands and models of wireless repeaters and access points follow the same setup process.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Wireless repeaters
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Access points
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you need more information about setting up and getting the most out of your wireless network, whether at home or in the office, get in touch with our experts today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/?p=35674"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3286421789.jpg" length="22580" type="image/jpeg" />
      <pubDate>Wed, 03 Jun 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/06/spotty-home-wi-fi-try-wireless-repeaters-and-access-points</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3286421789.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Should you adopt the cloud during COVID-19?</title>
      <link>https://www.apogeemsp.com/2020/05/should-you-adopt-the-cloud-during-covid-19</link>
      <description>With the COVID-19 pandemic, many business owners are cutting costs and jeopardizing their organization’s efficiency as a result. If you want to avoid this outcome, you should invest in cloud technology. The cloud will not just help you save money, but it will also help your business run more efficiently. Ensuring continuity and efficiency with […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the COVID-19 pandemic, many business owners are cutting costs and jeopardizing their organization’s efficiency as a result. If you want to avoid this outcome, you should invest in cloud technology. The cloud will not just help you save money, but it will also help your business run more efficiently.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ensuring continuity and efficiency with the cloud

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The need to stay at home and practice social distancing have changed the way many businesses operate. With their employees unable to come to the office, organizations are forced to function with a remote team whose members are often miles away from each other.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This is where cloud technology helps. When you migrate your data to the cloud, your files are stored in a centralized server that can be accessed via the internet. So as long as a user has an internet-connected device (like a smartphone or laptop) and has the right login credentials, they can access these files from any location.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The cloud also allows multiple users to work on a single file at the same time. Any change to the file is seen in real-time, which makes it feel like team members are collaborating in the same room.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Moreover, with cloud-based communication tools like Slack, your team can communicate with each other through chat, voice calls, and video conferencing. By incorporating these technologies into your processes, your organization can function efficiently while following social distancing protocols.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Saving money with the cloud

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Suddenly adopting a remote work setup after years of strictly on-site operations can take a lot of getting used to. One of the most difficult parts of transitioning is making sure you and your staff have the right hardware and software to perform work-related tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Instead of buying hardware with company funds and issuing these machines to your staff, you can have them use their personal laptop computers and mobile devices instead. With this tactic, however, you’re not sure if your employees’ devices have the appropriate specifications to handle their workload.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you use special software, you may also have to buy and install them on your staff’s personal devices. In short, whether you issue computers or adopt a bring your own device approach, you’re bound to spend a lot of money to facilitate remote work.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But with cloud computing, you won’t need to buy new hardware. You can host your applications on the cloud, enabling a user to run them through a web browser even if they are not installed in his or her device. And because hosted applications use the cloud provider’s resources, they don’t strain user’s devices and can be used even with older or lower-end computers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Furthermore, hosting applications on the cloud eliminates the need to install programs in each of your staff’s devices. This is particularly helpful if the software you use has a limit on the number of devices it can be installed on. This way, you save money by not having to invest in newer devices for your staff and wasting time locally downloading the software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Should you migrate to the cloud now?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The short answer is yes. Thanks to the COVID-19 lockdowns, the ability to work remotely has now become essential to a business’s survival. And the cloud easily facilitates a remote work environment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      See for yourself how the cloud lets you continue doing business even in the middle of a pandemic. Contact us today to get started!
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/should-you-adopt-the-cloud-during-covid-19/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3663882347.jpg" length="37503" type="image/jpeg" />
      <pubDate>Wed, 27 May 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/05/should-you-adopt-the-cloud-during-covid-19</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3663882347.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The importance of having a business continuity plan (BCP)</title>
      <link>https://www.apogeemsp.com/2020/05/the-importance-of-having-a-business-continuity-plan-bcp</link>
      <description>Many small- to medium-sized business (SMB) owners never expect a major crisis to hit their company and are often caught flat-footed when it does. Such events can cause downtime, which can lead to lost revenue and reduced profits. In addition, SMBs that fail to recover quickly from disruption face the risk of losing their customers […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many small- to medium-sized business (SMB) owners never expect a major crisis to hit their company and are often caught flat-footed when it does. Such events can cause downtime, which can lead to lost revenue and reduced profits. In addition, SMBs that fail to recover quickly from disruption face the risk of losing their customers to their competitors. To prevent this from happening to you, you should have a BCP in place.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is a BCP?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A BCP is a predefined set of protocols on how your business should respond in the event of an emergency or natural disaster. It contains contingency plans for every aspect of your organization, including human resources, assets, and business processes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Key threats to business continuity

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    
    
  
    Various types of threats can affect SMBs such as:
  

  
                  &#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Natural disasters – These are natural phenomena such as storms, earthquakes, and wildfires.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Man-made disasters – These include cyberattacks, intentional sabotage, and human negligence.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Equipment and utility failures – These include unexpected power failure, internet downtime, and disruption of communication services.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How to build an effective BCP

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your organization does not have a BCP in place, now is a good time to put one together. These steps will help you formulate an effective BCP that will ensure your company keeps running even during a major crisis.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #1 Business impact analysis (BIA)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A BIA will help you determine how a disruption can affect your company's current functions and processes, such as personnel, equipment, technology, and physical infrastructure. This step will help you calculate the potential financial and operational loss from each function and process affected.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #2 Recovery options

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This step will help you identify key resources essential to returning your business to minimum operational levels. Some recovery options you can take include letting employees work from home or operating from a secondary location.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #3 Plan development

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This step involves assembling your company's continuity team, which will be responsible for developing and implementing your BCP.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #4 Testing and training

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Once your BCP is in place, your continuity team needs to perform regular tests to identify gaps and make necessary changes to ensure the plan’s effectiveness. They also need to conduct regular training for your employees so everyone knows their respective roles when a disaster strikes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Having a foolproof BCP is a great way to ensure your business can quickly bounce back after a major disaster. If you're thinking about creating a BCP for your company but don't know where to start, give us a call today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/the-importance-of-having-a-business-continuity-plan-bcp/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3157980737.jpg" length="43120" type="image/jpeg" />
      <pubDate>Mon, 25 May 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/05/the-importance-of-having-a-business-continuity-plan-bcp</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3157980737.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Are your business printers protected against hacks?</title>
      <link>https://www.apogeemsp.com/2020/05/are-your-business-printers-protected-against-hacks</link>
      <description>When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers can be exploited by hackers and used as a gateway to infiltrate your systems. Secure your networks against intruders by following these steps. What makes business printers vulnerable to cyberattacks? […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to cybersecurity, you probably think of protecting computers, apps, or online databases first and printers last. Precisely because they’re overlooked in, printers can be exploited by hackers and used as a gateway to infiltrate your systems. Secure your networks against intruders by following these steps.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What makes business printers vulnerable to cyberattacks?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When assessing network security threats, companies primarily focus on servers and computers not only because they are the most exposed to external threats, but also because they get the bulk of cyberattacks. Printers are often at the bottom of the list since they are not prime targets. What’s more, their functions seem to be internal at first glance, as they don’t interact with external systems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But it’s exactly because of their primary functions, namely printing and scanning, that make print devices perfect cybercriminal targets. Businesses run important documents such as tax forms, employee information, medical records, and financial statements through print devices, and hackers would definitely love to get their hands on them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    And they can — easily.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Network printers store previous print jobs in their hard drive, sometimes including those that have been canceled. If anyone accesses the printer — even remotely — they may be able to see those documents by hacking into the printer using a specialized tool.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Files can also be intercepted during wireless transmission, as modern printers can now be connected to the web. Not only can hackers exploit printers’ open network ports to view data, but they can also take over vulnerable printers and transmit their own data through the machine.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What can you do to protect your business printers?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Business printers should not be disregarded when planning a cybersecurity strategy. Keep your print devices secure by following these best practices:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Another way to secure your printers is by partnering with an IT company that can take care of your printer-related worries. From thwarting attacks to reducing management costs to keeping your printer at optimal functionality, our experts can help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Are you interested in learning more about cybersecurity? Call us today and discover how our wide array of tech services can safeguard your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/are-your-business-printers-protected-against-hacks/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/219893657.jpg" length="48249" type="image/jpeg" />
      <pubDate>Wed, 20 May 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/05/are-your-business-printers-protected-against-hacks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/219893657.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Technology: Shaping the future of healthcare</title>
      <link>https://www.apogeemsp.com/2020/05/technology-shaping-the-future-of-healthcare</link>
      <description>Digital technology has revolutionized many industries, and it's no surprise that it’s making waves in healthcare. Numerous advancements are helping reform unsustainable healthcare systems, develop cheaper, faster, and more effective cures for diseases, and improve the welfare of patients and healthcare providers alike. The future of medicine and healthcare simply lies in successfully leveraging these […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Digital technology has revolutionized many industries, and it's no surprise that it’s making waves in healthcare. Numerous advancements are helping reform unsustainable healthcare systems, develop cheaper, faster, and more effective cures for diseases, and improve the welfare of patients and healthcare providers alike. The future of medicine and healthcare simply lies in successfully leveraging these game-changing technologies, which include artificial intelligence, augmented reality and virtual reality, and nanotechnology.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Artificial intelligence

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Artificial intelligence (AI) is redefining the field of healthcare and all its functions by simplifying the analysis of complex medical data. With AI algorithms and software, healthcare professionals can fast-track medical records processing, treatment planning, and drug development, among other laborious tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When the Ebola virus disease ravaged three nations in West Africa, Atomwise partnered with the University of Toronto and IBM to 
    
  
  
                    &#xD;
    &lt;a href="https://qz.com/963484/artificial-intelligence-could-build-new-drugs-faster-than-any-human-team/"&gt;&#xD;
      
                      
    
    
      find a treatment for the virus
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    . The drug discovery company applied AI to a complete database of existing drugs and their side effects to look for one that could be repurposed. The AI tech was able to predict two that could significantly reduce the Ebola virus’s infectivity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More recently, 
    
  
  
                    &#xD;
    &lt;a href="https://www.cnbc.com/2020/01/02/googles-deepmind-ai-beats-doctors-in-breast-cancer-screening-trial.html"&gt;&#xD;
      
                      
    
    
      Google’s DeepMind developed an AI tool
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     capable of spotting breast cancer with as much accuracy as a human radiologist. Google Health and researchers from Imperial College London “trained” a computer to detect abnormalities on nearly 29,000 mammograms of women. The AI then outperformed six human radiologists in a screening trial, suggesting the tool’s potential to improve breast cancer diagnosis at an early stage.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The use of AI is also permeating the pharmaceutical industry, with companies using AI technologies to 
    
  
  
                    &#xD;
    &lt;a href="https://blog.benchsci.com/pharma-companies-using-artificial-intelligence-in-drug-discovery"&gt;&#xD;
      
                      
    
    
      discover new drug candidates and novel therapeutic solutions
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    . These are only a few of the many instances of companies using AI to automate and expedite highly elaborate processes and ultimately improve the delivery of healthcare solutions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Augmented reality and virtual reality

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Augmented reality (AR) and virtual reality (VR) are immersive technologies that allow users to take in information and content visually. While AR pertains to the use of cameras, sensors, and displays to superimpose digital and real-world elements, VR lets users experience and explore entirely simulated environments.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    New AR technologies help doctors and surgeons diagnose, treat, and perform surgery on their patients more precisely by providing them with access to real-time data and patient information. For instance, medical practitioners at Imperial College and St. Mary’s Hospital in London are using 
    
  
  
                    &#xD;
    &lt;a href="https://news.microsoft.com/en-gb/2018/02/08/surgeons-use-microsoft-hololens-to-see-inside-patients-before-they-operate-on-them/"&gt;&#xD;
      
                      
    
    
      Microsoft’s HoloLens AR glasses during reconstructive surgery
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     on patients with severe injuries.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Traditionally, surgeons located major blood vessels near wounds using a handheld scanner. With HoloLens, they can overlay 3D digital models of a patient's CT scans onto their body parts during surgery to spot key blood vessels, bones, and muscles.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Meanwhile, a recent 
    
  
  
                    &#xD;
    &lt;a href="https://hbr.org/2019/10/research-how-virtual-reality-can-help-train-surgeons"&gt;&#xD;
      
                      
    
    
      Harvard Business Review study
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     found that surgeons who have undergone VR-based training performed 230% better compared to their traditionally trained counterparts. In the study, the VR-trained participants finished a surgical procedure 20% faster and completed 38% more steps correctly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Medical institutions are also using AR/VR technologies to provide students and trainees with hands-on learning experiences, enabling them to better visualize diverse health issues and scenarios. Using immersive technologies can help them accurately learn and practice procedures without the risk of harming real patients if they make mistakes. What's more, these can allow educators to constantly monitor and give feedback to their students during their education.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Nanotechnology

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Nanotechnology is the field of research and innovation concerned with the creation of materials and devices on an extremely small scale. Advancements in this field can pave the way for more effective treatments, rapid diagnosis of diseases, and easier delivery of vaccines through aerosols and patches.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As early as 2014, researchers from the Max Planck Institute designed 
    
  
  
                    &#xD;
    &lt;a href="https://www.mpg.de/8741521/micro-robots-medical-application"&gt;&#xD;
      
                      
    
    
      micro-robots that can swim through bodily fluids
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     and potentially be used to deliver drugs or other medical relief precisely to a target location.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In 2018, researchers from the Massachusetts Institute of Technology (MIT) and Brigham and Women's Hospital designed 
    
  
  
                    &#xD;
    &lt;a href="http://news.mit.edu/2018/ingestible-pill-controlled-wirelessly-bluetooth-1213"&gt;&#xD;
      
                      
    
    
      an electronic pill that can be controlled via Bluetooth
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    . The ingestible capsules can be customized to dispatch medicine and transmit diagnostic information back to a smartphone.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More recently, medical technology company Grapheal developed 
    
  
  
                    &#xD;
    &lt;a href="https://graphene-flagship.eu/news/Pages/Electronic-patch-to-improve-chronic-wound-monitoring.aspx"&gt;&#xD;
      
                      
    
    
      a wearable patch that can help chronic wounds heal more quickly
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     using electrostimulation. This patch would also allow healthcare providers to remotely monitor the condition of a wound using biosensors, or devices that send out signals when they detect the presence or concentration of a specific biological substance.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Future technological innovations are bound to transform the healthcare industry, and it's our job to make sure it does so for the better.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Call us today and we’ll help you leverage technology to boost your business and help you deliver superior healthcare products and services.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/technology-shaping-the-future-of-healthcare/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/877601341.jpg" length="29703" type="image/jpeg" />
      <pubDate>Mon, 18 May 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/05/technology-shaping-the-future-of-healthcare</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/877601341.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Solutions to the most common printer problems</title>
      <link>https://www.apogeemsp.com/2020/05/solutions-to-the-most-common-printer-problems</link>
      <description>There are many reasons why a printer may malfunction. It could be due to faulty drivers or network connections, clogged printheads, or non-genuine printer ink. Whatever problem you may encounter, there is a solution to get your printer running again. Read on to find out how you can fix the most common printer problems. Paper […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are many reasons why a printer may malfunction. It could be due to faulty drivers or network connections, clogged printheads, or non-genuine printer ink. Whatever problem you may encounter, there is a solution to get your printer running again. Read on to find out how you can fix the most common printer problems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Paper jams

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Paper jams are a common printer problem caused by misaligned paper in the printer tray. Usually, removing the jammed paper and ensuring that the paper is lined up correctly will fix the problem.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Check your printer’s loading capacity as well. The loading capacity typically depends on the material to be printed on. For instance, a printer can print on 100 sheets of plain paper, but can only accommodate 10 envelopes at a time. To avoid jams, make sure to use only the paper sizes and materials prescribed by the printer company.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Lastly, if your printer says there’s a paper jam but no paper is stuck inside, shredded paper residues from the last paper jam could be stuck inside the printer’s gears. Remove them before trying to print again.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Driver problems

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The printer driver is responsible for communicating with your computer. Drivers often become outdated or incompatible with your system after an upgrade. Sometimes, you may install an incorrect driver, which can cause the printer to misbehave.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To fix the problem, try uninstalling the faulty driver and replacing it with the appropriate one. You can usually find printer driver information on your printer manufacturer’s support website. Avoid downloading drivers from a third party, as they may be loaded with malware that can cause your computer to malfunction.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Overloaded print queue

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are some instances where your printer fails to clear its queue. If you encounter a paper jam, for instance, the system will not consider the print job done. And if the user attempts to print again, the previous job will not make way for the new request. The worst part? Deleting the print jobs doesn’t do anything most of the time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To clear the print queue, follow these steps:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Clogged printheads

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Printhead ink will dry up if you don’t regularly use your printer. This may lead to clogging, which then prevents proper printing. To make sure this issue doesn't happen, unclog your printheads often.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The printhead is located at the end of the cartridge where the ink comes out. To clean it, take a damp paper towel and blot the ink cartridge with the printhead side down. After blotting it a couple of times, you should see ink on the paper towel. Hold the cartridge against a dry paper towel for one minute to dry out any excess ink. Slide the cartridge back into the printer and try to print again.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For printers using individual color cartridges, running a printhead cleaning job can get rid of clogs. While the setup may differ per brand, this is a typical function built into most printers’ software. Consult your user guide to know the best cleaning options for your printer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Slow printing speed

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Slow print jobs are usually caused by outdated software or an intermittent connection. Fix the problem by ensuring that printer drivers and software are updated. If your printer requires an internet connection, you can also try moving your printer closer to your router for a stronger connection.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Check your printer settings as well. For instance, you may be printing at best quality, which takes more time than a draft or normal print because it uses more ink.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If all else fails, check your connections to see if a cable or a power outlet is malfunctioning.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      These are just some common problems that you may encounter with your printer. If you have further issues, give us a call today. We’d be happy to assist you.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/solutions-to-the-most-common-printer-problems/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3318999493.jpg" length="25103" type="image/jpeg" />
      <pubDate>Fri, 15 May 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/05/solutions-to-the-most-common-printer-problems</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3318999493.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>COVID-19 won’t keep us apart, thanks to the cloud</title>
      <link>https://www.apogeemsp.com/2020/05/covid-19-wont-keep-us-apart-thanks-to-the-cloud</link>
      <description>Families and communities all over the world have been told to shelter in place. However, despite social distancing measures, people are still able to connect to one another, thanks to the cloud. Cloud computing helps buoy economies For many people, being forced to stay at home means being unable to earn money or spend money […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Families and communities all over the world have been told to shelter in place. However, despite social distancing measures, people are still able to connect to one another, thanks to the cloud.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cloud computing helps buoy economies

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For many people, being forced to stay at home means being unable to earn money or spend money on in-person services and activities that form dense congregations, such as watching movies or attending concerts. Because of this, the world is projected to enter a global recession, although cloud computing helps to put a damper on this in a number of ways:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cloud-based communication apps help keep communities stay together

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Communications can be challenging when it’s harder for people to talk face to face, but cloud-based apps keep communities together in the following ways:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cloud-based entertainment apps help us pass the time and keep us sane

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The isolation brought about by social distancing can be harmful to our mental health. Not being able to party with our friends and work out in the gym can intensify feelings of loneliness and anxiety, as well as exacerbate symptoms of depression. Thankfully, there are many cloud-based apps that can entertain us and give us virtual forms of connection.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      The cloud is now a ubiquitous part of people’s lives, be it personally or in business. To find out the best cloud solutions for your company, contact our IT experts today.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/covid-19-wont-keep-us-apart-thanks-to-the-cloud/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3934809563.jpg" length="33057" type="image/jpeg" />
      <pubDate>Fri, 08 May 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/05/covid-19-wont-keep-us-apart-thanks-to-the-cloud</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3934809563.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The SMB’s guide to staying afloat during the COVID-19 pandemic</title>
      <link>https://www.apogeemsp.com/2020/05/the-smbs-guide-to-staying-afloat-during-the-covid-19-pandemic</link>
      <description>More than being a global health crisis, the COVID-19 pandemic is also upending the global economy. Many businesses find themselves facing the grim reality that if they don’t find a way to adapt to the crisis, they’ll end up closing their doors for good. Here are some tips that can help your business get through […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More than being a global health crisis, the COVID-19 pandemic is also upending the global economy. Many businesses find themselves facing the grim reality that if they don’t find a way to adapt to the crisis, they’ll end up closing their doors for good. Here are some tips that can help your business get through these tough times.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Reduce expenses

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This one is obvious but still bears mentioning: take out your books and find out where and how you can cut costs without affecting the quality of your service.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Putting off non-essential or discretionary expenses, such as repainting your offices or buying new equipment, is a no-brainer. Cutting out fixed expenses such as rent and loan payments is harder, if not impossible, to do. However, it is crucial if your production and revenue are at a standstill.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Try asking your landlord for a reduction or deferment of a portion of your rent. Also, ask your bank if you can put off or skip loan payments for a finite period, or if they can at least waive fees on late or missed payments. (Find out if your bank is one of those offering relief to borrowers amid the pandemic 
    
  
  
                    &#xD;
    &lt;a href="https://www.forbes.com/sites/advisor/2020/04/03/list-of-banks-offering-relief-to-customers-affected-by-coronavirus-covid-19/#463df5aa4efa"&gt;&#xD;
      
                      
    
    
      here
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    .)
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Learn from your competitors

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Observe both your direct and indirect competitors, especially those that are faring better than others. Find out what they’re doing differently and see if this will work for your business. More than adopting these strategies, it’s important to adapt them to your own and your customers’ needs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s also a good idea to look at larger organizations within your industry. SMBs like yours may not be able to compete with bigger players on a scale level, but you can learn a few things about customer service, marketing strategies, and the like from them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Redefine your business model

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Even with 
    
  
  
                    &#xD;
    &lt;a href="https://www.nytimes.com/interactive/2020/us/states-reopen-map-coronavirus.html"&gt;&#xD;
      
                      
    
    
      coronavirus restrictions gradually being lifted
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     across the United States, it would take a while before things return to normal. It’s crucial to ask yourself if traditional business models would still make sense in a post-COVID-19 world and adjust accordingly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Determine any changes you need to make to your current business model. This involves identifying who your customers are and what they need, your staff’s capabilities, and any uncertainties and their impacts. Such changes may include finding a way to deliver your products or services to your customers, just like what groceries and restaurants did in the face of lockdowns and shelter-in-place directives.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Connect with your customers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Understand that many of your customers may have been affected in some way by the pandemic — they might have been laid off, for instance, or are caring for a family member who tested positive for COVID-19. They may reach out to you to pause or cancel your services, or to ask for a discount or payment deferral. When speaking to them, demonstrate empathy, whatever their concerns may be. When things get back to normal, it’s likely that those who had a positive experience with you during the pandemic will stick around and keep doing business with you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Keeping your customers informed throughout these trying times is important. Make sure, though, that what you’re saying is relevant to them. For example, if you run an eCommerce business, let your customers know through email or social media about any shortages in supply and when you expect to be able to fulfill their orders. Doing so reassures customers that you’re doing your best to provide them with the same quality of service pre-COVID-19.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Upskill your staff

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Upskilling your employees may be the best way to spend your resources during the current situation. Equipping your team with new knowledge and skills will help them adapt to the changing business environment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Sharpening your team’s digital skills is especially important now that the COVID-19 crisis is spurring digital transformation. Other areas to focus on are project management, communication, data analytics, and digital marketing. And if you find yourself short-staffed, it might pay to train employees to handle other aspects of your business, ensuring that everything runs smoothly throughout the pandemic and beyond.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The current situation requires swift and decisive action from business leaders. Making smart and proactive decisions now will ensure that you’ll mitigate the impacts of COVID-19 on your business, and that you’ll emerge from this crisis stronger than ever. For more tips on how to run your business effectively in times of crisis, drop our experts a line today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/the-smbs-guide-to-staying-afloat-during-the-covid-19-pandemic/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2213014231.jpg" length="34074" type="image/jpeg" />
      <pubDate>Wed, 06 May 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/05/the-smbs-guide-to-staying-afloat-during-the-covid-19-pandemic</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2213014231.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Keep these in mind when shopping for antivirus software</title>
      <link>https://www.apogeemsp.com/2020/05/keep-these-in-mind-when-shopping-for-antivirus-software</link>
      <description>If you think cybersecurity is only for big organizations, think again. Small- and mid-sized businesses often don’t have the budget for expensive cybersecurity tools, making them easier targets for cybercriminals. Statistics show that cybercrimes continue to increase every year. And with the global pandemic forcing businesses to work from home, protection from cyberthreats such as […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you think cybersecurity is only for big organizations, think again. Small- and mid-sized businesses often don’t have the budget for expensive cybersecurity tools, making them easier targets for cybercriminals. Statistics show that cybercrimes continue to increase every year. And with the global pandemic forcing businesses to work from home, protection from cyberthreats such as viruses and spyware is more crucial than ever. Having antivirus software is now a necessity. Here’s what you need to know when buying one.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not all antivirus software solutions are the same. If you’re considering getting one, you need to identify what you and your company needs. Then do your research among the available options in the market. Here are a few things to consider when you shop for antivirus software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #1 Cost

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are free-to-use antivirus software products in the market, but they only offer basic protections that seasoned hackers can easily infiltrate. You’ll need to pay in order to upgrade and enjoy full protection. And there’s a danger that the free software contains adware, or that it collects data and sells them to third parties.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Nowadays, nothing’s for free. The good news is that protection need not be expensive. If you partner with a managed IT services provider like us, we’ll figure out the right protection based on your needs and budget.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #2 Speed and performance

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not long ago, antivirus software consumed a lot of computer memory and slowed down devices. But thanks to new technology, the problem of speed has been addressed. Still, antivirus performance should take precedence over speed. What’s the point of a fast computer if it’s vulnerable to hackers and malware?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #3 Compatibility with multiple devices

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These days, most people use or own more than one device, such as smartphones and tablets. Look for antivirus software that can protect all your devices, regardless of software version or date of purchase. It’ll be inconvenient and expensive to have different security software per device.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #4 Comprehensive protection

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your antivirus should protect your devices from a wide variety of threats. These should include popular malware and phishing attacks, as well as malicious downloads, denial-of-service (DoS) attacks, cryptojacking, and other damaging threats.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #5 Customer support and service

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Take some time to learn more about the antivirus software manufacturer. Does the company have a solid reputation? Are they at the forefront of developing solutions against looming threats? Are they responsive to the changing cyberthreat landscape? And are they customer-driven? If they tick all the boxes, you’re sure that their products and services are worth your investment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cybersecurity is not a luxury but a necessity for all businesses. If you’re looking for the right antivirus protection, then let our experts help you. We’ll provide you with the robust security your devices and network need.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/05/keep-these-in-mind-when-shopping-for-antivirus-software/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/629218491.jpg" length="40130" type="image/jpeg" />
      <pubDate>Fri, 01 May 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/05/keep-these-in-mind-when-shopping-for-antivirus-software</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/629218491.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Finding the best work from home laptop</title>
      <link>https://www.apogeemsp.com/2020/04/finding-the-best-work-from-home-laptop</link>
      <description>Whether you’re performing some light web browsing or graphically intensive tasks, you’ll need a suitable laptop that functions according to your work from home requirements. To help you pick the right laptop, we've compiled a list of features to consider. Size – When it comes to your laptop weapon of choice, size matters. Of course, […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether you’re performing some light web browsing or graphically intensive tasks, you’ll need a suitable laptop that functions according to your work from home requirements. To help you pick the right laptop, we've compiled a list of features to consider.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Now that you know what to look out for when purchasing your new laptop, here are a couple of recommendations to get you started:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Chromebooks

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Chromebooks are budget-friendly laptops that guarantee long battery lives and come with fast processors for web browsing and running productivity apps. They’re lightweight and compact, which is perfect for those times you need to move around or switch places in your home. In addition, Chromebook laptops usually have quiet and ergonomic keyboards. With its built-in Chrome OS, you can expect a faster and more secure laptop that will keep you working efficiently.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  2-in-1 laptops

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Lightweight laptops with a tablet touch screen allow for unparalleled flexibility and mobility. Most 2-in-1s also have HD displays backed by high-speed processors and integrated graphics to enhance your video conferencing experience. What's more, they're usually paired with a stylus, making them perfect for note-taking, photo editing, and other creative tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Microsoft Surface laptop

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Microsoft Surface laptops are considered top performers in the premium laptop market, as they offer great balance and portability. They handle general computing superbly with no slowdown and noise, even if you’re running 10 applications with plenty of tabs in your browser. Other great integrations include an excellent keyboard and trackpad and an ideal screen ratio that’s perfect for productivity tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Apple MacBook Pro

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    MacBook Pro laptops are generally known for their safe and secure operating system, MacOS. They’re also popular for their powerful hardware that can run graphically intensive tasks. Plus, they can run other operating systems like Windows, UNIX, and Linux. If you need to do video editing, you can definitely take advantage of Mac-exclusive software like Final Cut Pro.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the most remarkable features that Apple MacBook Pro laptops boast of is the switch from the former butterfly-like keyboard to the more traditional scissor mechanism. The new keys offer better travel and they also feel soft and clicky. If you’re after a good blend of portability and performance, a MacBook Pro laptop is probably your best bet.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Any laptop is an investment, so you should know what to look for and what to consider. While it’s tempting to get all the great features, it’s still more important to have a laptop that’s reliable and that’s best suited for your needs, especially when you can’t afford to deal with hardware issues while working from home. Call us today to learn more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/04/finding-the-best-work-from-home-laptop/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1853530463.jpg" length="13231" type="image/jpeg" />
      <pubDate>Fri, 24 Apr 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/04/finding-the-best-work-from-home-laptop</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1853530463.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Can your internet bandwidth handle remote work?</title>
      <link>https://www.apogeemsp.com/2020/04/can-your-internet-bandwidth-handle-remote-work</link>
      <description>Even before COVID-19, remote working was already quickly becoming the new normal. It took a pandemic to tip the scale, and now most jobs are being done from home. But it’s not always a smooth ride. There are many things that can cause productivity dips, one of them being limited internet bandwidth. How much bandwidth […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Even before COVID-19, remote working was already quickly becoming the new normal. It took a pandemic to tip the scale, and now most jobs are being done from home. But it’s not always a smooth ride. There are many things that can cause productivity dips, one of them being limited internet bandwidth. How much bandwidth do you need to be able to work from home without lags or interruptions?
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is bandwidth?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Bandwidth refers to the maximum data transfer rate possible in a network or internet connection. It indicates the amount of data that can be sent over a connection in a given amount of time, and is usually expressed in bits per second (bps) or bytes per second (Bps).
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Imagine two computers with the same internet speed at 100 megabit per second (Mbps): the first computer only has a 50 Mbps bandwidth, while the second one has 100 Mbps. If they were to download the same 500 Megabit (Mb) file, the first computer would be able to do it in 10 seconds, while the second one could do it in just five.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This is because the first computer’s bandwidth is capped at 50 Mbps — even if the internet was fast, the limit of transfer would still be low. Therefore, the higher the bandwidth, the more data can be sent over a connection, contributing to faster uploads and downloads, and overall better internet experience.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How much bandwidth do you need for remote working?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The answer to this question isn’t clear cut. The biggest considerations are the type of work that you do and the apps that you use. If your job mostly consists of sending emails, editing and writing on Google Docs, and communicating on Slack, then you can do your job with ease even with a low bandwidth. On the other hand, if you frequently attend meetings through video calls, then you’d definitely need a plan with higher bandwidth.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Once you have a clear picture of how much data you send and receive on an average work day, you can start looking for plans that can support your needs. And while you definitely don’t need to conduct virtual meetings in 4K quality, you also won’t want your clients and colleagues to appear pixelated during a meeting. Neither would you want a session that gets choppy or cut off mid-conversation.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here are the minimum requirements for the most common video chat apps used by remote workers today:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
        
      
        For 1:1 video calling:
      
    
      
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
        
      
        For group video calling:
      
    
      
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
        
      
        HD video quality  
      
    
      
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
        
      
        Standard definition (SD) video quality
      
    
      
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
        
      
        Video calling
      
    
      
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
        
      
        Teams requires the same upload and download internet bandwidth for the following scenarios:
      
    
      
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you’re worried about your internet bandwidth, you can opt for audio calls instead of video calls. This considerably helps lower the information you need to upload and download. For more tips and solutions on how you can work from home without a hitch, call us. We’d be happy to help.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/04/can-your-internet-bandwidth-handle-remote-work/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4015017961.jpg" length="19058" type="image/jpeg" />
      <pubDate>Fri, 17 Apr 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/04/can-your-internet-bandwidth-handle-remote-work</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4015017961.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Could telecommuting be the new norm?</title>
      <link>https://www.apogeemsp.com/2020/04/could-telecommuting-be-the-new-norm</link>
      <description>Despite businesses' reservations, remote working comes with numerous benefits, including lower overhead expenses and improved productivity. And with the coronavirus pandemic forcing employees to work from home, this might just be the tipping point for remote work to become the norm. Enforced flexibility A pandemic is one of the most socially, economically, and politically disruptive […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Despite businesses' reservations, remote working comes with numerous benefits, including lower overhead expenses and improved productivity. And with the coronavirus pandemic forcing employees to work from home, this might just be the tipping point for remote work to become the norm.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Enforced flexibility

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A pandemic is one of the most socially, economically, and politically disruptive events that could ever happen. Infections and fatalities constantly increase, business operations are shut down, and scientists race against time to find a cure.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Companies lucky enough to remain operational still face a significant challenge: maintaining business continuity. For most, the simplest way to achieve this is by moving their business resources online and adopting an effective remote work strategy.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With resilience and careful decision-making — as well as the right tools and processes — you might just find your employees more productive, less stressed out by work, and expressive as ever.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  A wealth of benefits

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Remote work offers several benefits for both employees and employers. In addition to saving time and eradicating commute-related stress, remote work can improve employee productivity. 
    
  
  
                    &#xD;
    &lt;a href="https://www.timedoctor.com/blog/remote-teams-future-of-work/"&gt;&#xD;
      
                      
    
    
      A number of studies
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     reveal that the freedom to create a comfortable environment and schedule encourages employees to perform at their best.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    At the same time, employers benefit from reduced overhead expenses while also having access to a wider pool of applicants. Because workplace flexibility is among the top considerations of many young job seekers, remote work arrangements would be right up their alley.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Employers can also hire outside of reasonable commuting distance, as employees won’t have to report to the office as frequently, if not at all. What’s more, mandatory daily attendance is going out of fashion — more businesses are now prioritizing performance over hours clocked in. Many prefer focusing on the quality of outputs rather than just keeping people in the office from 9 to 5.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses reap great rewards for recognizing performance instead of just presence. This approach makes for more engaged, efficient, and satisfied employees, consequently creating a healthy and progressive company culture.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Encouraging development

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many businesses believe that a traditional office setup helps bring about better relationships and collaborations. However, data actually points out that interpersonal behavior and communication — not solely proximity — are the key drivers of 
    
  
  
                    &#xD;
    &lt;a href="https://blog.taskpigeon.co/workplace-trust-trust-important-workplace/"&gt;&#xD;
      
                      
    
    
      trust
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     and 
    
  
  
                    &#xD;
    &lt;a href="https://smallbusiness.chron.com/five-ways-improve-teamwork-workplace-13766.html"&gt;&#xD;
      
                      
    
    
      teamwork
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Traditional work arrangements also make it easier for managers to look after their employees — it’s easy to see who is and isn’t at their workstation during office hours. However, mandating work hours and location makes sense only for time-sensitive and location-dependent jobs like retail, manual labor, and healthcare, where employees need to be physically present.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Meanwhile, for 
    
  
  
                    &#xD;
    &lt;a href="https://corporatefinanceinstitute.com/resources/knowledge/other/knowledge-workers/"&gt;&#xD;
      
                      
    
    
      knowledge workers
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     whose jobs involve non-routine problem solving, an office cube isn’t always the most conducive environment for devising solutions and innovations. Sometimes, the best and most unique ideas come from exposure to the surroundings, people, and events outside the confines of an office.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Embracing change

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Being forced to adopt a work from home policy in the face of a global crisis isn’t an ideal circumstance to test the waters. Full-time remote work doesn’t and won’t work for all businesses. But this shouldn’t stop you from accomplishing projects and sustaining productivity and efficiency. Leverage your resources to help you weather the storm and emerge stronger than before.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Though we have yet to see if remote work is here to stay, it’s currently a nonnegotiable aspect of the corporate setup, and we should learn how to make the most out of it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Having a strong strategy in place and the right tools and equipment are crucial to ensure effective communication, collaboration, and management. Our experts can help you configure the perfect remote working setup for your business. Call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/04/could-telecommuting-be-the-new-norm/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/483726888.png" length="122140" type="image/png" />
      <pubDate>Wed, 15 Apr 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/04/could-telecommuting-be-the-new-norm</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/483726888.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Security best practices for remote workers</title>
      <link>https://www.apogeemsp.com/2020/04/security-best-practices-for-remote-workers</link>
      <description>Working from home increases employee autonomy, cuts costs, and ensures the health and safety of the company during the coronavirus pandemic. The problem is, it also increases the likelihood of security breaches since employees are working outside the company's security perimeter. That’s why you and your staff must adhere to these security best practices. Fortify […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Working from home increases employee autonomy, cuts costs, and ensures the health and safety of the company during the coronavirus pandemic. The problem is, it also increases the likelihood of security breaches since employees are working outside the company's security perimeter. That’s why you and your staff must adhere to these security best practices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Fortify user accounts

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When everyone is working remotely, user accounts must be properly secured. One way to achieve this is by setting at least 12-character long passwords with numbers and special characters mixed in to make them more difficult to guess. More importantly, these passwords must be unique to each account, to minimize the damage if hackers do manage to compromise one set of credentials. If you find it difficult to generate and remember login details for all your accounts, consider password managers like 
    
  
  
                    &#xD;
    &lt;a href="https://www.lastpass.com/"&gt;&#xD;
      
                      
    
    
      LastPass
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    , 
    
  
  
                    &#xD;
    &lt;a href="https://www.dashlane.com/"&gt;&#xD;
      
                      
    
    
      Dashlane
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    , and 
    
  
  
                    &#xD;
    &lt;a href="https://www.keepersecurity.com/"&gt;&#xD;
      
                      
    
    
      Keeper
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To further strengthen your accounts, however, you’ll also need to enable multifactor authentication (MFA). This adds another layer of identity verification — like fingerprint scans or one-time activation codes generated by SMS — to make it more difficult for cybercriminals to hijack your accounts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use a virtual private network (VPN)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    VPNs are primarily known for circumventing geographic restrictions on location-specific websites and streaming services, but they’re also a crucial tool for remote workers. A reliable VPN creates secure connections between devices and networks by encrypting internet traffic. This hides web activity from prying eyes, protecting your employees’ online privacy, and mitigating the risk of hackers stealing company information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Patch your software regularly

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Although installing software updates can be a major nuisance, they cover critical weaknesses and protect your systems from the latest threats. Most apps now offer an automatic update feature so you don’t have to manually patch your software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Another option for your business is patch management software. These track patches on employee devices and distribute the most recent updates on a company-wide scale.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Set up firewalls and antivirus software

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Make sure to enable firewalls in your operating systems and hardware. These provide a strong layer of protection between your device and the internet, preventing malicious programs and other network threats from reaching your device. Your managed IT services provider (MSP) may also provide third-party firewalls in case your computers don’t have any built in by default.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In addition to firewalls, you’ll also want to implement antivirus software to detect and remove any malicious programs that do manage to find their way onto your device. Just remember to constantly update the software so it can effectively detect the newest malware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Secure home routers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Home Wi-Fi routers are not as thoroughly secured as their business counterparts so take extra precautions to safeguard them. For starters, change your router password as soon as possible because hackers can easily break into them once they know the router model. You should also install the latest firmware updates to eliminate any security vulnerabilities.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Finally, check whether your router has Wi-Fi Protected Access 2 (WPA2) encryption settings to secure inbound and outbound traffic. If your router doesn’t have this setting, you’re overdue for an upgrade.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Back up your data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Important files must be backed up regularly in the cloud and your external hard drive. This way, you’ll always have a copy of your files in case of a major data loss incident like ransomware or a power outage.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Watch out for online scams

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The biggest threat remote workers face is online scams. Phishing emails may entice you with free coronavirus test kits in exchange for personal information. Some cybercriminals may even masquerade as legitimate companies, CEOs, or friends to trick you into clicking on dangerous links and attachments.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To avoid these threats, you must be critical of everything you see online. Look for any suspicious links and attachments, grammatical errors in the email body, and misspelled email addresses. Plus, never give out sensitive information to an unsolicited email, text message, or phone call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Working from home poses many cybersecurity challenges for businesses, but you don’t have to address them alone. If you need guidance with setting up firewalls, avoiding scams, and even enabling MFA, we can provide the IT support you need in this difficult time. Call us now.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/04/security-best-practices-for-remote-workers/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2365593370.jpg" length="28574" type="image/jpeg" />
      <pubDate>Fri, 10 Apr 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/04/security-best-practices-for-remote-workers</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2365593370.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Easy exercise moves to keep you fit when working from home</title>
      <link>https://www.apogeemsp.com/2020/04/5-easy-exercise-moves-to-keep-you-fit-when-working-from-home</link>
      <description>The coronavirus pandemic has greatly disrupted people’s daily lives, forcing many to stay at home and work remotely. But even if you don’t have your usual access to a gym or workout studio, it’s important to stay active. Good thing there are exercise moves that you can do at home without needing any equipment. #1 […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The coronavirus pandemic has greatly disrupted people’s daily lives, forcing many to stay at home and work remotely. But even if you don’t have your usual access to a gym or workout studio, it’s important to stay active. Good thing there are exercise moves that you can do at home without needing any equipment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #1 
    
      Bridge

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Also known as the hip raise or glute bridge, the bridge is a great way to strengthen your core, glutes, and hamstrings. Many people use this move as part of their warm-up.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here’s how to do it:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #2 
    
      Knee push-up

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The knee push-up works your arms, chest, and shoulders. It’s a modified version of the standard push-up that’s perfect for beginners.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here’s how to do it:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #3 
    
      Squat

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This lower body exercise uses your body weight for resistance to tone and strengthen your glutes and legs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here’s how to do it:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #4 
    
      Reverse lunge

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Reverse lunges or backward lunges tone your legs and strengthen your thighs and hips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here’s how to do it:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can repeat this exercise on one leg before switching to your other leg, or opt to alternate legs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #5 
    
      Jumping jack

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Mostly used for warm-up, this childhood favorite exercise activates your entire body and elevates your heart rate.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here’s how to do it:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Encourage your employees to do these basic exercise moves every day to keep them healthy while they work from home.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Having tech problems as your employees work remotely? Give our experts a call today and we’ll make sure you won’t have to worry about your IT again. 
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/04/5-easy-exercise-moves-to-keep-you-fit-when-working-from-home/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2374382397.png" length="272093" type="image/png" />
      <pubDate>Wed, 08 Apr 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/04/5-easy-exercise-moves-to-keep-you-fit-when-working-from-home</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2374382397.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Have your staff work from home with the proper gear</title>
      <link>https://www.apogeemsp.com/2020/04/have-your-staff-work-from-home-with-the-proper-gear</link>
      <description>One of the major hurdles of shifting to a work-from-home setup is that the hardware your employees have at home can be very different from what they’re used to at the office. More than their computers and smartphones, these are the things your staff will need to set up their own home office. A reliable […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the major hurdles of shifting to a work-from-home setup is that the hardware your employees have at home can be very different from what they’re used to at the office. More than their computers and smartphones, these are the things your staff will need to set up their own home office.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  A reliable keyboard and mouse

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    PC users obviously need external keyboards to operate their machines and work on files, but there are laptop users who splurge on external keyboards because they prefer how these feel or love to customize some or all of the keys.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Some aspects you want your staff to consider when choosing a keyboard are:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When picking a mouse, they’ll want to think about interface, comfort, and ergonomics, too. And while some are satisfied with a trackball or trackpad, the majority might prefer the ease of use a mouse offers. They’ll most likely have to work for hours on end, so it all boils down to what they’re most comfortable with.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  A computer monitor (or two)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    PCs, laptops, tablets, and smartphones all have their own screens, though most prefer screens they can easily read from and use. If your employees are among the lucky ones who work on a file with one screen while using another one to display their references, then they might find it difficult to go back to a single-monitor setup. Thankfully, replicating a dual-monitor setup is just a matter of getting another monitor, connecting it to their computer, and adjusting their display settings.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Of course, setting up dual monitors is their prerogative. If they’re buying monitors, screen aspects to consider are size, aspect ratio (i.e., the proportions of its width and height, resolution (i.e., image quality), and interface (although ports mismatching video cables is a problem that’s easily fixed with adaptors).
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    However, they don’t even have to buy a new screen if they have a smart TV or a TV they’ve connected to a Chromecast or other similar device. Laptops running on Windows can detect such internet-connected devices, and all they have to do is go to 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Settings
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     &amp;gt; 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      System
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     &amp;gt; 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Display
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     &amp;gt; 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Multiple displays
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
    , then adjust their settings as they like.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Webcam and headset

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If an employee’s computer doesn’t come with a web camera, they’ll most likely have to purchase one separately, especially if you regularly keep in touch with your team via video conferencing. They’ll need to primarily consider video resolution and sound quality, plus other features such as noise cancellation and autofocus. To reduce external distractions, they might want to use a headset, though isolating themselves in a room and hanging a “Do not disturb” sign might work just as well.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Letting your staff work at home can be a big boon for your company — provided that employees set their devices up properly and that you have a good remote work policy in place. If you’re interested in taking full advantage of remote work but don’t know where to start, talk to our experts. We're more than happy to help.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/04/have-your-staff-work-from-home-with-the-proper-gear/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/770436594.jpg" length="23980" type="image/jpeg" />
      <pubDate>Fri, 03 Apr 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/04/have-your-staff-work-from-home-with-the-proper-gear</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/770436594.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cloud services in demand due to pandemic</title>
      <link>https://www.apogeemsp.com/2020/03/cloud-services-in-demand-due-to-pandemic</link>
      <description>Providers of cloud-based services are experiencing a steep increase in demand these days, as the COVID-19 pandemic goes global. Because of the pandemic, many employees are working from home, relying on digital productivity and collaboration tools to get their job done. What does this mean for all of us? Even before the pandemic, many companies […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Providers of cloud-based services are experiencing a steep increase in demand these days, as the COVID-19 pandemic goes global. Because of the pandemic, many employees are working from home, relying on digital productivity and collaboration tools to get their job done. What does this mean for all of us?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Even before the pandemic, many companies were already turning to online productivity and collaboration tools for their business. While projections on how long this pandemic will force people to stay in their homes vary, it is certain that for the next month or so, cloud usage will continue to rise. This has many people worried that the internet is not ready for this sudden increase in activity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What you should and shouldn’t be concerned about

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The internet’s performance depends on many things, including network infrastructure, how things are wired up, and points of presence.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How companies are preparing for this surge in cloud service usage

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Since the pandemic is global, all areas are affected, even those with a strong infrastructure backbone. But how they are affected varies.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This work-from-home situation looks like it will last longer than just a couple of weeks. If you need help to set up your business for remote working, talk to our experts today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/cloud-services-in-demand-due-to-pandemic/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/761948010.jpg" length="20503" type="image/jpeg" />
      <pubDate>Fri, 27 Mar 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/cloud-services-in-demand-due-to-pandemic</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/761948010.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How businesses are impacted by COVID-19</title>
      <link>https://www.apogeemsp.com/2020/03/how-businesses-are-impacted-by-covid-19</link>
      <description>Businesses and consumers are facing a lot of uncertainty because of the coronavirus pandemic. As COVID-19 continues to spread, the only thing that seems certain is that it will impact businesses, particularly the way they operate and use technology. Increased reliance on communications technology The need for remote interactions and stronger communications technology will inevitably […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses and consumers are facing a lot of uncertainty because of the coronavirus pandemic. As COVID-19 continues to spread, the only thing that seems certain is that it will impact businesses, particularly the way they operate and use technology.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Increased reliance on communications technology
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
The need for remote interactions and stronger communications technology will inevitably increase. Businesses are expected to immediately adopt things like 5G technology to enhance communication speeds and performance.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Meanwhile, specific industries like healthcare will adopt technologies that optimize current processes. This includes using telehealth platforms that will let healthcare providers diagnose and issue prescriptions remotely. To do that, they need 5G-powered systems that will efficiently facilitate consultations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many companies have already shifted to remote work setups. Business leaders now and in the foreseeable future will use more platforms that efficiently facilitate collaboration with colleagues, business partners, and customers. Tools that will let them achieve this include teleconferencing solutions like Zoom, Microsoft Teams, and others.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Digital ways to network
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Now that many businesses of all sizes have shifted to remote work, it follows that events, conferences, and a variety of gatherings worldwide such as tech conferences have been canceled. This is to curb the fast spread of the coronavirus.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Certain organizations will forgo in-person networking events and business meetings and will explore online avenues to maintain business opportunities. Again, this could mean turning to telecommunications tech that offers reliable connectivity and fast speeds.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      A boost in cashless transactions
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Paying in cash is quickly becoming a thing of the past due to recommendations of healthcare authorities like the World Health Organization (WHO). This is to 
    
  
  
                    &#xD;
    &lt;a href="https://www.cnbc.com/2020/03/16/electronic-payments-look-more-appealing-as-coronavirus-spreads.html"&gt;&#xD;
      
                      
    
    
      limit the spread of the virus that can spread through cash
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    . More than ever, businesses must explore ways to implement measures that restrict cash payments, if not eliminate them altogether.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In other words, contactless payments will now be the norm in many countries around the world. This certainly applies to small businesses, too. Because of the pandemic, businesses across industries are expected to quickly adopt mobile payments and other forms of electronic payments.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Growth in eCommerce
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
As the general public drastically limits time spent outdoors, brick-and-mortar stores experience less and less foot traffic. Businesses that have adapted to new ways of product and service delivery would find themselves increasingly maximizing online purchase options for their customers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    However, the logistics involved in delivering goods and services could prove overwhelming for many businesses. For instance, they may have to adjust order fulfillment models to align with shifting demands. That could mean increasing the workforce in charge of eCommerce operations. Therefore, those that are able to boost their online shopping operations must take steps to enhance their online selling capabilities to meet unpredictable surges in demand.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In a time of crisis, businesses must explore the many ways technology can help sustain operations; whether it be in terms of maintaining communications, delivering goods and services, and gearing up for a drastically changed future.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Call our IT experts today and let us know how you want your tech resources to aid you in these tough times.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/how-businesses-are-impacted-by-covid-19/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1024151725.jpg" length="39336" type="image/jpeg" />
      <pubDate>Wed, 25 Mar 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/how-businesses-are-impacted-by-covid-19</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1024151725.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Autocomplete password risks</title>
      <link>https://www.apogeemsp.com/2020/03/autocomplete-password-risks-2</link>
      <description>Web browsers come with features to improve user experience. One of the most popular ones is auto-fill passwords. These are designed for users to store and automatically use their account credentials to access websites and other applications. While auto-fill passwords are convenient, they come with security risks. Read more. Why auto-fill passwords are so dangerous […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Web browsers come with features to improve user experience. One of the most popular ones is auto-fill passwords. These are designed for users to store and automatically use their account credentials to access websites and other applications. While auto-fill passwords are convenient, they come with security risks. Read more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Why auto-fill passwords are so dangerous

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Certain web browsers have integrated features that enable usernames and passwords to be automatically entered into a web form. There are also password manager applications that have made it easy to access login credentials. But these aren’t completely safe. They can become a liability if hackers gain access to computers or browsers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For example, if a hacker gains access to just one account, it’ll be easier for them to obtain access to other accounts because the autocomplete feature will fill in all other saved credentials.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Tricking a browser or password manager into giving up saved information is incredibly simple. All a hacker needs to do is place an invisible form on a compromised webpage to collect users’ login information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Using auto-fill to track users

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For over a decade, there’s been a password security tug-of-war between hackers and cybersecurity professionals. Little do users know that shrewd digital marketers also use password auto-fill to track user activity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Digital marketing groups AdThink and OnAudience have been placing these invisible login forms on websites to monitor the sites that users visit. AdThink and OnAudience track people based on the usernames in hidden auto-fill forms and sell the information they gather to advertisers. While the intention is not to steal passwords, there’s always the likelihood of exposure.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  One simple security tip for today

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A quick and effective way to improve your account security is to turn off auto-fill in your web browser. Here’s how to do it:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Being cautious about your password security habits can go a long way in protecting your sensitive data. For managed, 24/7 cybersecurity assistance that goes far beyond protecting your privacy, call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/autocomplete-password-risks-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3838992301.jpg" length="15961" type="image/jpeg" />
      <pubDate>Fri, 20 Mar 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/autocomplete-password-risks-2</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3838992301.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>7 Ways to avoid getting stuck when working remotely</title>
      <link>https://www.apogeemsp.com/2020/03/7-ways-to-avoid-getting-stuck-when-working-remotely</link>
      <description>Companies across the globe are now looking into remote work to keep their employees safe from the coronavirus pandemic. Today's technology allows you to collaborate and communicate with your team from the comfort of your home. However, working remotely means there may be times when it is difficult to keep your day interesting and you […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Companies across the globe are now looking into remote work to keep their employees safe from the coronavirus pandemic. Today's technology allows you to collaborate and communicate with your team from the comfort of your home. However, working remotely means there may be times when it is difficult to keep your day interesting and you might get "stuck" in the same routine, leading to burnout and even depression. Here are some ways you can inject some fun into your day.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h1&gt;&#xD;
  
                  
  #1 Dress up for work

                &#xD;
&lt;/h1&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Just because you're working from home doesn't mean you don't have to look professional. As strange as it may sound, planning what you’ll wear while working remotely can help you be more productive and take out the rut from wearing sweatpants and hoodies every day.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h1&gt;&#xD;
  
                  
  #2 Motivate your brain

                &#xD;
&lt;/h1&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Before you start your workday at home, you need to get your brain moving in the right direction. Author Ayn Rand suggests doing something that involves judgment, discrimination, and awareness, such as walking your dog, meditating, reading a good book, or trying out a new recipe. Keep routine chores and choices to a minimum, as they can lead to decision fatigue.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h1&gt;&#xD;
  
                  
  #3 Go outside

                &#xD;
&lt;/h1&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This may seem like it defeats the purpose of working remotely, but going out at least once every 24 hours can help you avoid developing the hermit habit. You don't have to go somewhere far. Take a morning walk and get some fresh air. Performing moderate exercises regularly can help improve productivity and can lead to a better work-life balance. If certain restrictions such as a lockdown or quarantine are implemented, you can take short walks around your house as an alternative. If you have your own exercise equipment, take the time for short workouts so you can insert some physical activity into your workday.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h1&gt;&#xD;
  
                  
  #4 Listen to new music

                &#xD;
&lt;/h1&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    People often underestimate the power of music. Studies have shown that listening to new music is beneficial for your brain. Discovering new music helps activate the part of your brain responsible for making you feel excited and rewarded. The same study shows that people who listen to new music are more receptive to learning new things.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h1&gt;&#xD;
  
                  
  #5 Don't skip your breaks

                &#xD;
&lt;/h1&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A key part of being productive while working remotely is remembering to take breaks. However, this is easy to forget, especially if you're too focused on your work. To ensure you don't skip out on your breaks, place the things you need out of reach. One example is keeping your phone in another room, forcing you to get up and check it when it rings.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Keep snacks and drinks away from your work area. This will help prevent you from bonding too much with your home office chair. If you find it hard to take periodic breaks, create reminders that tell you to get up and do a certain task that will break your concentration for a few minutes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h1&gt;&#xD;
  
                  
  #6 Watch your favorite shows

                &#xD;
&lt;/h1&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If remote work is making you feel lonely, try watching some of your favorite shows. Studies have shown that watching shows you love promotes a feeling of social surrogacy. It simply means that watching an episode of The Big Bang Theory, Friends, or whatever your preferred show is can help you experience a feeling of belonging and make you feel less lonely.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h1&gt;&#xD;
  
                  
  #7 No one's watching

                &#xD;
&lt;/h1&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If remote work is burning you out or making you feel like you're in a rut, remember, no one is watching you. Try dancing by yourself or playing an instrument if you have one. This can help you loosen up and take the edge away.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These tips are just some of the ways you can create a daily routine that will prevent you from developing the hermit habit. If you want to learn more about working effectively at home, give us a call today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/7-ways-to-avoid-getting-stuck-when-working-remotely/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/585006957.jpg" length="45318" type="image/jpeg" />
      <pubDate>Wed, 18 Mar 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/7-ways-to-avoid-getting-stuck-when-working-remotely</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/585006957.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>IoT security 101: Things to remember</title>
      <link>https://www.apogeemsp.com/2020/03/iot-security-101-things-to-remember</link>
      <description>Internet of Things (IoT) devices and appliances are proving to be excellent ways to leverage automation in pursuit of profitability and customer satisfaction. As with any device that connects to the internet, they need to be configured to protect business and personal data. Read on for tips on how to do this. Set passwords Many […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Internet of Things (IoT) devices and appliances are proving to be excellent ways to leverage automation in pursuit of profitability and customer satisfaction. As with any device that connects to the internet, they need to be configured to protect business and personal data. Read on for tips on how to do this.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Set passwords

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many users fail to realize that they can set passwords for IoT devices. Failing to do so makes their gadgets easy to hack. You have to make sure to create strong passwords — preferably with a combination of upper- and lowercase letters, numbers, and symbols — and also put a smart and proactive password policy in place. Make use of all security options at your disposal, such as two-factor authentication (2FA) and regular password resets.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Disable Universal Plug and Play

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Universal Plug and Play (UPnP) helps IoT gadgets discover and connect with other network devices. However, this feature can also be exploited as a gateway for hackers to infiltrate your devices and network. To prevent this, disable this feature.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Create a separate network

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s a good idea to keep your IoT devices connected to a network separate from your main office network. This way, gadgets can connect to the internet but won’t have access to mission-critical files.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also invest in device access management tools. These allow you to control which devices can access what data, and prevent unauthorized access.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Update your firmware

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You need to keep your software up to date if you want to secure your devices against cyberattacks. Manufacturers regularly release patches for the latest vulnerabilities, so make it a habit to check and install IoT firmware updates regularly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you have several devices, use patch management software to automate patch distribution and schedule regular updates.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Unplug it

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Simply disconnecting your devices or turning them off when not in use can significantly reduce your vulnerability to cyberattacks. It removes potential entry points into your network and minimizes the chances of unauthorized access to your network.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the advent of IoT devices in homes and offices, hackers also developed more cunning ways to exploit them. Adopting the abovementioned security habits can prevent a variety of IoT attacks, but if you need to beef up your security, contact us today. We have robust security solutions to keep your hardware and systems safe.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/iot-security-101-things-to-remember/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/800527640.jpg" length="41252" type="image/jpeg" />
      <pubDate>Mon, 16 Mar 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/iot-security-101-things-to-remember</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/800527640.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Why UPS is necessary for network equipment</title>
      <link>https://www.apogeemsp.com/2020/03/why-ups-is-necessary-for-network-equipment</link>
      <description>Fire, flood, storm, and other disasters can lead to power failure and productivity loss. Using an uninterruptible power supply (UPS) for computers ensures you never lose unsaved work, but without the internet, you’re practically crippled. To avoid that dilemma, we highly recommend using UPS for your networking equipment, including cable modems, wireless access points, and […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Fire, flood, storm, and other disasters can lead to power failure and productivity loss. Using an uninterruptible power supply (UPS) for computers ensures you never lose unsaved work, but without the internet, you’re practically crippled. To avoid that dilemma, we highly recommend using UPS for your networking equipment, including cable modems, wireless access points, and routers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  UPS for network equipment

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    UPS systems provide backup power in case of outages and protect against power surges, which don’t just damage computers but also make you lose unsaved work. Deploying them for Wi-Fi routers and modems allows you to stay connected to the internet in what is typically a chaotic time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Moreover, it makes sense not to just keep your PCs powered up, but to also have internet access during a disaster. This strategy works relatively well if your staff are predominantly laptop users, as that means you only need power for your Wi-Fi gear.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Better than generators

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Although generators are indispensable for certain businesses, they also require greater upkeep. Small- and mid-sized businesses (SMBs) may not have enough capacity to maintain them because they typically require a utility crew who can manage high-maintenance equipment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What’s more, extreme mishaps when misused or mishandled could result in generator-related fatalities. On the other hand, misusing a UPS unit could result in the loss of a day’s work, but it’s unlikely to lead to anything as extreme.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Why internet access is important during a disaster

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    UPS-supported modems or routers help you stay online for as much as 90 minutes, which should be enough time to get your bearings before power finally runs out. Internet service providers (ISPs) are usually prepared for catastrophes and would normally have an emergency power source to stay operational. And if you can stay online via Wi-Fi during an emergency, you get the following benefits:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Plug in your network gear now

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses that aren’t located in disaster-prone areas probably don’t give much thought to installing UPSs for their computers, let alone their modems. But accidents and emergencies are inevitable. And when they happen, you’ll find that having internet access is one of the most important things you need to ensure business continuity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Think of an emergency power supply source like a UPS as an investment that not just protects your systems from data loss but also keeps your Wi-Fi equipment functioning in emergency scenarios. Call us today for productivity-saving tips and other hardware hacks for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/why-ups-is-necessary-for-network-equipment-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1972359285.jpg" length="23558" type="image/jpeg" />
      <pubDate>Tue, 10 Mar 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/why-ups-is-necessary-for-network-equipment</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1972359285.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What is single sign-on and who is it for?</title>
      <link>https://www.apogeemsp.com/2020/03/what-is-single-sign-on-and-who-is-it-for</link>
      <description>An average business uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge hurdle for both users and administrators. Single sign-on (SSO) is an excellent solution to this issue, so let’s dive into how it works. What is SSO? Single sign-on […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    An average business uses over a thousand cloud services. Even if small businesses use just a few dozen apps, securely managing account logins is still a huge hurdle for both users and administrators. Single sign-on (SSO) is an excellent solution to this issue, so let’s dive into how it works.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is SSO?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Single sign-on allows you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Continue with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Instead of requiring everyone in the office to track separate accounts for Office 365, Slack, Trello, and other cloud apps your company uses, you can give them a single set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Why is SSO more secure?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS code to a personal device.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the connection’s security. If anything goes wrong, your IT provider will be notified.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How to get started with SSO

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The first step is making sure you have a healthy and responsive IT support system. You need a team that’s constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/what-is-single-sign-on-and-who-is-it-for-3/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1651248917.jpg" length="15404" type="image/jpeg" />
      <pubDate>Mon, 09 Mar 2020 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/what-is-single-sign-on-and-who-is-it-for</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1651248917.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Easy fixes to your Wi-Fi issues</title>
      <link>https://www.apogeemsp.com/2020/03/easy-fixes-to-your-wi-fi-issues</link>
      <description>For most businesses, a reliable internet connection is no longer an option but a necessity. A fast and reliable internet connection makes for more efficient and productive operations. But what do you do when you’re faced with connectivity issues or slow speed? Below are some solutions to five of the most common Wi-Fi worries. Range […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For most businesses, a reliable internet connection is no longer an option but a necessity. A fast and reliable internet connection makes for more efficient and productive operations. But what do you do when you’re faced with connectivity issues or slow speed? Below are some solutions to five of the most common Wi-Fi worries.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Range constraints
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Wi-Fi works via radio waves that are broadcast from a central hub, usually from a piece of hardware known as a router. In order to avoid a weak signal in your office, make sure:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Note that Wi-Fi range constraints can also occur from interference, so if your office is situated in a highly populated area, try changing your router’s channel.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Slow speed
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Despite having high-speed or fiber optic internet, slow load times can still occur for a number of reasons. To eliminate this, try the following:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Connection issues
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
It can be frustrating when the Wi-Fi network shows up on your device but you just can’t seem to connect to it. Before you give up, try these:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Unstable connection
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Random drops in Wi-Fi connection can happen from time to time. If this has become a constant nuisance in your office, try the following quick fixes:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Network not found
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Glitches in the router can result in your Wi-Fi network not appearing at all. Two solutions that can resolve the problem are:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you experience Wi-Fi issues, these tips will help you avoid serious downtime. But if you’d rather have a dedicated technology provider take care of your hardware needs, give us a call and we’ll be happy to help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/easy-fixes-to-your-wi-fi-issues-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3624835415.jpg" length="28154" type="image/jpeg" />
      <pubDate>Tue, 03 Mar 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/easy-fixes-to-your-wi-fi-issues</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3624835415.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>3 Hats a hacker might wear</title>
      <link>https://www.apogeemsp.com/2020/03/3-hats-a-hacker-might-wear</link>
      <description>While not always accurate in its portrayal of hackers, Hollywood does get at least one thing right: there are many types of hackers out there, all with varied methods and motivations. In this article, we’ll take a look at three main types of hackers. A complicated history In the 1950s, the term “hacker” was vaguely […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While not always accurate in its portrayal of hackers, Hollywood does get at least one thing right: there are many types of hackers out there, all with varied methods and motivations. In this article, we’ll take a look at three main types of hackers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  A complicated history

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In the 1950s, the term “hacker” was vaguely defined. As computers became more accessible, the word was used to describe someone who explored the details and limits of computer technology by testing them from a variety of angles.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But by the 1980s, hackers became associated with teenagers who were caught breaking into government computer systems — partially because that is what they called themselves, and partially because the word hacker has an inherently aggressive ring to it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Today, several of those pioneering hackers run multimillion-dollar cybersecurity consulting businesses, while countless others run amok online, hoping to make a quick buck off of hapless victims.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  “Black hat” hackers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Closer to the definition that most people outside the IT world know and use, black hat hackers create programs and campaigns to commit all sorts of malicious acts. Crimes such as identity theft, credit card fraud, and extortion are for their sole benefit, but they can also work under the auspices of a corporation or a state and commit espionage and cyberterrorism.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    During the 1990s, Kevin Mitnick was a prime example of a black hat hacker. Mitnick went on a two-and-half-year hacking spree wherein he committed wire fraud and stole millions of dollars of data from telecom companies and the National Defense warning system.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    After paying his debt to society by spending five years in prison, he set up his own eponymous cybersecurity firm and became its CEO and Chief White Hat Hacker.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  “White hat” hackers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Sometimes referred to as ethical hackers or plain old network security specialists, these are the good guys. Whether it’s selling what they find to hardware and software vendors in “bug bounty” programs or working as full-time technicians, white hat hackers are just interested in making an honest buck.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Linus Torvalds is a great example of a white hat hacker. After years of experimenting with the Sinclair QDOS operating system on his Sinclair QL, he released Linux, a secure open-source operating system.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  “Gray hat” hackers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether someone is a security specialist or a cybercriminal, the majority of their work is usually conducted over the internet. This anonymity affords them opportunities to try their hands at both white hat and black hat hacking.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For example, Marcus Hutchins is a known gray hat hacker. He’s most famous for testing the WannaCry ransomware until he found a way to stop it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    During the day, Hutchins works for the Kryptos Logic cybersecurity firm, but the US government believes he spent his free time creating the Kronos banking malware. He was arrested in 2017 and branded a “gray hat” hacker.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/03/3-hats-a-hacker-might-wear/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/467112316.jpg" length="27318" type="image/jpeg" />
      <pubDate>Mon, 02 Mar 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/03/3-hats-a-hacker-might-wear</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/467112316.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Productivity-boosting tips for PC users</title>
      <link>https://www.apogeemsp.com/2020/02/productivity-boosting-tips-for-pc-users</link>
      <description>We all want to be more productive. Business gurus emphasize the importance of time management and taking breaks to avoid burnout. But aside from motivating yourself to work efficiently, there are plenty of tools that help increase your daily output. If you work in front of a computer all day, check out these productivity-boosting tips. […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We all want to be more productive. Business gurus emphasize the importance of time management and taking breaks to avoid burnout. But aside from motivating yourself to work efficiently, there are plenty of tools that help increase your daily output. If you work in front of a computer all day, check out these productivity-boosting tips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Monitor productivity levels

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Start by tracking how much work you complete on an average day. There are many useful apps for this. For example, Google Chrome has an extension called RescueTime, which records your most frequently visited sites and tracks how much time you spend away from your computer. The app will provide you with a productivity rating and a detailed log of how you spend your time at work.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you discover you’re wasting a huge portion of your time on social networking and other productivity killers, you’re more likely to make conscious adjustments on how you manage your time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Get rid of clutter

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also decrease distractions and increase your output by deleting old files, uninstalling unused programs, and organizing documents into appropriately labeled folders. This makes finding files easier and improves your computer’s performance as well.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As for the clutter in your email inbox, Gmail and Outlook both have features that filter out unimportant messages. Simply enable Priority Inbox on Gmail or Clutter on Outlook to get a clean, spam-free inbox.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Block sites that waste your time

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Visiting non-work-related websites hinders productivity. A quick five-minute break to check your Facebook feed may not seem like much, but a few of those per day add up to a lot of time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you and your employees have trouble staying away from social media sites like Facebook, Instagram, and Twitter, it’s a good idea to block access to them using URL filters.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Alternatively, you can use apps like StayFocusd or Strict Workflow. These allow you to set a limit on how long and how often users can visit non-work-related sites.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Stay on track with to-do lists

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To-do lists help you break down large projects into manageable, bite-sized tasks. Crossing things off the list is surprisingly satisfying since it gives you and your employees a sense of accomplishment and total visibility over your progress.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can choose from a wide variety of digital to-do lists like Google Tasks or Trello. These platforms allow you to set deadlines for small tasks and write clear instructions for each. What’s more, they’re incredibly easy to use and are great for keeping track of your workflow.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use keyboard shortcuts

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Mastering keyboard shortcuts will make it easier and faster to perform simple functions. There are more than a hundred useful shortcuts, but here are the most common shortcuts you should keep in mind:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For more of these, take a look at this 
    
  
  
                    &#xD;
    &lt;a href="https://support.microsoft.com/en-ph/help/12445/windows-keyboard-shortcuts"&gt;&#xD;
      
                      
    
    
      updated list of advanced shortcuts
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     for Windows.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      In this digital age of short attention spans, focus is key to achieving business success. Drop us a line today if you’d like to know more about how tech can induce focus and improve overall productivity for you and your business staff.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/02/productivity-boosting-tips-for-pc-users-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3724976062.jpg" length="47372" type="image/jpeg" />
      <pubDate>Mon, 24 Feb 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/02/productivity-boosting-tips-for-pc-users</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3724976062.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Easy steps to make Google Chrome faster</title>
      <link>https://www.apogeemsp.com/2020/02/easy-steps-to-make-google-chrome-faster</link>
      <description>Google Chrome is the most popular web browser in the world with over two billion installs, one billion users, and 53% share of the market. Its speed is one of its most notable advantages over other existing browsers, which is why it’s preferred by most users. But even the fastest browser can have issues from […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Google Chrome is the most popular web browser in the world with over two billion installs, one billion users, and 53% share of the market. Its speed is one of its most notable advantages over other existing browsers, which is why it’s preferred by most users. But even the fastest browser can have issues from time to time. If your Chrome has slowed down, here’s how to get it back into tip-top shape in no time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Clear your browsing data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Chrome stores cached copies of websites you visit so it can load the page faster when you visit them again. It also keeps a database of your browsing history and cookies for the same purpose. As you visit more and more websites, these pieces of data accumulate in Chrome and can slow the browser down.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Thankfully, the solution is easy: clear your cache. Simply access your browsing history by entering chrome://history in your address bar. From the left panel, select Clear browsing data. Choose which data to delete by clicking on the checkboxes of all items you want deleted, like cached images or cookies. You can also select the time range that will be affected by the deletion. You can delete your history for the past hour, the last 24 hours, the last seven days, and from the beginning of time. Once you’ve selected the files you want to delete and their corresponding time range, click Clear data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Disable extensions

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Extensions are downloadable programs from the Chrome Web Store that you can add to your browser to give it more functionality and a personalized touch. For example, you can add an extension that blocks ads, one that shortens URLs, or one that shows your most important tasks of the day. While these extensions are useful, they can slow Chrome down if there are too many installed at once.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most extensions will show on Chrome’s address bar, and you can quickly uninstall them by right-clicking on their icons and selecting Remove from Chrome. You can also manage all extensions by typing chrome://extensions in your browser and hitting Enter. From there, you’ll find a list of all the extensions you have (even those you don’t remember installing). Simply scroll through the list and click Remove to delete the extensions you don’t need.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Remove ads and malware

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Sometimes, Chrome slows down because of malware or adware extensions. Extra toolbars, recurring pop-up ads, and web pages redirecting to other addresses are clear indications of these. Google once had a downloadable app developed for Chrome that scans and removes unwanted programs called the Clean Up Tool. In 2018, Google discontinued that app and made malware scanning even easier. Just type chrome://settings/cleanup in your browser, and click on Find to detect and remove harmful software on your computer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A top-performing web browser benefits your business in many ways, including enhancing your employees’ productivity and speeding up communication. If your web browser is performing poorly or takes forever to load a page, don’t hesitate to get in touch with us so we can identify and fix the problem right away.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/02/easy-steps-to-make-google-chrome-faster/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1917310022.jpg" length="75286" type="image/jpeg" />
      <pubDate>Mon, 17 Feb 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/02/easy-steps-to-make-google-chrome-faster</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1917310022.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Why a technology business review is vital</title>
      <link>https://www.apogeemsp.com/2020/02/why-a-technology-business-review-is-vital</link>
      <description>Identifying opportunities in all areas of business is vital for growth. However, one area that’s often overlooked is technology. Although it’s tempting to adopt an “if it ain’t broke, don’t fix it” attitude with IT, conducting regular technology business reviews is necessary if you want to achieve your business goals. A technology business review reveals […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Identifying opportunities in all areas of business is vital for growth. However, one area that’s often overlooked is technology. Although it’s tempting to adopt an “if it ain’t broke, don’t fix it” attitude with IT, conducting regular technology business reviews is necessary if you want to achieve your business goals.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A technology business review reveals the strengths and weaknesses of your company’s IT framework. It’s often performed by a third-party IT consultant who will give an objective assessment of your technology and provide recommendations to help you meet your goals. If done properly, technology business reviews allow you to:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Save money

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every review starts with a cost-benefit analysis to determine whether an implemented solution is worth the continued investment. If there are technologies costing you a fortune in management and maintenance fees, consultants will advise you to cut them from your budget. The best ones will recommend cost-effective alternatives so you can do more with less.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Increase productivity

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    System-wide reviews of your IT infrastructure show you what processes are hindering business operations. This allows you to formulate solutions to increase productivity. For example, if employees are mainly sharing files via email, consultants might suggest cloud collaboration platforms, like Office 365 or G Suite, that store data in a centralized location for seamless file sharing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Enhance security and compliance

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Technology business reviews can also uncover security risks within your business. Consultants look for missed patches, poorly configured networks, and other software vulnerabilities that can be easily exploited by cybercriminals.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    They’ll then compile their findings to create a more robust cybersecurity strategy, usually one that involves implementing advanced solutions like intrusion prevention systems (IPS), file access restrictions, and patch management software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you operate a business that’s subjected to data regulations like the Health Insurance Portability and Accountability Act (HIPAA) or Payment Card Industry Data Security Standard (PCI DSS), consultants will also pinpoint IT practices and solutions that are noncompliant and customize a strategy that ensures the privacy, integrity, and availability of your data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Implement technologies that fit

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Considering that new technologies are released at a breakneck pace, it’s important to pick those that will help you achieve your business goals. Technology business reviews keep you up to date on the latest technology trends and gauge the impact of implementing them so that you can make informed decisions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether your goal is to increase profits, productivity, security, or all of the above, technology business reviews can put you on the right track. Our seasoned IT consultants can conduct these reviews for you and develop a strategy that gives you an edge over the competition. Just give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/02/why-a-technology-business-review-is-vital-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2574745742.jpg" length="43628" type="image/jpeg" />
      <pubDate>Fri, 14 Feb 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/02/why-a-technology-business-review-is-vital</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2574745742.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Make the most of your cybersecurity investment</title>
      <link>https://www.apogeemsp.com/2020/02/make-the-most-of-your-cybersecurity-investment</link>
      <description>As cybersecurity incidents become more sophisticated, frequent, and intelligent, experts predict that the global market for cybersecurity products in 2020 will exceed that of last year. In fact, your company might be one of the thousands of businesses looking to purchase cybersecurity software. To maximize your company’s cybersecurity investment, follow these steps. Uncover threats and […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As cybersecurity incidents become more sophisticated, frequent, and intelligent, experts predict that the global market for cybersecurity products in 2020 will exceed that of last year. In fact, your company might be one of the thousands of businesses looking to purchase cybersecurity software. To maximize your company’s cybersecurity investment, follow these steps.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Uncover threats and vulnerabilities

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every business should run a risk assessment to evaluate its current cybersecurity infrastructure. Doing so is one of the easiest ways to identify, correct, and prevent security breaches. After discovering potential issues that cyberterrorists could exploit, rate them based on probability of occurrence and potential impacts on your business.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Keep in mind that risk assessments are specific to every business, and there is no one-size-fits-all approach for technology that will work for small- and medium-sized businesses (SMBs). Variables like your line of business and operating environment will account for differences in needs and risks. For instance, manufacturing companies and insurance groups have totally different applications to secure.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
After tagging and ranking potential threats, identify which vulnerabilities need immediate attention and which ones can be addressed further down the line. For instance, a web server running an unpatched operating system will take precedence over a front desk computer that’s running a little slower than normal.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Tailor controls to risks

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Instead of spending time and money evenly on all systems, focus solutions on areas with high risks. Address these areas’ issues immediately after an assessment, but also put plans in place to evaluate their risk profiles more often. This approach is particularly useful to businesses that don’t have deep IT budgets but don’t want to make security sacrifices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Assess existing cybersecurity products

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Chances are, your organization has already spent a great deal of money on purchasing and maintaining various security products. By conducting risk assessments more often, you can improve the strategies you already have in place and uncover wasteful spending. You may discover that one outdated system doesn’t really need to be upgraded, or that another legacy technology needs to be ditched. Remember that your existing products were purchased to meet specific needs, and these needs may have immensely changed or disappeared altogether.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Overcoming cybersecurity obstacles becomes easier if you regularly evaluate your IT infrastructure. Contact our experts for help conducting a comprehensive assessment today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/02/do-these-before-buying-cybersecurity-software-3/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/212624050.jpg" length="24278" type="image/jpeg" />
      <pubDate>Mon, 10 Feb 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/02/make-the-most-of-your-cybersecurity-investment</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/212624050.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Revolutionize healthcare with blockchain</title>
      <link>https://www.apogeemsp.com/2020/02/revolutionize-healthcare-with-blockchain</link>
      <description>In an era when data privacy has never been more important, blockchain has rapidly expanded into and taken over several industries, such as healthcare and pharmacological sciences. Propositions concerning blockchain-based technology are still in the process of development, but it's time to start familiarizing yourself with the technology. What is blockchain? Although the technology is […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In an era when data privacy has never been more important, blockchain has rapidly expanded into and taken over several industries, such as healthcare and pharmacological sciences. Propositions concerning blockchain-based technology are still in the process of development, but it's time to start familiarizing yourself with the technology.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is blockchain?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Although the technology is known for enabling cryptocurrencies like Bitcoin and Ethereum, blockchain has a broader use beyond an alternative form of currency. And to understand its importance, you need to understand three key concepts:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Blockchain was originally developed to eliminate the need for centralized banks to process and validate transactions. The technology allows people to freely transfer money because each computer in the network can examine the chain and confirm the legitimacy of a transaction.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As a result, transactions are much safer and more efficient. They cannot be modified unless every computer in the network is compromised simultaneously. That level of data security and integrity helps reduce costs in the healthcare industry.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Blockchain technology in healthcare

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Even with the use of digital files, data loss continues to be one of the biggest problems in healthcare. One notable incident is from the 
    
  
  
                    &#xD;
    &lt;a href="https://www.hipaajournal.com/amca-victim-count-swells-25-million-records/"&gt;&#xD;
      
                      
    
    
      American Medical Collection Agency (AMCA)
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    , where 25 million patient data records were compromised due to a hacking incident.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here’s how blockchain can address the problem of data loss:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What’s more, ransomware has hit healthcare hard over the past years, and service providers are forced to rely on costly solutions to keep up with the exponential growth in digital records. Blockchain technology can resolve both issues of security and rising costs at once.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Adopting new technology can be intimidating, especially for an industry as heavily regulated as healthcare. Blockchain has already been adopted by several organizations, but before you embrace this technology, you need full-time IT experts to assess your systems and manage your security. To learn more about blockchain in healthcare, give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/02/revolutionize-healthcare-with-blockchain/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3613084158.jpg" length="32390" type="image/jpeg" />
      <pubDate>Fri, 07 Feb 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/02/revolutionize-healthcare-with-blockchain</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3613084158.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Nifty uses for your old computers</title>
      <link>https://www.apogeemsp.com/2020/02/5-nifty-uses-for-your-old-computers</link>
      <description>Don’t be so quick to dump that old computer! Despite being slow and clunky, your old desktop or laptop may still add value to your business. There are many uses for old PC hardware, and here are five of them. Make a NAS server Network-attached storage (NAS) is a server for your small business network […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Don’t be so quick to dump that old computer! Despite being slow and clunky, your old desktop or laptop may still add value to your business. There are many uses for old PC hardware, and here are five of them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Make a NAS server

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Network-attached storage (NAS) is a server for your small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8 GB of RAM, you can use it as your own NAS.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Simply download FreeNAS, a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile operating system (OS), like iOS and Android.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But if you’d rather convert your PC into a private cloud for remote access and data backup, Tonido is a great alternative. This free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device. Tonido offers up to 2 GB of file syncing across computers, and there are even Tonido apps for iOS and Android.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Secure your online privacy

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Install The Amnesic Incognito Live System (TAILS) on your old computer and enjoy your very own dedicated privacy PC.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browsers, Office suite, and email software are preconfigured for robust security and privacy protection.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Activate kiosk mode

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In Windows 10, enabling Assigned Access “kiosk mode” ensures that only one app is allowed to run in the system. To activate this mode, open Settings and go to 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Accounts &amp;gt; Family &amp;amp; other users,
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     then click on the 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Set up assigned access
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     option. From there, you can choose which app the system can access.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For example, if you want a dedicated audio and video conferencing system, you can choose to give assigned access to Skype or other online communication apps. This mode is also perfect for setting up a public information desk for walk-in customers or a dedicated point-of-sale system for cashiers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Create a guest computer

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you have to accommodate for consultants and temporary staff, it may be worth setting up a bare-bones guest computer. First, reformat your PC and reinstall the latest Windows or Mac operating system. Then, install security updates and set up guest restrictions to prevent unauthorized access to critical systems. Ideally, temporary staff should only be able to use guest computers for things like email, web browsing, and standard productivity software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Salvage PC parts

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your old computer can’t be transformed into a NAS server or service kiosk, consider reusing certain hardware components. For instance, you can reuse RAM sticks for another computer, repurpose hard disk drives as external hard drives, and set up a second display with an old monitor.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Reselling hardware components like motherboards and video cards is also a good idea if you’re saving up for a new PC. Finally, keep your cables. Many USB adaptors, ethernet cables, and AUX cords are compatible with a wide array of electronics.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/02/5-nifty-uses-for-your-old-computers/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2837842626.jpg" length="48321" type="image/jpeg" />
      <pubDate>Wed, 05 Feb 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/02/5-nifty-uses-for-your-old-computers</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2837842626.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>AI and eCommerce: All you need to know</title>
      <link>https://www.apogeemsp.com/2020/01/ai-and-ecommerce-all-you-need-to-know</link>
      <description>If you run or manage an eCommerce business and are wondering how you can benefit from artificial intelligence (AI), you’re in luck. We’ve come up with a list of the most important reasons for your business to adopt AI. Predicting what your customers want AI has many uses in eCommerce, benefiting both the business and […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you run or manage an eCommerce business and are wondering how you can benefit from artificial intelligence (AI), you’re in luck. We’ve come up with a list of the most important reasons for your business to adopt AI.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Predicting what your customers want

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    AI has many uses in eCommerce, benefiting both the business and the customers. For instance, machine learning, a subset of AI, can be used to identify customer habits and their interests based on search histories (both inside and outside of a specific business’s site).
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
With the proper configuration, machine learning can be used to analyze shopping behaviors to customize and tailor the online shopping experience to specific users. Product recommendations, pairings, and promotions can target individuals, improving the customer experience, and in turn, your bottom line.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  “I’m looking for something a little more…”

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Machine learning is also great for cataloging products. In the past, businesses would send out dense and cumbersome product catalogs where customers could find — often with difficulty — the items they were looking for.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Today, consumers are able to upload photographs of a product — say, an article of clothing — that’s similar to what they want to purchase or pair with another. Through AI, a website will be able to analyze the photographs and make suggestions based on data from the uploaded images.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Customers can still talk to a “representative”

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More and more users are relying on eCommerce over face-to-face sales interactions, thanks to advances in “plain language” systems. Machine learning is getting better at interpreting conversations and answering with natural-sounding responses. By replicating the in-person shopping experience, eCommerce businesses can shift away from the overheads of brick-and-mortar stores. This will allow them to make significant savings in capital expenditures and human resources, all while reducing the opportunity for costly human error as well.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    AI has the potential to improve your eCommerce business. If you’re ready to integrate more of this tech into your business model, give us a call. Our experts will be happy to assist you and provide the cutting-edge IT solutions that will drive your business forward.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/01/ai-and-ecommerce-all-you-need-to-know/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3163768593.jpg" length="26127" type="image/jpeg" />
      <pubDate>Wed, 29 Jan 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/01/ai-and-ecommerce-all-you-need-to-know</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3163768593.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Find out how virtual reality helps business growth</title>
      <link>https://www.apogeemsp.com/2020/01/find-out-how-virtual-reality-helps-business-growth</link>
      <description>Technology has always helped business growth. However, with the many innovations available, knowing which to adopt can be bewildering. Virtual reality (VR) is one technology businesses can invest in. Find out if it’s right for your business with this list of VR advantages and benefits. Create your own VR prototypes With the help of VR, […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Technology has always helped business growth. However, with the many innovations available, knowing which to adopt can be bewildering. Virtual reality (VR) is one technology businesses can invest in. Find out if it’s right for your business with this list of VR advantages and benefits.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Create your own VR prototypes

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the help of VR, you’ll no longer have to rely on manufacturing when you want to see what your product physically looks like and how it might work. These virtual products allow you to make any changes before production. Model creation in VR, for example, can save company resources, as these virtual prototypes allow manufacturers to examine a product and make changes without the time and money of building a physical model.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  VR for engineers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As with manufacturing, VR is also time- and cost-efficient for engineers, architects, and other professionals who work with building large structures. It replaces traditional approaches, such as rendering small 2D models, and offers a more immersive experience that helps in designing structures.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Virtual tours

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Let’s say that you’re a real estate agent showing houses to potential buyers. Your buyers may be in a different state or simply don’t want to spend time going from house to house. VR allows customers to see what the property looks like in a three-dimensional setting without them having to actually be there.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Showing all the angles of a product

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In order to entice buyers into making a purchase, you must first give them an idea as to what your product actually looks like, and they need to see as many angles as possible. With VR, customers see your product from all angles without touching it. Furthermore, it allows customers to see a product in action. Shoppers can thoroughly examine a product before purchasing it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Take customers on an adventure

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you are in a tourism or adventure-based business, you can use VR to give customers a taste of what to expect from the attractions. Imagine that you have an amusement park, and you want to attract customer attention. You can offer a short VR simulation of one of your rides so people can see whether or not they’d like it. Or if you own a resort or campground, you’ll also be able to create VR versions of whatever activities you offer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If done properly, VR has the potential to take your small- and mid-sized business to the next level. If you have any questions about how you can mesh VR with your company, don’t hesitate to send us an email or give us a call. We’ll be more than happy to assist you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/01/find-out-how-virtual-reality-helps-business-growth/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/449264685.jpg" length="16582" type="image/jpeg" />
      <pubDate>Mon, 27 Jan 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/01/find-out-how-virtual-reality-helps-business-growth</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/449264685.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Office 365 hacking: What you need to know</title>
      <link>https://www.apogeemsp.com/2020/01/office-365-hacking-what-you-need-to-know</link>
      <description>With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected. A phishing scam that harvests users’ credentials The latest cyberattack on Microsoft Office 365 involves […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With over 150 million active subscribers, Office 365 is, unsurprisingly, on top of hackers’ minds. And now, hackers are using a technique that doesn’t even require users to give up their credentials. Learn how they do it and get protected.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  A phishing scam that harvests users’ credentials

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials. Scammers use this previously unseen tactic by launching a phishing message to users, asking them to click on an embedded link. What makes this scam more insidious than traditional phishing scams is that the URL within the message links to a real Microsoft login page.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How does it work?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The phishing message resembles a legitimate SharePoint and OneDrive file-share that prompts users to click on it. Once they do, they are taken to an Office 365 login page where they will be asked to log in if they haven’t already.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    After they’ve logged in, they’ll be prompted to grant permission to an app called “0365 Access.” Users who grant permission effectively give the app — and the hackers behind it — complete access to their Office 365 files, contacts, and inbox.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This technique can easily trick lots of users since the app that requests access is integrated with the Office 365 Add-ins feature. That means that Microsoft essentially generates the request for permission. No, Microsoft is not aiding hackers to breach systems. Rather, the scam is made possible by a feature that allows users to install apps that are not from the official Office Store.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ways to protect your Office 365 account — and your business

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Given their fairly advanced approach, these scammers could effortlessly prey on careless employees. There are ways to make sure that doesn’t happen.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Successful attacks could result in an unimaginable catastrophe to your company. For tips on how to spot this and other nefarious scams and how to plan thorough security practices, contact our experts today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/01/how-phishers-harvest-office-365-credentials/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4217537513.jpg" length="46892" type="image/jpeg" />
      <pubDate>Wed, 22 Jan 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/01/office-365-hacking-what-you-need-to-know</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4217537513.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How to set up secure guest Wi-Fi</title>
      <link>https://www.apogeemsp.com/2020/01/how-to-set-up-secure-guest-wi-fi</link>
      <description>Today, Wi-Fi isn’t only crucial for your employees to get work done; it’s also a necessary amenity for your office guests. But there’s a right way and a wrong way to set up guest Wi-Fi, and the latter can result in a frustrating experience for you and your users. So, how do you set up […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Today, Wi-Fi isn’t only crucial for your employees to get work done; it’s also a necessary amenity for your office guests. But there’s a right way and a wrong way to set up guest Wi-Fi, and the latter can result in a frustrating experience for you and your users. So, how do you set up your guest Wi-Fi properly?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Never give guests access to your primary Wi-Fi

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Giving your guests access to your company’s main Wi-Fi connection might seem like a good idea, but you should avoid this at all costs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Anyone with a little technical know-how can potentially access everything on your company network, including confidential data. In addition, if any of your visitors' mobile devices have been compromised, it's possible that they can transmit malware to your entire network.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ways to create secondary Wi-Fi for guests

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your router comes with built-in guest Wi-Fi support (you can check this feature through a quick web search), you can use it to create a separate “virtual” network. This means guests will have access to the internet without directly connecting to your company’s primary network.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your router doesn’t support multiple Wi-Fi networks, you can implement a separate wireless access point that bypasses the rest of your network and connects directly to the internet, thus preventing any outsider from accessing your company’s private data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Keep in mind that guest Wi-Fi still uses your ISP connection, so you should limit bandwidth usage on your guest network. Visitors streaming videos can slow down your internet connection, which can affect the productivity of your employees. With that in mind, you can even have your employees use the guest Wi-Fi on their mobile devices to minimize the chance of them hogging company bandwidth for personal use.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Remember, your guest Wi-Fi should only provide outsiders with internet access, nothing more. While the proper setup isn’t rocket science, it can be a tedious process. Having said that, if you need a team of experts to take care of it, or if you simply have questions about how else to leverage your hardware for better efficiency and security, just give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/01/how-to-set-up-secure-guest-wi-fi/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/377625224.jpg" length="43717" type="image/jpeg" />
      <pubDate>Wed, 15 Jan 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/01/how-to-set-up-secure-guest-wi-fi</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/377625224.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Are you using this WordPress checklist yet?</title>
      <link>https://www.apogeemsp.com/2020/01/are-you-using-this-wordpress-checklist-yet</link>
      <description>Many will immediately blame hackers for an extremely slow website or being delisted from search engines, but that’s not always the case. When it comes to managing your WordPress website, how sure are you that all your bases are covered? If not, you might want to give this WordPress maintenance checklist a try. Make backups […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many will immediately blame hackers for an extremely slow website or being delisted from search engines, but that’s not always the case. When it comes to managing your WordPress website, how sure are you that all your bases are covered? If not, you might want to give this WordPress maintenance checklist a try.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Make backups

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s crucial to perform a daily off-site backup of your WordPress files and database. This ensures data security in the event of a network breach or natural disaster, and it will facilitate the resumption of your business’s regular operations. Although plugins like 
    
  
  
                    &#xD;
    &lt;a href="https://wordpress.org/plugins/backupwordpress/"&gt;&#xD;
      
                      
    
    
      BackUpWordPress
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     and hosting servers like 
    
  
  
                    &#xD;
    &lt;a href="https://www.siteground.com/"&gt;&#xD;
      
                      
    
    
      SiteGround
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     automate the backup process, manual backups are still necessary.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Verify backups

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not only should you be making backups, but you should also be verifying them. By doing so, you are making sure that the backed up files are going where they are supposed to, and backups are being updated. The last thing you need is a failed backup strategy on the day you need it most!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Daily security reports

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you ask any cybersecurity expert, “Is it crucial to maintain a daily network security report?” the answer will be a resounding “YES.” While you might not have enough time to carry out thorough inspections and create these reports yourself, you can use security monitoring services like 
    
  
  
                    &#xD;
    &lt;a href="https://wordpress.org/plugins/sucuri-scanner/"&gt;&#xD;
      
                      
    
    
      Sucuri
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    . Not only does it carry out the inspections, but it also sends an SMS to notify you of any suspicious activity and emails you a daily status report.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Malware scans

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cybercriminals are growing in both number and sophistication. With every passing day, new strains of malware are developed and released onto the systems of small- or medium-sized businesses (SMBs). Unless you are a bonafide hacker yourself, detecting malware might be a little tricky. WordPress plugins like 
    
  
  
                    &#xD;
    &lt;a href="https://wordpress.org/plugins/wordfence/"&gt;&#xD;
      
                      
    
    
      Wordfence
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     keep your website safe using the latest firewall rules and flagging the latest malware signatures and malicious IP addresses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Speed audits

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Slow and steady may be qualities valued by some, but not so much for your website. Plugins like 
    
  
  
                    &#xD;
    &lt;a href="https://wordpress.org/plugins/google-pagespeed-insights/"&gt;&#xD;
      
                      
    
    
      Google PageSpeed Insights
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     test how fast your site loads. If it takes more than five seconds, you should consider implementing caching and other measures to speed up your site. Slow sites put off visitors, and that further lowers their search rankings.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Review your site

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For this step, sit down with an impartial friend and let them explore your website. A fresh pair of eyes will highlight issues you may have overlooked, such as forgetting to update the copyright date in your footer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Forbes, National Geographic, and The New York Times are all powered by WordPress, which means you are in good company. By sticking to the checklist, you too can harness the power of this online, open-source website creation tool. Or, instead of signing up for half a dozen services that need daily check-ins, why not have us take care of all of it for you? If you have further questions, don’t hesitate to send us an email or give us a call!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/01/are-you-using-this-wordpress-checklist-yet-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1324131074.jpg" length="32260" type="image/jpeg" />
      <pubDate>Wed, 08 Jan 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/01/are-you-using-this-wordpress-checklist-yet</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1324131074.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Do you need identity and access management?</title>
      <link>https://www.apogeemsp.com/2020/01/do-you-need-identity-and-access-management</link>
      <description>To defend against cyberthreats, businesses often implement strong antivirus software and firewalls — but both these solutions are not enough. A cutting-edge identity and access management (IAM) solution is crucial to protecting your digital assets from hackers, rogue employees, and weak passwords. What is IAM? Identity and access management is a system that secures, stores, […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To defend against cyberthreats, businesses often implement strong antivirus software and firewalls — but both these solutions are not enough. A cutting-edge identity and access management (IAM) solution is crucial to protecting your digital assets from hackers, rogue employees, and weak passwords.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is IAM?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Identity and access management is a system that secures, stores, and manages user identities and access privileges. It ensures that users are who they say they are and will grant access to applications and resources only if they have permission to use them. System administrators can make it so that employees can only access apps and data they need for work.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Other solutions that go into identity and access management include single sign-on (SSO) and multifactor authentication (MFA). The former allows users to securely log in to multiple applications that they are authorized to access. Meanwhile, MFA sets an additional method of user verification other than passwords. This includes fingerprint scans, facial ID, or a one-time security code from an SMS.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These security solutions are designed to protect digital assets even if users attempt to access company accounts through mobile devices and the cloud.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Centralize access control

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Too much access to certain systems is risky, while too little can hamper productivity and frustrate users. IAM strikes the perfect balance by letting you set centralized policies for the right access privileges. For example, you can deny your design team access to the accounting system while granting it to your CFO.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Each user’s role and attribute can be used to determine which resources they’re allowed to access and to what extent. This not only offers better security, but also more flexibility and ease of management.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Lower chances of data breaches

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With SSO and MFA, your employees will no longer have to remember multiple passwords. Instead, they’ll be able to prove their identity using evidence-based authorization such as answering a personal question that only they would know. IAM also comes equipped with advanced encryption tools to protect sensitive data, reducing the risk of compromised user credentials.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Improve user experience

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Customers today interact with your company across multiple channels, whether in the cloud or via third-party applications. This is where IAM helps provide a better experience through SSO, self-service capabilities, and unified customer profiles that make communication processes quick and easy.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your employees, on the other hand, will be able to access the information they need securely and conveniently no matter where they are. This means productivity will no longer be confined to their office desk.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Achieve regulatory compliance

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses today must meet the constantly changing regulatory requirements concerning data access governance and privacy management. IAM was designed with just that in mind and provides control over who can access data and how it can be used and shared.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Reduce IT costs

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    IAM automates and standardizes many aspects of identity, authentication, and authorization management. This means you’ll be able to minimize significant labor costs associated with keeping your business environment secure.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    An identity and access management solution equips you with much-needed security without compromising on usability and convenience. To operate in a digital business environment, it’s not a matter of “if” but “when” you’ll adopt IAM within your company.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you’re looking to enhance company-wide security, whether with IAM or other solutions, why not give us a call? We’re sure we can help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/01/do-you-need-identity-and-access-management/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2547161791.jpg" length="71213" type="image/jpeg" />
      <pubDate>Mon, 06 Jan 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/01/do-you-need-identity-and-access-management</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2547161791.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Data security: Prevent insider threats</title>
      <link>https://www.apogeemsp.com/2020/01/data-security-prevent-insider-threats</link>
      <description>In the healthcare industry, 58% of security incidents begin with an inappropriate action carried out by someone within the affected organization. Although the percentage isn't as high among other industries, it's still something you can't afford to ignore. Here’s a look at five ways to prevent such breaches. #1 Educate You must teach your team […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In the healthcare industry, 58% of security incidents begin with an inappropriate action carried out by someone within the affected organization. Although the percentage isn't as high among other industries, it's still something you can't afford to ignore. Here’s a look at five ways to prevent such breaches.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #1 Educate

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You must teach your team to recognize personally identifiable information (PII) and understand the financial implications of a breach. Each employee needs to grasp the risks associated with violating specific state or federal regulations regarding data privacy and security. For example, when a celebrity is admitted to the hospital, employees may be tempted to sneak a peek at their medical records. As innocent as that may seem, it could result in a hefty HIPAA fine.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #2 Deter

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You must put easy-to-understand policies in place to prevent an insider from breaching company data. And those policies must be strictly enforced. In fact, almost every regulatory framework pertaining to data security requires that these policies are published where they can be easily found and that you present them in company-wide meetings. In some case, you may be forced to put a person in charge of holding everyone in the company accountable to following the policies.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #3 Detect

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses must have systems in place to identify data breaches and their sources as quickly as possible. You should be able to see any time someone accessed PII. This speeds up the breach response time by revealing when unauthorized personnel viewed something they shouldn't have. It's significantly easier to stem the spread of a breach with an effective audit trail in place.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #4 Investigate

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When a privacy or security breach is detected, certain actions must be taken to limit the damages. For example, after the cause of a breach has been identified, your team should create new policies and procedures to ensure it can't happen a second time. In the case of an insider threat, that might mean revoking data access privileges to a department that never actually needed them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #5 Train

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Since IT systems are constantly evolving and easy to accidentally bypass, your employees must undergo regular data security training. A one-day seminar is a great start, but incorporating short, weekly reminders or activities will go a long way toward keeping everything fresh in their minds. Consider using a variety of media, such as emails, break-room posters, and even face-to-face interviews.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Is your company's data secure from insider threats? Call us today for a quick chat with one of our experts for more information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2020/01/data-security-prevent-insider-threats/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2429719493.jpg" length="41445" type="image/jpeg" />
      <pubDate>Wed, 01 Jan 2020 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2020/01/data-security-prevent-insider-threats</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2429719493.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How AI is revolutionizing healthcare</title>
      <link>https://www.apogeemsp.com/2019/12/how-ai-is-revolutionizing-healthcare</link>
      <description>Artificial intelligence (AI) has the potential to radically change the face of the healthcare industry — in fact, it already has. Here are some of the ways that AI has benefited medical professionals and patients alike. Virtual personal health assistants At the helm of the AI revolution are virtual personal health assistants. A lot of […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Artificial intelligence (AI) has the potential to radically change the face of the healthcare industry — in fact, it already has. Here are some of the ways that AI has benefited medical professionals and patients alike.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Virtual personal health assistants

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    At the helm of the AI revolution are virtual personal health assistants. A lot of people are already using such apps through their smartphones, wearable devices, computers, and other gadgets to keep track of their heart rate, blood pressure, and diet.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Virtual health assistants can also set a doctor’s appointment for you and remind you about it. They can document your symptoms so you can relay them to your doctor easily and efficiently.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The proliferation of smart watches and other wearables that utilize AI also helps doctors monitor patients with early-stage heart disease. This enables them to detect potentially life-threatening episodes and deliver the proper treatment earlier, increasing patients’ chances of survival.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Healthcare bots

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Healthcare bots are another AI-powered tech making waves in the healthcare industry. These provide quick answers when a patient’s primary healthcare provider is not immediately available. Accessible via the internet or over the phone 24/7/365, bots can ask patients about their medical history, allergies, and medical concerns, and provide immediate, affordable, and legitimate medical advice.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    AI research and development is also making patient-physician and physician-physician interactions more efficient. Now available on the market are AI-powered apps that let doctors better understand their patients’ conditions, allowing them to provide better feedback and overall care. There are also apps that let healthcare providers compare their prescribing behaviors with others who are treating or who have treated the same condition.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What’s more, bots help healthcare providers minimize administrative and billing tasks, so they can focus more on medical care.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Health coaching

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    People with chronic illnesses can gain a lot from using virtual health coaches. For example, patients with diabetes, chronic obstructive pulmonary disease, asthma, and other long-term conditions can find the assistance they need from an AI coach that regularly monitors and analyzes their vitals and behaviors. A virtual coach can also provide accurate dietary and medical advice based on a patient’s health data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These are just some of the ways that AI is transforming the healthcare industry. For questions about how your healthcare organization can leverage AI and other technologies, drop us a line today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/12/how-ai-is-revolutionizing-healthcare/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3221748652.jpg" length="39200" type="image/jpeg" />
      <pubDate>Mon, 30 Dec 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/12/how-ai-is-revolutionizing-healthcare</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3221748652.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Save on printing costs with these 5 tips</title>
      <link>https://www.apogeemsp.com/2019/12/save-on-printing-costs-with-these-5-tips</link>
      <description>Managing your print infrastructure efficiently is a quick and easy way to minimize your IT budget. Many small and large enterprises don't realize that they are using ineffective printing models, but you won't be one of them if you follow these tips. Replace outdated printers Your outdated and cheap printers may meet the absolute minimum […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Managing your print infrastructure efficiently is a quick and easy way to minimize your IT budget. Many small and large enterprises don't realize that they are using ineffective printing models, but you won't be one of them if you follow these tips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Replace outdated printers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your outdated and cheap printers may meet the absolute minimum requirements, but they're taking a bit out of your IT budget.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Any piece of equipment that is five years old (or older) requires frequent repairs and causes more trouble than it’s worth. Because old printers are no longer under warranty, fixing them is costly and challenging. It’s also difficult to find replacement parts for old printers because manufacturers have stopped carrying them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you replace outdated equipment with newer, multi-functional upgrades, you’re investing in hardware that will pay for itself with increases in productivity and efficiency.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Avoid purchasing unnecessary supplies

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A poorly managed printer environment will result in a stockpile of cartridges, toners, and reams of paper. This happens when, for example, an employee mistakes a basic malfunction for a lack of ink and then makes an unnecessary supply request. This is more common than you may think, and definitely more expensive.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In the absence of a dedicated printer manager, you can avoid this situation by automating supply replacement. Assign a point person to proactively place orders when supplies are about to run out, so one person is accountable for avoiding needless orders.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Impose strict process workflows

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Submitting expense reports, filing trip reimbursements, and other administrative tasks require a proper document workflow. Without proper guidelines, employees and administrative staff end up printing unnecessary documents.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Automate your company’s document-driven processes to reduce or prevent redundant print jobs that result in stacks of abandoned documents. These print jobs aren't just wasteful, they're also a security and privacy concern.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Go paperless

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Designing a document management solution that reduces paper consumption is an effective way to save money. It may not be possible in every department, but those who can do their jobs without printing should be either forced or incentivized to do so. Printing lengthy email chains that can be discussed in a meeting is just one example of a wasteful practice that should be avoided.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Reduce IT support calls for printing issues

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Calling on an in-house IT technician to assist with problems like paper jams, printer Wi-Fi issues, and other concerns probably does more harm than good. You and your IT personnel could avoid dealing with these productivity killers by identifying the problem areas of your print environment. Then, you can work on solutions specific to your office, such as drafting a printing workflow or getting help from document management experts who can recommend time- and budget-saving solutions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Partnering with experts to manage your IT workflow will make your day-to-day operations more efficient and save money on printing costs. Our experts will gladly recommend best practices and tips on document management. Call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/12/save-on-printing-costs-with-these-5-tips-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3027236669.jpg" length="27046" type="image/jpeg" />
      <pubDate>Fri, 27 Dec 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/12/save-on-printing-costs-with-these-5-tips</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3027236669.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Here are 6 Firefox features you should be using</title>
      <link>https://www.apogeemsp.com/2019/12/here-are-6-firefox-features-you-should-be-using</link>
      <description>Firefox is one of the most versatile web browsers today and its potential uses only grow with each new version. Not only is it great for casual browsing, but it also has a selection of tools that are valuable in business. Here are some of the functions you should be using in Firefox: Firefox’s secret […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Firefox is one of the most versatile web browsers today and its potential uses only grow with each new version. Not only is it great for casual browsing, but it also has a selection of tools that are valuable in business. Here are some of the functions you should be using in Firefox:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Firefox’s secret tweak interface

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Catering to the more tech-savvy users, Firefox’s secret interface gives you a peek behind the curtain into the world of coding. This helps you make adjustments to improve browser performance.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Customize your toolbar

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Choose which tools you want to see in your Firefox toolbar and maybe even discover new ones you haven’t heard of! Click on the menu button on the top-right corner and then click 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Customize
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    . Drag and drop desired items into the toolbar, which is located along the address bar near the top of the browser page.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The master password

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    ‘One can never be too safe’ is the mentality you should have every time you log on. Enter the master password. This acts like a key that unlocks all your vital passwords and information that could be detrimental if left exposed.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Create your own password by going to the menu button &amp;gt; 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Options
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     &amp;gt; 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Privacy &amp;amp; Security
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    . Then check the box next to “Use a master password” and follow the directions in the pop-up window.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Customize your own shortcuts

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If Mozilla’s current shortcuts take too long to master, consider your problem solved. With the help of the 
    
  
  
                    &#xD;
    &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/shortkeys/"&gt;&#xD;
      
                      
    
    
      Shortkeys add-on
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    , you have the luxury to design your own shortcut sequences. No more confusion, no more time wasted.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  URL autocomplete

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To spare you the fuss of entering prefixes or suffixes, Firefox lets the new URL autocomplete feature do the work for you. For example, type in “wordpress” in the address bar followed by Ctrl + Enter (Mac: Command + Enter) and voila! Firefox fills in the www and the .com parts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Firefox Send

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This feature enables you to share files up to 1G in size. The files you send are encrypted for added security. Your recipient doesn’t even have to have an account — all they need is a password to receive your file.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Firefox is still developing and with the browser market becoming more and more competitive, there is no doubt that this smart tool will only become smarter and more versatile in the future.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      If you want to discover new ways to make Firefox work for your business, just give us a call.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/12/here-are-6-firefox-features-you-should-be-using/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3896709535.jpg" length="22604" type="image/jpeg" />
      <pubDate>Fri, 20 Dec 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/12/here-are-6-firefox-features-you-should-be-using</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3896709535.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cloud hosting for business continuity</title>
      <link>https://www.apogeemsp.com/2019/12/cloud-hosting-for-business-continuity</link>
      <description>Unforeseen disasters can strike at any time, and when they do, your business could come to a grinding halt. Having a business continuity plan could prevent this from happening by securing your valuable business data at another location. But all too often, data backup can be too complicated for the average IT personnel to manage. […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Unforeseen disasters can strike at any time, and when they do, your business could come to a grinding halt. Having a business continuity plan could prevent this from happening by securing your valuable business data at another location. But all too often, data backup can be too complicated for the average IT personnel to manage. Should you get hit by a disaster or a data breach, a lack of proper data backup could mean the end of your business — all the more reason to integrate cloud hosting in your data backup strategies. Here’s why the cloud is better than internal backups.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Better uptime

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Backing up to an internal drive or an external hard drive won’t completely secure data. If someone steals your device, you instantly lose the backup it contains. Natural disasters, cybercrime, or man-made errors will also likely destroy your backups. As a result, your company could face expensive downtime. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      With cloud-hosted backup, however, things are different. The entire purpose of a cloud backup is to make sure your data is available when you need it. Top cloud service providers will offer redundancy, which means they will make a backup of your backups. This increases uptime and ensures optimum levels of data availability.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Fast resource provisioning

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      When backups are being implemented, spikes in user activity or cloud environment accessibility can slow down a website or other running systems. This is where a cloud hosting provider comes in handy. By closely monitoring user activities, providers can see spikes either before or as they are happening. The provider will provision more resources and virtual machines to manage the influx of users. This type of flexibility is particularly useful when data backups are in process.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Backup frequency

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Most companies work on files and update information throughout the day, so it’s important to have a real-time backup plan ready in case an unexpected disaster occurs. When you back up data in the cloud, you will no longer have to worry about managing the frequency of your backups. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Most cloud-hosted providers offer round-the-clock or other fixed backup frequencies, while others let you set your own backup schedule. Some of the services offered by these providers will back up files as you make changes, so you’ll know that the very latest version of files and data are always backed up.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Distributed infrastructure

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Cloud-hosted backup means the delivery of data backup to users all over the world. Selecting the right type of cloud hosting partner is equally as important as having a cloud backup plan in the first place. If international users are trying to access database or download applications through your business website, latency will become a factor — the closer the user is to the data, the faster they’ll be able to access information. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      A suitable cloud hosting partner will be able to provide backup servers at a location that best suits your company’s business continuity needs. Distributed infrastructure is beneficial if you’re looking to support a large number of worldwide users.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Businesses everywhere are utilizing cloud backup solutions, so don’t be the one left behind. If you’re looking for a managed cloud backup service to protect your business data, give us a call today to see how we can help.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/12/cloud-hosting-for-business-continuity-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1344354088.jpg" length="31368" type="image/jpeg" />
      <pubDate>Wed, 18 Dec 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/12/cloud-hosting-for-business-continuity</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1344354088.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Security audits: Data integrity’s last line of defense</title>
      <link>https://www.apogeemsp.com/2019/12/security-audits-data-integritys-last-line-of-defense</link>
      <description>Businesses should take every precaution when it comes to data and network protection. Leverage the capabilities of a competent IT partner by augmenting their round-the-clock oversight and regularly update protocols with timely security audits. Auditing and the security strategy Audits are necessary to maintain system integrity and uphold quality. These system checks help identify security […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses should take every precaution when it comes to data and network protection. Leverage the capabilities of a competent IT partner by augmenting their round-the-clock oversight and regularly update protocols with timely security audits.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Auditing and the security strategy

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Audits are necessary to maintain system integrity and uphold quality. These system checks help identify security gaps and guarantee business stakeholders that the company is doing everything in its power to ensure that all of its information is uncompromised.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The three key procedures of an audit are assess, assign, and audit. Having a methodical way of auditing helps you avoid missing important details. It is also crucial that each stage is treated with the same level of importance to ensure thorough and comprehensive auditing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    During the assessment phase, have your IT partner look at the security system you have in place. All of your business computers and servers need to be checked, as well as every program and every user. Doing an assessment should give you an overview of how secure your business currently is, along with any weak points that need to be improved.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
After the assessment, you may begin assigning solutions and solution providers. Ask your IT provider about solutions they can provide for each of your network/system gaps. And for issues that they can’t handle (perhaps because certain machines and software are highly specialized), ask your IT provider for their whitelist of partners.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Finally, you conclude your audit cycle with an “audit” — one last look-around before releasing the system back into the wild. Make sure that installations, patches, and upgrades are integrated properly and working seamlessly. For future reference, you’ll also want to take down notes just in case you need information about software and hardware improvements done during this audit cycle.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What exactly should be audited?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When conducting an audit, there are three factors you should focus on:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      The state of your security
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     – Security — especially digital security — is never at an impasse, and it is always in flux. Why? Because according to the Clark School at the University of Maryland, hackers attack every 39 seconds. And that’s not even accounting for other cyberattacks such as phishing, ransomware, and malware. This means that system security has shorter and shorter expiration dates nowadays, which makes audits all the more crucial to accomplishing your security strategy.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      The changes made
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     – The key to having long-term data integrity is a continuity plan — and not just one that addresses severe business disruptions such as those caused by calamity or disaster. A true continuity plan tries to address every conceivable risk realistically, especially those that can trip up business operations, such as cyberattacks. This can only be possible if you know what kind of hardware and software comprise your system, as well as their respective updates and improvements.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Who has access to what
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     – Data systems — even proprietary ones — should allow administrators some control over who sees what. Total accessibility is a very dangerous prospect, especially since business nowadays is increasingly hinged on internet presence. An audit will let you check on user access so that you can make necessary adjustments to protect your data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you are looking for help in developing a security strategy for your business, contact us today to see how our managed solutions can help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/12/security-audits-data-integritys-last-line-of-defense/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/122335374.jpg" length="50245" type="image/jpeg" />
      <pubDate>Fri, 13 Dec 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/12/security-audits-data-integritys-last-line-of-defense</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/122335374.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Things to consider when buying a Wi-Fi router</title>
      <link>https://www.apogeemsp.com/2019/12/things-to-consider-when-buying-a-wi-fi-router</link>
      <description>A strong network enables your business to surf the web and access cloud productivity apps. Behind these networks are Wi-Fi routers that keep your devices connected to the internet. While there are many more components involved in setting up a strong network, your choice of router can make a huge difference. Here are some tips […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A strong network enables your business to surf the web and access cloud productivity apps. Behind these networks are Wi-Fi routers that keep your devices connected to the internet. While there are many more components involved in setting up a strong network, your choice of router can make a huge difference. Here are some tips to help you find the right router for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Network type

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Look at any router and you will quickly see that there are a number of different networks available. The four most commonly found are 802.1b, 802.1g, 802.1n, and 802.11ac. These designations indicate how fast the router can transfer wireless data, with 802.11ac being the fastest of these four. Those who want to connect multiple devices via Wi-Fi or cable may do better with 802.11ac router.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Throughput

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This is closely associated with the router's network type, and is usually one of the first things listed on router boxes and specifications. To spot the router's throughput, look for Mbps. This indicates the speed at which the router is supposed to transmit data from your connection to users.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Keep in mind that if you have a 100Mbps internet connection, but a router that is only, say, 80 Mbps, then the total speed will be the lower figure. Therefore, it would be a good idea to get a router with a higher throughput to accommodate faster connections.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Range

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This is particularly important for users who will be connecting via Wi-Fi as they will likely not be sitting right beside the router. The farther you are from your router, the slower and weaker your connection will be. Typically, 802.11ac will offer the strongest connections and greatest range.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Bands

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    On every single router's box, you will see numbers like 5Ghz and 2.4Ghz. These indicate the wireless radios on the router. A dual-band router will have both 5Ghz and 2.4Ghz radios which allow devices to connect to different bands so as not to overload a connection. Those who connect to a 5Ghz band will generally have better performance, but the broadcast range will be much shorter than the 2.4Ghz radio.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Quality of service (QoS)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    QoS is a newer feature that allows the router administrator to limit certain types of traffic. For example, you can use the QoS feature of a router to completely block all torrent traffic, or limit it so that other users can have equal bandwidth. Not every router has this ability, but it is a highly beneficial feature for office routers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Beamforming

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Beamforming is a recent feature that’s becoming a standard in mid- to high-end routers. It is a form of signal technology that allows for better throughput in dead areas of a business. In other words, it can help improve the connection quality with devices behind solid walls or in rooms with high amounts of interference.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    By utilizing this technology, routers can see where connection is weak and act to improve it. While this is available on routers with many network types, it is really only useful with routers running 802.11ac. Those who don’t mind paying a higher price point for an increase in network performance should consider this feature.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Multiple input, multiple output (MIMO)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    MIMO is the use of multiple antennas to increase performance and overall throughput. MIMO-enabled routers ensure that more devices can connect to one router with less interference.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to real-world tests, there is often a slight improvement if antennas are configured and aimed properly. However, getting a high-end router with six or more antennae may be an unnecessary cost for small businesses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There’s a lot to consider when it comes to picking a router, which is why we recommend you contact us. We can evaluate your networking needs and help you find the best set up for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/12/things-to-consider-when-buying-a-wi-fi-router/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3372022727.jpg" length="5251" type="image/jpeg" />
      <pubDate>Fri, 06 Dec 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/12/things-to-consider-when-buying-a-wi-fi-router</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3372022727.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Protect your business data in the cloud</title>
      <link>https://www.apogeemsp.com/2019/11/protect-your-business-data-in-the-cloud</link>
      <description>Though touted for its increased security, the cloud isn’t 100% safe from data breaches. A small- and medium-sized business has to be proactive with data security, even in the cloud, or it risks costs tied to lost business, damaged reputation, and regulatory fines. Make sure you’re securing your business data in the cloud with the […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Though touted for its increased security, the cloud isn’t 100% safe from data breaches. A small- and medium-sized business has to be proactive with data security, even in the cloud, or it risks costs tied to lost business, damaged reputation, and regulatory fines. Make sure you’re securing your business data in the cloud with the following steps.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The cloud opens up some great benefits for businesses and is here to stay. However, as with all technology advancements, you need to also be aware of its vulnerabilities and security issues. If you want to proactively prevent data security breaches in the cloud, then here are five tips to follow:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Know your cloud apps:

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Get a comprehensive view of the business readiness of apps. Ask questions like: Which ones render you more or less prone to a breach? Does an app encrypt data stored on the service? Does it separate your data from that of others to limit exposure when another tenant has a breach?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Migrate users to high-quality apps:

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud-switching costs are low, which means that you can always migrate apps that best suit your needs. If you find ones that don’t fit your criteria, take the time to talk to your vendor or switch. Now more than ever, you have choices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Find out where your data is going:

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Take a look at your data in the cloud. Review uploads, downloads, and data at rest in apps to get a handle on whether you have potential personally identifiable information (PII), or whether you simply have unencrypted confidential data in or moving to cloud apps. You wouldn’t want cloud and data breaches with this critical data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Look at user activities:

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s important to understand not only what apps you use but the user activity of your data. Ask yourself: From which apps are people sharing content? Does the app enable sharing? Knowing who’s sharing what and with whom will help you understand what policies to best employ.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mitigate risk through granular policy:

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Start with your business-critical apps and enforce policies that matter to your organization in the context of a breach. For example, block the upload of information covered by certain privacy acts, block the download of PII from HR apps, or temporarily block access to vulnerable apps.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The key to preventing a data security breach in the cloud lies in careful attention to your cloud applications and user activity. Analyzing your apps and looking into user activities might be time-consuming, but the minimization of cloud and data security breaches makes this task worthwhile. Looking to learn more about today’s security? Contact us and let us manage and minimize your risks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/protect-your-business-data-in-the-cloud/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1125157866.jpg" length="8465" type="image/jpeg" />
      <pubDate>Fri, 29 Nov 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/protect-your-business-data-in-the-cloud</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1125157866.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Why BI is for everyone</title>
      <link>https://www.apogeemsp.com/2019/11/why-bi-is-for-everyone</link>
      <description>If you’ve managed to convince yourself that only large enterprises have the money to take advantage of Business Intelligence (BI), then think again. In the past, companies needed to hire expensive experts to really delve into BI. But these days, there is a range of affordable self-service tools that will allow small- and medium-sized businesses […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you’ve managed to convince yourself that only large enterprises have the money to take advantage of Business Intelligence (BI), then think again. In the past, companies needed to hire expensive experts to really delve into BI. But these days, there is a range of affordable self-service tools that will allow small- and medium-sized businesses (SMBs) to make use of BI. What's more, your SMB creates and holds much more data than you realize, which means you can start using BI for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  You’ve already got the data you need

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s easy to underestimate the amount of data your SMB already has at its disposal. In every area of your business, from finance and sales to customer relations and website management, the software packages you use to simplify your everyday operations are packed with reams of information that most of us don’t even think twice about. By talking to key stakeholders in your organization’s various departments, you can get an idea of the kind of data you already have, how it’s generated, and where it’s stored. You can then start to think about using BI tools to transform that information into meaningful business insights that will inform your decision-making. No need for you to invest in time-consuming data generation from scratch!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Self-service BI tools are plentiful — and affordable

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The emergence of self-service BI puts useful business analytics within reach of smaller business owners who lack the fancy-pants budgets of larger corporations. In fact, there are numerous self-service BI tools that you can use to get started in this area without even spending a dime. 
    
  
  
                    &#xD;
    &lt;a href="https://powerbi.microsoft.com/en-us/"&gt;&#xD;
      
                      
    
    
      Microsoft Power BI
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     is a powerful application that’s pleasingly user-friendly, and most businesses will find the functions they need in the free version. 
    
  
  
                    &#xD;
    &lt;a href="https://www.zoho.com/analytics/"&gt;&#xD;
      
                      
    
    
      Zoho Analytics
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     has a low entry-level cost, too, and the slightly pricier yet still affordable 
    
  
  
                    &#xD;
    &lt;a href="https://www.tableau.com/"&gt;&#xD;
      
                      
    
    
      Tableau
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     is another option that’s worth exploring.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  It’s easy to get started

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    BI is an intimidating term, especially for the average business owner. But by taking small steps, it’s easy for anyone to get started — and before you know it, you’ll be enjoying the benefits of having data-driven, intelligence-based insights that will enable you to make better business decisions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most self-service BI tools come with built-in suggestions for reports that businesses commonly run and find useful. Other worthwhile statistics to explore include the percentage of your clients who cancel within a set period, website landing pages that generate the longest visits, your most profitable individual products or services, the days or months in which you generate your highest revenues, and which of your clients bring in the most revenue and profit.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Truly harnessing data is the future of the business world — it’s how companies like yours can make smarter decisions that increase efficiency and profitability. And having self-service tools available means SMBs no longer need a crazy budget to be able to afford the benefits of BI. To find out more about putting in place the tools that can help you do smarter business, just give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/why-bi-is-for-everyone-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/604824047.jpg" length="25765" type="image/jpeg" />
      <pubDate>Thu, 28 Nov 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/why-bi-is-for-everyone</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/604824047.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>BYOD security tips</title>
      <link>https://www.apogeemsp.com/2019/11/byod-security-tips</link>
      <description>The bring your own device (BYOD) phenomenon continues to rise in the workplace. There are a number of benefits and risks that BYOD brings. For it to be successful, you must balance employee freedom and data security. Here’s how you can do that. Whether your employees are using smartphones, tablets, or laptops, you need a […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The bring your own device (BYOD) phenomenon continues to rise in the workplace. There are a number of benefits and risks that BYOD brings. For it to be successful, you must balance employee freedom and data security. Here’s how you can do that.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether your employees are using smartphones, tablets, or laptops, you need a BYOD security policy. Additionally, you need to be aware of the key BYOD security risks:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To mitigate risks, it’s important to devise a BYOD security policy that works for the needs of your business as well as the needs of your employees. Here are some tips:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Make passwords compulsory on all BYOD devices

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Prevent unauthorized access to company data by enforcing the use of passwords on all BYOD devices. Passwords should be long and unique.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Create a blacklist of prohibited applications

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Blacklisting involves prohibiting the installation of certain applications on BYOD devices that are used for work purposes. This includes applications such as file sharing and social networking apps. The simplest way to blacklist applications is through a mobile device management platform that enables IT administrators to secure and enforce policies on enrolled devices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Restrict data access

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Adopt the principle of least privilege on both BYOD and company devices. This means that a user is able to access only the data and software required to do their job. This can reduce the effects of certain types of malware and limit the fallout in the event of a data breach.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Invest in reliable security solutions for devices

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Protect BYOD devices with reputable antivirus software to identify and stop threats before they can make changes to the device. This is vital for protecting mission-critical data and avoiding downtime.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Backing up device data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A well-thought-out BYOD policy can go a long way toward minimizing the risk of a security breach, but if something manages to slip past your defenses, you need a process in place for restoring your data to its former state. Have a comprehensive backup strategy to ensure that any data stored locally on a BYOD device can be quickly recovered.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Educate your staff about security

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The vast majority of BYOD-related security risks involve human error. Educate your employees about proper mobile safety. This includes how to spot apps that could contain malware, sharing security threat updates, and teaching them how to secure their devices by going beyond default security settings.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s also a great idea to work with an IT partner like us. As experts, we keep tabs on the latest trends and innovations related to BYOD and will recommend solutions that work for your company. Contact us today to see how we can help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/byod-security-tips/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/17919551.jpg" length="14739" type="image/jpeg" />
      <pubDate>Tue, 26 Nov 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/byod-security-tips</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/17919551.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>4 Key benefits of using EMRs</title>
      <link>https://www.apogeemsp.com/2019/11/4-key-benefits-of-using-emrs</link>
      <description>More healthcare providers are ditching the traditional pen and clipboard, and are looking to electronic systems to house the records of their patients. Electronic medical records (EMR) offer healthcare professionals a quicker way of accessing and sharing patient information between offices and providers. Using EMR results in increased productivity by reducing the time needed to […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More healthcare providers are ditching the traditional pen and clipboard, and are looking to electronic systems to house the records of their patients. Electronic medical records (EMR) offer healthcare professionals a quicker way of accessing and sharing patient information between offices and providers. Using EMR results in increased productivity by reducing the time needed to record a patient's medical information and allowing medical personnel to focus on patient care. The other benefits of using EMR include the following.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Better communication

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Fast and accurate communication between medical departments is key to providing quality healthcare. From ambulance staff to emergency room doctors, a healthcare institution must have an effective means of communication, and this is where EMR comes in. EMR software enables frontline staff to quickly transfer a patient’s medical records to other departments in real-time. When the patient’s information is recorded in the system, other medical staff will no longer need to question his or her conditions again and can proceed to treat the patient in a timely manner.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Lower costs

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Reducing operational costs is a must for hospitals operating on a tight budget, and cutting redundant expenses is therefore necessary. When it comes to paper records, a hospital could be using hundreds of thousands of sheets of paper each year. By implementing EMR, hospitals can reduce the labor behind recordkeeping and cut down on paper costs — in short, saving a large sum of money.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Scalable recordkeeping

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Before EMR, hospitals needed to devote an entire room, if not more, for storing the paper records of patients. When a hospital grows, the number of patients increases along with it, and more space is required for physical data storage. EMR software provides a more efficient way of storing data on a virtualized platform compared to traditional paper records. The recordkeeping process is completely scalable, and it will not take up valuable space in the hospital as paper records do.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Efficient treatment

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the help of EMR, patient checkups take less time since doctors can quickly access a patient’s medical record and reference the information needed to schedule appointments. When turnaround time for the recording and prescription processes is reduced, a hospital can greatly improve its patient workflow. Moreover, if further consultation or testing is required, physicians in other locations can simultaneously view a patient’s medical record on their computers, and get the latest test results and recommendations from previous doctors. EMR enables healthcare providers to collaborate more efficiently with one another.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A hospital’s goal is to provide better patient care, and the benefits of EMR can help improve various medical processes, including quicker access to patient information, better collaboration between departments and healthcare providers, and improved patient workflow.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For more information on how to implement EMR software into your healthcare institution, give us a call today and we’ll be happy to help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/4-key-benefits-of-using-emrs/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4142802019.jpg" length="24979" type="image/jpeg" />
      <pubDate>Mon, 25 Nov 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/4-key-benefits-of-using-emrs</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4142802019.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Reduce your PC power consumption</title>
      <link>https://www.apogeemsp.com/2019/11/reduce-your-pc-power-consumption</link>
      <description>There’s a computer in almost every home and office nowadays. A typical desktop that’s switched on 24/7 for a whole year releases carbon dioxide equivalent to what an average car releases in an 820-mile drive. To save energy, you don’t need to make drastic changes; you can start by making small adjustments that will ultimately […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      There’s a computer in almost every home and office nowadays. A typical desktop that’s switched on 24/7 for a whole year releases carbon dioxide equivalent to what an average car releases in an 820-mile drive. To save energy, you don’t need to make drastic changes; you can start by making small adjustments that will ultimately lead to significant savings.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  1. Disconnect your external devices

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Devices that connect to your PC such as printers, headphones, and webcams consume power, too. That’s why you should disconnect or remove these devices from your PC when you are not using them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  2. Use a smart strip, especially for computers you cannot turn off

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A smart strip is a series of several electrical outlets in one strip, with circuits to monitor and maximize your gadgets’ power consumption. It can electronically unplug any device so that they stop drawing current, and you save energy. By connecting your PC and peripherals like printers and scanners to the smart strip, you don’t need to unplug your equipment when you’re not using them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  3. Adjust your computer’s energy settings

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also consume less energy by adjusting your PC’s power settings. For example, you can make sure your hard drive and monitor go into sleep mode when they’re left idle for a few minutes. You can further save electricity by lowering the brightness of your screen.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  4. Shut down and unplug your computer when not in use

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you are not yet using a smart strip, then it’s best to shut down your computer when you’re not using it. Make sure to unplug your machine and its peripherals as well, because leaving them plugged in consumes standby power.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  5. Use a charger only when charging your laptop

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When we charge our laptops, it’s easy to just leave them there and forget about them. This overcharging eventually degrades the battery. Meanwhile, leaving the charger plugged in — even if it’s not connected to your computer — also consumes standby power. To save energy, either use a wall outlet with a timer, or plug your charger on a smart strip.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  6. Choose an Energy Star-compliant PC

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Energy Star is the US Environmental Protection Agency’s (EPA) symbol for energy efficiency. Every product that earns the Energy Star symbol is guaranteed to deliver both quality performance and energy savings. The more stars a product has, the more energy-efficient it is. Studies have shown that a single Energy Star-compliant computer and monitor can save between $7 and$52 per year in electricity bills.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These tips should help you develop energy-conservation habits and make smart choices in hardware. If you need assistance in choosing the best hardware for your specific needs, give us a call. We’ll be glad to help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/reduce-your-pc-power-consumption/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2975532658.jpg" length="27252" type="image/jpeg" />
      <pubDate>Tue, 19 Nov 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/reduce-your-pc-power-consumption</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2975532658.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>6 Categories of essential cloud solutions</title>
      <link>https://www.apogeemsp.com/2019/11/6-categories-of-essential-cloud-solutions</link>
      <description>Over the past several years, the debate about cloud technology in business has moved away from “Is it a safe option?” to “How can I move more of my tools to the cloud?” There is an overwhelming number of options and many business owners don’t know where to start. If that’s the position you find […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Over the past several years, the debate about cloud technology in business has moved away from “Is it a safe option?” to “How can I move more of my tools to the cloud?” There is an overwhelming number of options and many business owners don’t know where to start. If that’s the position you find yourself in, we recommend starting with six basic tools.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Email

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every business needs email. And while there are plenty of non-cloud options to choose from, they require a lot of maintenance. Opting for cloud-based email means you pay for the service without worrying about hardware requirements or software updates. These issues, among others, will be handled by the provider and backed by service level guarantees.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  File storage

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Storing company files in the cloud is a great way to give employees more mobility and flexibility. Everyone can access information from almost any internet-enabled device without compromising security, since providers include things like encryption and multifactor authentication as part of the monthly service fee.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can opt for either DIY cloud storage such as Microsoft’s OneDrive and Dropbox or a slightly more expensive managed solution that will provide customization opportunities and regulatory compliance management.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Document creation and collaboration

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s easy to confuse apps like Office 365 and Google Docs with cloud file storage but they’re not the same. What sets them apart is whether or not you can edit documents stored on these platforms. In most cases, multiple users can alter the same document simultaneously and see mirror images on their screens even if they’re hundreds of miles apart.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Between faster document turnaround times and fewer separate versions of files, there’s no reason to keep everything offline. Business owners used to worry about security but vendors today invest 100 times more resources in protecting client info than a small operation could ever match.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Server hosting

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether your business requires a single low-scale server or several high-powered ones, it’s becoming harder to justify maintaining those at your physical location. They’re too finicky and expensive compared to their cloud alternatives.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Server hosting enables you to accomplish via an app all that you could with in-house hardware. The costs are also spread out month to month rather than all at once during the setup phase.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Backup and recovery

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The entire basis of cloud technology is that you have total access to hardware and software that’s located far from your office. That makes things like cloud file storage and server hosting perfect for recovering from a disaster. If a natural disaster or cyberattack renders your office inoperable, all you need to do is log in to your cloud platform from somewhere else.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you are looking to move your business into the cloud, we have a broad range of products tailored to small businesses. Contact us today to learn more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/6-categories-of-essential-cloud-solutions/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2172021856.jpg" length="12478" type="image/jpeg" />
      <pubDate>Thu, 14 Nov 2019 09:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/6-categories-of-essential-cloud-solutions</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2172021856.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Why businesses should opt for CRM</title>
      <link>https://www.apogeemsp.com/2019/11/why-businesses-should-opt-for-crm</link>
      <description>However good you are at running your business, you won’t get very far without a steady stream of customers. To effectively foster customer relationships, many businesses are leveraging customer relationship management (CRM) systems. What is a CRM system? CRM is a system that allows businesses to manage, record, and evaluate their customer interactions to provide […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    However good you are at running your business, you won’t get very far without a steady stream of customers. To effectively foster customer relationships, many businesses are leveraging customer relationship management (CRM) systems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is a CRM system?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    CRM is a system that allows businesses to manage, record, and evaluate their customer interactions to provide better services and boost sales. You can use CRM to store customers’ contact details, accounts, leads, and sales opportunities all in one place.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What are the features of a CRM system?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      If you’re looking to improve customer service and increase sales conversion using a CRM system, contact us today!
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/why-businesses-should-opt-for-crm-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2232304734.jpg" length="26161" type="image/jpeg" />
      <pubDate>Tue, 12 Nov 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/why-businesses-should-opt-for-crm</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2232304734.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Signs of weak enterprise security</title>
      <link>https://www.apogeemsp.com/2019/11/5-signs-of-weak-enterprise-security</link>
      <description>As the number of cybersecurity threats increases, many business owners have no recourse but make cybersecurity a priority. But how does one know if your security measures are actually keeping your enterprise IT assets safe? Here are five ways you can tell if your security isn’t sufficient. Open wireless networks With one main internet line […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As the number of cybersecurity threats increases, many business owners have no recourse but make cybersecurity a priority. But how does one know if your security measures are actually keeping your enterprise IT assets safe? Here are five ways you can tell if your security isn’t sufficient.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Open wireless networks

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With one main internet line and a couple of wireless routers, a whole office can go online. A wireless internet connection saves money, but there is an inherent risk that it’s an unsecure network.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you need a secure network, plugging in a wireless router and creating a basic network is not enough. If you don’t set a password on your routers, then anyone within range can connect. With fairly simple tools and a bit of know-how, hackers and criminals can start capturing data that goes in and out of the network, and even attacking the network and computers attached.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Therefore, you should take steps to ensure that all wireless networks in the office are secured with strong passwords. Many internet service providers that install hardware when setting up networks will often just use an easy password for the router, such as the company’s main phone number. These need to be changed.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Email is not secure

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most companies that have implemented a new email system in the past couple of years will most likely be secure. This is especially true if they use cloud-based options or well-known email systems like Exchange, which offer enhanced security and scanning.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The businesses at risk are those using older systems like POP, or systems that don’t encrypt passwords (what are known as “clear passwords”’). If your system doesn’t encrypt information like this, anyone with the right tools and a bit of knowledge can capture login information and compromise your systems and data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you are using an older email system, it is advisable to upgrade to a newer one, especially if it doesn’t use encryption.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mobile devices that aren’t secure enough

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Mobile devices offer a great way to stay connected and productive while out of the office. However, if you use your tablet or phone to connect to office systems but don’t have security measures in place, you compromise your networks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Imagine you have linked your work email to your tablet but don’t have a screen lock enabled, and you lose your device. Anyone who picks it up will have access to your email and all your sensitive information. The same goes if you install a mobile device app with malware on it. Your infected device will spread this malicious program to your entire network and cause major disruption to your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Take steps to ensure that employee devices have adequate security, such as passcodes, and that your company has sufficient security policies in place to govern their use. Lastly, mobile device management solutions are specifically designed to prevent your bring your own device (BYOD) policy from being a risk with employee devices causing havoc to your network.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Anti-malware software that isn’t maintained

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These days, it is essential that you have anti-malware software installed on all devices in your company, and that you take the time to configure these properly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It could be that scans are scheduled during business hours. If you install these solutions onto your systems and they start to scan during work time, most employees will just turn the scanner off, leaving your systems vulnerable.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The same goes for not properly ensuring that these systems are updated. Updates are important for software, especially anti-malware applications, because they implement new databases that contain recently discovered threats and the fixes for them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Therefore, anti-malware software needs to be properly installed and maintained if they are going to even stand a chance of keeping systems secure.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Lack of firewalls

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A firewall is a network security tool that can be configured to block data traffic from entering and leaving the network. For instance, it can protect data from being accessed from outside the network. While many modems or routers include firewalls, they are often not robust enough for business use.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What you need is a firewall that covers the whole network at the point where data enters and exits (usually before the routers). These are business-centric tools that should be installed by an IT partner like a managed services provider (MSP), in order for them to be most effective.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How do I ensure proper business security?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The best way a business can ensure that their systems and networks are secure is to work with an IT partner like us. Our managed services can help ensure that you set up proper security measures in place and that they are managed properly. Tech peace of mind means your focus can be on creating a successful company instead. Contact us today to learn more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/5-signs-of-weak-enterprise-security/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2781550538.jpg" length="18993" type="image/jpeg" />
      <pubDate>Thu, 07 Nov 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/5-signs-of-weak-enterprise-security</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2781550538.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Managed IT: How hospitals can benefit</title>
      <link>https://www.apogeemsp.com/2019/11/managed-it-how-hospitals-can-benefit</link>
      <description>More and more healthcare organizations are turning to managed services providers (MSPs) for their IT needs. This lets hospitals and clinics focus on being healthcare providers and not on being ad hoc IT professionals learning on the fly. Here are some things to look for in a managed services provider before you consider partnering with […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More and more healthcare organizations are turning to managed services providers (MSPs) for their IT needs. This lets hospitals and clinics focus on being healthcare providers and not on being ad hoc IT professionals learning on the fly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here are some things to look for in a managed services provider before you consider partnering with one.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  They guarantee response times

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to providing healthcare services, fast response is not the only thing that matters. You should always make sure that your provider guarantees response times, and that you’re able to contact them 24/7. In case something breaks or you come across technical issues in the dead of night, your best bet would be to contact your service provider, not to try fixing things on your own. Therefore, you need a provider who is able to give assistance whenever you need it most.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  They support a business continuity plan

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You risk putting your organization in jeopardy if your MSP can’t assist in your recovery from major outages or natural disasters. A business continuity plan is an absolute necessity in your healthcare organization — you simply can’t afford to lose all your valuable medical data in the event of a disaster. You need all the help you can get from your MSP to maintain redundant systems and manage automatic failovers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  They provide proactive security

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In the world of healthcare data security, complying with HIPAA mandates is essential. Failing to meet regulations may result in huge fines, serious penalties, and even the withdrawal of your license to operate. The ideal managed services provider should offer core security services that include identity-based security and encryption, authorized privileges and access control, and data accountability and integrity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  They offer staffing services

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Healthcare staffing shouldn’t be a hassle but, thanks to the changing dynamics of healthcare IT requiring a sophisticated workforce, that’s exactly what it can become. You need a managed services provider that assumes full responsibility for your clinical labor while providing you with a single point of contact for all your staffing operations, including account management, customer support, order placement, and more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Choosing the right MSP can be time-consuming, but when you do make the switch, they can streamline your operations, reduce operational costs, and enhance workforce transparency.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to learn how great technology and support can benefit your healthcare practice, get in touch with us today — we provide the perfect set of IT solutions and outstanding support to drive your organization forward.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/11/managed-it-how-hospitals-can-benefit/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3879844058.jpg" length="42085" type="image/jpeg" />
      <pubDate>Fri, 01 Nov 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/11/managed-it-how-hospitals-can-benefit</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3879844058.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>CYOD and BYOD: What are they?</title>
      <link>https://www.apogeemsp.com/2019/10/cyod-and-byod-what-are-they</link>
      <description>Mobile devices are a popular tool for many employees, most of whom will at some point use their personal device for a work-oriented task. Companies are adopting a BYOD or bring your own device policy to help bolster motivation and productivity. Another similar trend gaining popularity is CYOD or choose your own device. Below is […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Mobile devices are a popular tool for many employees, most of whom will at some point use their personal device for a work-oriented task. Companies are adopting a BYOD or bring your own device policy to help bolster motivation and productivity. Another similar trend gaining popularity is CYOD or choose your own device.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Below is a brief overview of BYOD and CYOD.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  BYOD

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This policy allows employees to bring their own devices to the office and use them for work-related tasks. While it focuses mostly on mobile devices, some companies allow users to bring their computers as well.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Companies cut costs on purchasing and maintaining computers when they adopt this policy. This also leads to higher productivity since employees are familiar with their own devices, eliminating the time and effort needed to adjust to a new operating system or technology.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The main drawback of this policy is the risk involved when you allow employees' devices to access corporate resources. Companies adopting this policy need to ensure that they have a solid system in place that deals not only with security but how the devices should be used.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  CYOD

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    CYOD allows users to choose from a set of devices approved by the company.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These devices come with pre-installed business applications and protocols before an employee selects them. The main benefit of this policy is that the devices offered are highly compatible with the company's current setup and come with security features to ensure that sensitive information is properly protected.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Depending on the policy, a company can either keep the device after an employee leaves or an employee can own the device after paying for it upfront. Some employees may not like the selection of available devices; that’s the major drawback of this policy. Unfortunately, hardware costs are also not completely eliminated, and employees will have to shoulder the costs for maintenance and repairs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Which policy should companies adopt?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Companies should think about what works best for their current setup before choosing whether to adopt a BYOD or CYOD policy. A BYOD policy is ideal for companies operating on a tight or limited budget, while CYOD is perfect for companies who want to ensure their data is fully secure.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Contact us today to see how we can help you choose the right policy for your company.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/cyod-and-byod-what-are-they-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1857360732.jpg" length="35569" type="image/jpeg" />
      <pubDate>Thu, 31 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/cyod-and-byod-what-are-they</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1857360732.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>3 Ways to browse the net safely at work</title>
      <link>https://www.apogeemsp.com/2019/10/3-ways-to-browse-the-net-safely-at-work</link>
      <description>Amidst the current climate of malware, hacks, and phishing scams, companies must take precautions when accessing the internet. Without safeguards, browsers that you or your employees use are vulnerable to cyberattacks that may cripple productivity and profit. Here are steps that your company should take to browse the net safely. Prevent browser tracking If you […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Amidst the current climate of malware, hacks, and phishing scams, companies must take precautions when accessing the internet. Without safeguards, browsers that you or your employees use are vulnerable to cyberattacks that may cripple productivity and profit. Here are steps that your company should take to browse the net safely.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Prevent browser tracking

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you don’t like the idea of a third party (reputable or otherwise) being able to track your browsing habits, enable private browsing using built-in tools in your internet browser such as Chrome’s incognito mode. This offers protection against tracking by blocking third-party cookies as well as malware. Some browser extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter and Facebook.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Block adverts

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While online ads may seem harmless, the truth is they can contain scripts and widgets that send your data to a third party. A decent ad blocking program will stop banner, rollover, and pop-up ads, and prevent you from inadvertently visiting a site that may contain malware.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Many blockers contain additional features such as the ability to disable cookies and scripts used by third parties on sites, the option to block specific items, and options to “clean up” Facebook, and hide YouTube comments.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Consider setting up a virtual private network (VPN)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Unfortunately, browser tracking and adware are not the only internet nasties that you need to be concerned about. Hackers can intercept sensitive data between two parties, allowing them to steal and corrupt valuable information such as bank details, login credentials, and other personal information. Installing a VPN can help solve this problem. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Install antivirus and anti-malware software

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Finally, it goes without saying that having antivirus and anti-malware software installed on your PC, tablet, and smartphone is crucial if you want to ensure your online safety. These software programs are your first defense against malicious parties intent on stealing your data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Is browsing at your workplace secure? Would you like a more comprehensive security system for your business? We can tell you all about it and help protect your business from online threats. Get in touch with us today.
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/3-ways-to-browse-the-net-safely-at-work-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1603669349.jpg" length="51650" type="image/jpeg" />
      <pubDate>Mon, 28 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/3-ways-to-browse-the-net-safely-at-work</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1603669349.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Top 5 business continuity errors</title>
      <link>https://www.apogeemsp.com/2019/10/top-5-business-continuity-errors</link>
      <description>Business continuity plans are designed to protect an organization's critical data in case of a crisis, but employees are also a part of that equation. If you want a strong business continuity plan, it’s imperative you avoid the following mistakes. Mistake #1: Failing to plan for employees Companies that survive unexpected incidents are the ones […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Business continuity plans are designed to protect an organization's critical data in case of a crisis, but employees are also a part of that equation. If you want a strong business continuity plan, it’s imperative you avoid the following mistakes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mistake #1: Failing to plan for employees

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Companies that survive unexpected incidents are the ones that thought about their employees’ needs. Make sure you plan out everything from evacuation routes to emergency communication plans to make sure your employees have everything they need to survive the worst.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Discuss your strategy with your employees to let them know that you will be there to support them and their families in the event of a crisis. This way, your employees will have peace of mind knowing you and the company are there for them, and in turn, they will be there to support you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mistake #2: Using only words, not actions

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Once you’ve documented your business continuity plan, you need to think about the small stuff to ensure your plan is executable. This includes logistical considerations like medical aid and monetary support.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Walk the walk and ensure your medical providers have made arrangements in advance. Have an assistance program in place to make sure your employees have access to people who can give them support in the event of an incident. Staff will remember if you provided them with care and support, and will remember even more clearly if you didn’t.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mistake #3: Not showing your employees how the plan will work

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While many business owners worry about downtime, they overlook the fact that explaining the plan and its execution to employees is critical to minimizing lost productivity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As part of your maintenance program, include your employees in the testing process. Execute a live test to show your employees how they’re supposed to respond during a crisis incident. Who are they supposed to contact during a natural disaster? What are they supposed to say to clients? Where will they work when the primary office is down? These are just a few questions you need to have answered by the end of the live test.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mistake #4: Forgetting to check on people after the incident

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When an incident occurs, the first assessment most businesses make is to determine the impact it has on the company. But how do you execute that process without people? When disaster strikes, your employees will naturally want to be taking care of their families, not your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Ensure your crisis management team addresses people issues first. Where are they? What do I need to do for them? Are there any special employee needs you must address?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mistake #5: Reacting rather than communicating

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The most important thing to get right during a crisis is communication. It is imperative that your employees know you can provide them with the most up-to-date information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Set up a toll-free hotline so your employees can call in for regular updates or create emergency channels where they can communicate with one another directly. With that, you provide consistent messaging, and you eliminate secondhand information and employee guesswork.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your business continuity plan prioritizes your employees, you’ll have peace of mind knowing that your team is still standing strong even if the worst should happen.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Want to learn more about business continuity and how it can help your business? Contact us today to see how we can help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/top-5-business-continuity-errors/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1075202270.jpg" length="48438" type="image/jpeg" />
      <pubDate>Fri, 25 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/top-5-business-continuity-errors</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1075202270.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Make site visitors feel secure with these tips</title>
      <link>https://www.apogeemsp.com/2019/10/make-site-visitors-feel-secure-with-these-tips</link>
      <description>When customers visit and use your website, engender feelings of trust and security instead of alarm and distrust. Easily improve feelings of internet security with these three tips.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Don’t give your customers any reason to feel insecure when dealing with you. When they visit and use your website, you must engender feelings of trust and security instead of alarm and distrust. Don’t worry — you can easily improve feelings of internet security with these three tips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Tip #1: Use HTTPS

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Short for Hypertext Transfer Protocol Secure, HTTPS indicates that a website has an extra layer of security for its users. This layer encrypts data exchanged between a user’s browser and the web server that delivers the data that the user requests. To use a simpler comparison, imagine someone tapping your landline, but instead of getting to listen in on your conversations, they’ll hear people speaking in tongues instead.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In August 2014, Google Chrome, the world’s most popular browser, announced that having HTTPS makes your website rank higher in its search algorithm. And since October 2017, the browser began flagging non-HTTPS websites as not secure whenever users try to fill out something as simple as a contact form on it. In July 2018, Chrome started showing a “not secure” warning on any website that does not implement HTTPS, whether or not users are filling out a form there.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Because of Google’s measures, the security protocol has been widely adopted. Even if your website does not contain or ask for sensitive information, implementing HTTPS on it engenders trust and a sense of security among internet users, while staying left behind security-wise will make web visitors abandon or avoid you sooner or later.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Tip #2: Embrace multifactor authentication (MFA)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Since account credentials can be easily stolen via phishing attacks, username and password combos are no longer enough to keep bad actors at bay. To ensure that the one accessing an account is truly that account’s owner, additional identity authentication steps must be implemented.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These steps can involve the use of the account holder’s device — the one logging in must first verify their phone number, receive a one-time password on their smartphone, then enter that code in the access portal before the validity of the code lapses. Alternatively, MFA may ask for a face, retina, voice, or fingerprint scan for authentication. MFA can be a bit of a hassle for your internal and external users, but a little inconvenience is a small price to pay for immensely effective cybersecurity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Tip #3: Update browsers and devices

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Did you know that dated versions of browsers, operating systems (OSs), and even other software packages can create an easy entry point for hackers? Often, new updates are created specifically to fix security holes. And hackers are ever aware that people can be lazy, saving that update for another day that never seems to come. They’ll often try to take advantage of this, searching for outdated devices to infiltrate while their victims watch YouTube on last year’s version of Firefox.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Yes, installing an update might take 15 minutes of your time. But it can pay dividends in preventing a security breach that could cost you or your business thousands.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Looking for more tips to boost your internet security? Get in touch to find out how we can help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/make-site-visitors-feel-secure-with-these-tips/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/141569922.jpeg" length="16318" type="image/jpeg" />
      <pubDate>Wed, 23 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/make-site-visitors-feel-secure-with-these-tips</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/141569922.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Computers for a small business: Laptop vs. desktop</title>
      <link>https://www.apogeemsp.com/2019/10/computers-for-a-small-business-laptop-vs-desktop</link>
      <description>As an entrepreneur, you've got your hands full making choices that can make or break your company. One important decision is choosing your small- to mid-sized business’s (SMB) computer hardware, whether you should invest in desktops or laptops. The following are valuable considerations on how to make the best choice between the two. Portability Modern […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As an entrepreneur, you've got your hands full making choices that can make or break your company. One important decision is choosing your small- to mid-sized business’s (SMB) computer hardware, whether you should invest in desktops or laptops. The following are valuable considerations on how to make the best choice between the two.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Portability

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Modern desktop computers aren't nearly as immobile as they used to be. In many cases, the screen is thin and light, and all-in-one desktops are easy to unplug, move, and plug in on the road. But there are still places where the desktop cannot go. On the other hand, laptops allow you to go anywhere, even to places without electricity. But this ability to take your work anywhere can be counterproductive; in fact, it creates more stress on employees who think they must work all the time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Memory and speed

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Before, desktop computers often had more memory than laptops, and they were faster because they had bigger processors. This has now changed, thanks to improvements in laptop technology. But until high-powered laptops become affordable to the general public, the desktop computer is going to provide your business with more memory, speed, and power for your money. If your employees’ work is limited to word processing and emailing, laptops should be enough. But anything more will probably require a desktop.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Security

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    An SMB’s computer hardware needs to be secure to ensure that company data doesn't end up in the wrong hands. A desktop computer is more physically secure because it’s often kept in one location, so it’s easier to guard. And because a desktop’s internet access is often a single source (whether through Wi-Fi or cable), it’s easier to defend it against malware. If you choose the laptop route, make sure to have strict policies on how to protect machines that leave the office, from physical loss (for example, theft) to unauthorized access (like using unsecured Wi-Fi).
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Price

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The laptop, especially the smaller notebook-style, is cheaper and available to more people. But desktop computers are becoming more affordable as more people have access to them through local channels. With a capable IT services provider, cost probably won’t be a deciding factor.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Quality

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Although laptop computers provide the convenience of portability, over time, they’re prone to battery and charging cord problems. They are also easily damaged, especially if mishandled. By contrast, desktops are generally sturdier and stay only in one place. But when they do experience a problem, they can be expensive to repair.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Final recommendation

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The desktop versus laptop debate is an old one, with supporters on both sides touting the advantages of their choice. A growing company usually needs a combination of both types of computers, especially as their needs evolve.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you have questions regarding the best choice for your company, give us a call. We'll be happy to assist you in improving your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/computers-for-a-small-business-laptop-vs-desktop/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2056093679.jpg" length="54153" type="image/jpeg" />
      <pubDate>Wed, 16 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/computers-for-a-small-business-laptop-vs-desktop</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2056093679.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How to pick the most secure browser</title>
      <link>https://www.apogeemsp.com/2019/10/how-to-pick-the-most-secure-browser</link>
      <description>The internet is a Wild West of sorts, as one could never know what kind of threat they’ll come across. This is why for businesses, it’s important to identify secure browsers to keep threats at bay. Microsoft Edge Microsoft Edge, Windows’ current default browser, is an improvement over its predecessor Internet Explorer (IE). Edge was […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The internet is a Wild West of sorts, as one could never know what kind of threat they’ll come across. This is why for businesses, it’s important to identify secure browsers to keep threats at bay.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Microsoft Edge

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Microsoft Edge, Windows’ current default browser, is an improvement over its predecessor Internet Explorer (IE). Edge was developed with Windows 10 integration and IE end-of-life in mind, resulting in a powerful and more efficient browser that has Cortana (Windows’ answer to Alexa and Siri) integration and Microsoft Store extensions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Edge’s main advantage is that it is Windows 10 computers’ native browser, which means it should integrate more seamlessly with the Windows OS ecosystem in terms of power usage and data security. Its built-in security features, called the Code Integrity Guard (CIG) and the Arbitrary Code Guard (ACG), prevent malicious codes from loading into a computer’s memory.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Safari

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Safari is a graphical web browser developed by Apple for its iOS, iPad OS, and macOS. The current iteration is Safari 13, which was released alongside macOS Mojave and macOS High Sierra in September 2019.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Safari 13 is highly secure, as it utilizes Safari 12’s baseline security features such as Automatic Strong Passwords and Intelligent Tracking Prevention 2.0. These features are augmented by a built-in password strength analyzer, FIDO02 USB security key authentication support, “Sign in with Apple” support, Apple Pay capabilities, and increased speed and encryption. Its main drawback, however, is that it is only available on Apple devices, with full capabilities found only on MacBooks and Macs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mozilla Firefox

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Mozilla Firefox is a free and open-source web browser developed by the Mozilla Foundation. It is widely available across platforms, even on Unix and Unix-like operating systems such as FreeBSD, OpenBSD, illuminos, and Solaris Unix.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Because of Firefox’s open-source development platform, it can be quite unsecure to use on publicly accessible computers. For personal and single-user business devices, however, Firefox is relatively safe, especially once all security features are activated and tweaked to your needs. Some key features are its “Do not track” privacy feature, phishing and malware blocking features, the Noscript Anti-XSS add-on (so you can determine which sites are allowed to execute scripts), the Noscript Anti-Clickjacking add-on (a detector that reveals invisible, malicious links and buttons), and its renowned pop-up ad blocker.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Firefox is also unique in that Mozilla has a bug bounty program, which offers a financial reward to anyone who can identify gaps and holes in Firefox code, so that it can be patched and improved as urgently as possible. Mozilla also promises no legal action against anyone who complies in good faith under its Bug Bounty program, including any claim under the DMCA for circumventing technological measures.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Google Chrome

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Google Chrome is a cross-platform web browser developed by Google. It is the default browser for Google’s line of laptops and Google Chromebooks. Chrome utilizes a process allocation model to sandbox tabs. “Sandboxing” is a security mechanism for separating running programs to keep software vulnerabilities from spreading.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Chrome also regularly updates two sets of blacklists, one for phishing and one for malware, which it uses to warn users of potentially harmful sites. It also touts site isolation and predictive phishing protection features that receive regular and critical updates every six weeks and within 24 hours of a known threat, respectively.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Being aware of how your web browser stacks up against its competitors is only half the battle. WannaCry spread to uninfected systems through a gap in the Windows security framework, and most other ransomware infections prey on human error. What your business needs is a comprehensive security audit. For more information, call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/how-to-pick-the-most-secure-browser/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2602556497.jpg" length="18140" type="image/jpeg" />
      <pubDate>Thu, 10 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/how-to-pick-the-most-secure-browser</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2602556497.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Top considerations when collecting customer data</title>
      <link>https://www.apogeemsp.com/2019/10/top-considerations-when-collecting-customer-data</link>
      <description>Businesses are collecting, processing, and storing data at a breakneck pace, and it’s increasingly difficult to keep up. Despite the importance of business intelligence, it’s important to collect data that is actually useful and relevant. A few essential tips will prevent the most common challenges. Before we jump into our tips for data collection, we […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses are collecting, processing, and storing data at a breakneck pace, and it’s increasingly difficult to keep up. Despite the importance of business intelligence, it’s important to collect data that is actually useful and relevant. A few essential tips will prevent the most common challenges.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Before we jump into our tips for data collection, we have to address the elephant in the room: customer privacy. Despite all the recent regulatory frameworks for protecting people’s private information, there are still a number of opportunities for you to collect data without running afoul of the law. However, honesty is the best business policy. Never ask for a customer’s personal information unless you are absolutely sure that they are aware of the exchange.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With that out of the way, let’s get to it!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  1. Collect identifiers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether you’re creating an online survey or a signup form, collecting identifying information (i.e. names, date of birth, age, gender, address, etc.) is crucial. This information will form the foundation for future analysis and segmentation.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  2. Track customer interactions

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Next is to define important customer interactions. For example, if you own an online store, you need to know how your customers arrived at your site, the items they clicked on, items they added to their cart, and what they eventually purchased. Tracking each step of their journey — from learning about your business to becoming a customer — will give you insights into what your customers need and want.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  3. Gather behavior-related data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Don't focus solely on customers who made a purchase. Think about what other indicators produce meaningful data. In our online store example, you might want to track how many receive your email newsletter, how many pages they visited on your site, or how much time they spent on each page. Analyzing this information will help you determine which aspects of your efforts are most effective.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  4. Automate data collection

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When gathering customer data, you must minimize the risk of human error. The most effective strategy is to automate as much of the collection process as possible. Apps and tools such as online forms and optical character recognition systems feed information directly into your database and eliminate paper-centric processes that often lead to mistakes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  5. Integrate your systems

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Redundancies and errors are also common when there are multiple databases managing the same information. You can prevent these issues by working with an IT provider to integrate all your apps, databases, and software solutions. This way, data collected in one database will be synced and consistent across other platforms, reducing manual data entry.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  6. Consider who will view the reports

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Inevitably, you’ll need to turn data into business intelligence reports. It’s a good idea to identify who will read your reports and highlight the most relevant insights. For instance, sales managers want to see quarterly sales figures, and human resources teams want to see labor costs compared to revenue. Using the right tools to generate these reports will save your team several hours of work.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  7. Update data in real-time

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s difficult to imagine any company in operation today that doesn’t need up-to-the-minute data accuracy. Business intelligence dashboards collect, organize, and filter data at the click of a button. This way, you’ll never have to wait a day or more to receive information that’s critical for a company decision.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Looking for technologies that can help you optimize data collection? Call our IT consultants today. We’ll recommend best-of-breed technologies that track the information you need to grow your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/top-considerations-when-collecting-customer-data/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3717861723.jpg" length="86150" type="image/jpeg" />
      <pubDate>Wed, 09 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/top-considerations-when-collecting-customer-data</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3717861723.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Ways systems can be breached</title>
      <link>https://www.apogeemsp.com/2019/10/5-ways-systems-can-be-breached</link>
      <description>When it comes to business IT security, many small- to medium-sized businesses (SMBs) often struggle to protect their systems from various cyberattacks. While there are many things you can do to secure your IT infrastructure, being aware of common security threats will really help. Here are five common ways your systems can be breached. #1. […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to business IT security, many small- to medium-sized businesses (SMBs) often struggle to protect their systems from various cyberattacks. While there are many things you can do to secure your IT infrastructure, being aware of common security threats will really help. Here are five common ways your systems can be breached.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #1. You are tricked into installing malicious software

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the most common ways a system’s security is breached is through downloaded malware. In almost every case where malware is installed, the user was tricked into downloading it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A common trick used by hackers is planting malware in software hosted on warez and torrent websites. When users visit the site, they are informed that they need to download the software in order for the site to load properly. Once downloaded, the malware infects the system. In other cases, hackers send emails with a malware-infected attachment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There is a nearly limitless number of ways you can be tricked into downloading and installing malware. Luckily, there are steps you can take to avoid this:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #2. Hackers are able to modify the operating system (OS) settings

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many users are logged into their computers as admins. Being an administrator allows you to change all settings, install programs, and manage other accounts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If a hacker manages to access your computer with you as the admin, they will have full access to your computer. This means they could install other malicious software, change settings, or even completely hijack the machine. The biggest worry about this, however, is if a hacker gets access to a computer used to manage the overall network. Should this happen, they could gain control of the entire network and do as they please.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To avoid this, limit the administrator role only to users who need to install applications or change settings on the computer. Beyond this, installing security software like antivirus scanners and keeping them up to date, as well as conducting regular scans, will help reduce the chances of being infected, or seeing infections spread.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #3. Someone physically accesses your computer

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These days, it seems like almost every security threat is trying to infect your IT infrastructure from the outside. However, there are many times when malware is introduced into systems, or data is stolen, because someone has physically accessed your systems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Let’s say you leave your computer unlocked when you go for lunch and someone walks up to it, plugs in a malware-infected USB drive, and physically infects your system. They could also access your system and manually reset the password, thereby locking you out and giving them access.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Secure yourself by setting up a password to control access to your computer. You should also lock, turn off, or log off from your computer whenever you step away from it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Beyond that, disable drives like CD/DVD and connections like USB if you don’t use them. This will limit the chances of anyone using these removable media to infect your computer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #4. Someone from within the company infects the system

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We’ve seen a number of infections and security breaches that were carried out by a disgruntled employee. They could delete essential data, or remove it from the system completely. Some have even gone so far as to introduce highly destructive malware. The most effective way to prevent this, aside from ensuring your employees are happy, is to limit access to systems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your employees don’t need access to everything, so reexamine what your employees have access to and make the necessary adjustments. For example, you may find that people in marketing have access to finance files or even admin panels. Revoke unnecessary access rights and ensure that employees only have access to the files they need.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  #5. Your password is compromised

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your password is the main way you can verify and access your accounts and systems. The issue is, many people have weak passwords. And with the steady increase in the number of stolen user account data, it could only be a matter of time before they can crack your password and compromise your account.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To add insult to injury, many people use the same password for multiple accounts, which could lead to a massive breach. Therefore, you should use strong and different passwords for your accounts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To further enhance your password security, utilize multifactor authentication (MFA), which uses more than one method of verifying a user’s identity, such as a fingerprint or a one-time code.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you are looking to learn more about securing your systems, contact us today to learn how our services can help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/5-ways-systems-can-be-breached-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3826118448.jpg" length="11240" type="image/jpeg" />
      <pubDate>Mon, 07 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/5-ways-systems-can-be-breached</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3826118448.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The benefits of cloud solutions in healthcare</title>
      <link>https://www.apogeemsp.com/2019/10/the-benefits-of-cloud-solutions-in-healthcare</link>
      <description>Cloud computing and cloud-based applications are becoming the norm for healthcare organizations across the globe. Whether using a browser-based tool or a mobile app, it’s easier than ever to deliver patient care from anywhere with an internet connection. If you’re still hesitant to join the trend, it’s time to reconsider. Easy information access The increasing […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud computing and cloud-based applications are becoming the norm for healthcare organizations across the globe. Whether using a browser-based tool or a mobile app, it’s easier than ever to deliver patient care from anywhere with an internet connection. If you’re still hesitant to join the trend, it’s time to reconsider.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Easy information access

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The increasing demand for doctors’ time means they have less time to review patient records. In the past, doctors had to either lug around reams of documents or spend hours at their desktop computer. But with cloud software for managing electronic medical records (EMR), doctors can conveniently access medical records from anywhere, at any time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  HIPAA Compliance

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The Health Insurance Portability and Accountability Act (HIPAA) is frustrating for medical practitioners who feel overburdened by rules and regulations. But without HIPAA, patient privacy is in jeopardy, so what can you do?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Regardless of whether you use a browser-based tool or a mobile app, cloud computing makes it easy to adapt to regulatory updates and changes. For example, if a vendor wanted to update its data encryption standards, it could do so in the cloud and the changes would automatically reflect on all accounts and devices — no new installs or configuration necessary!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cost reduction

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This type of IT also eliminates the need for on-site hardware, maintenance fees, and expensive one-time software licenses. In terms of less quantifiable cost reductions, the ability to access work from anywhere at any time boosts productivity and enables your IT department to be dramatically more efficient.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Scalability

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Unlike in-office computer hardware, you can scale cloud storage solutions in a matter of minutes. Beyond the benefit of organizational simplicity, just imagine how much office space you need to store five years’ worth of healthcare records. Web-based EMR software gives you more storage than you can ever need and retrieves records in mere seconds.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Better data backup and recovery

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Data loss is a real problem for healthcare practices. Will your business continuity be safe if your office suddenly becomes inaccessible? Even a couple of days of downtime can have serious repercussions for your reputation. Practices that store their files in the cloud don’t have to worry about this because nearly every solution stores files in more than one location so backups can be restored quickly if anything goes wrong.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Want to learn more about which cloud computing solutions will be best for your practice? Get in touch with one of our tech experts today for personalized recommendations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/10/the-benefits-of-cloud-solutions-in-healthcare/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2842472839.jpg" length="29480" type="image/jpeg" />
      <pubDate>Fri, 04 Oct 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/10/the-benefits-of-cloud-solutions-in-healthcare</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2842472839.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Ways to ensure clean workstations</title>
      <link>https://www.apogeemsp.com/2019/09/ways-to-ensure-clean-workstations</link>
      <description>A tidy workstation can help employees become high achievers. Cleanliness also contributes to employee health, safety, and better office hardware maintenance. Is it time for you to prioritize cleanliness in your company? Keep your computers dirt- and dust-free with these tips. Cleaning desktop monitors Employees spend many hours looking at their computer monitors, and a […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A tidy workstation can help employees become high achievers. Cleanliness also contributes to employee health, safety, and better office hardware maintenance. Is it time for you to prioritize cleanliness in your company? Keep your computers dirt- and dust-free with these tips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cleaning desktop monitors

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Employees spend many hours looking at their computer monitors, and a clean monitor makes it easier for them to do their tasks. The best way to clean your monitor is to turn it off first and gently wipe the screen with a microfiber cloth.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If there are still spots, try dipping the cloth in a tiny bit of water — make sure you don’t spray water onto the screen. Don’t press too hard on the screen, as this could damage your monitor’s pixels. Also, it is not a good idea to use paper products like paper towels or tissues, as they will not only leave a residue, but may also slightly scratch the monitor.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cleaning mobile screens

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Mobile and other touch screen devices will usually get your fingerprints all over them. The best way to clean these screens is also with a microfiber cloth. For tougher spots, dip the cloth in a small amount of water and then gently wipe the screen. Don’t splash water onto the device itself, as water could get inside, ruin internal components, and void the warranty.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Some people suggest rubbing alcohol to remove fingerprints and disinfect the device. While this will be okay for some screens, many manufacturers recommend against it because the alcohol can eat away at the protective film on some devices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you notice that there is a lot of dust or gunk on the edges of your screen, or even in cracks, you may need to take the device to a mobile shop for more thorough cleaning. Do not open the device yourself, as this could void the warranty.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cleaning your keyboard

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Because we use keyboards almost every day, they may get a bit grungy, with debris and dirt accumulating between the keys. Before you start cleaning, be sure to unplug the keyboard, or turn it off if it is wireless. To clean the upper parts of the keys — where your fingers strike the keys — try dipping cotton swabs into rubbing alcohol and then cleaning the keys with a gentle rub.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To clean between keys, you will need compressed air, which can be purchased at most office supply and computer stores. Spraying in between keys should be enough to get rid of most of the dust and grit.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cleaning your mouse

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Like the keyboard, the mouse can get quite dirty with grime from your fingers and dust. To clean a mouse, unplug it first then use cotton swabs dipped in rubbing alcohol to gently clean it. There’s no need to open your mouse, as most models are designed to not be opened by users.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cleaning your laptop’s body

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To clean your laptop’s body, turn it off, unplug it, and clean it with cotton swabs dipped in rubbing alcohol, or Mr. Clean Magic Eraser or a similar cleaning agent. Be careful not to scratch the sensitive components of the body.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cleaning your computer tower

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You may also clean the desktop computer’s tower by taking a slightly damp microfiber cloth and wiping down the front and sides of the tower. However, we strongly recommend avoiding the back and certain areas of the front, as there are ports and components that could be easily damaged.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As always, be sure to disconnect the power source and all wires before cleaning, as any water damage could ruin your computer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cleaning the inside of your computer

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Dust will eventually get inside your computer and clog up cooling fans, causing them to stop working properly. This can potentially lead to other components overheating. The internal components of your computer are extremely fragile and need to be handled with great care. Do not take the case off of your computer, as this usually voids your warranty.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For all of your computer needs, our technicians are here to help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/ways-to-ensure-clean-workstations/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1990869312.jpg" length="39367" type="image/jpeg" />
      <pubDate>Mon, 30 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/ways-to-ensure-clean-workstations</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1990869312.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Top 3 cloud service models</title>
      <link>https://www.apogeemsp.com/2019/09/top-3-cloud-service-models</link>
      <description>There are countless technology-related trends that come and go, but one of the most important technologies that business owners are sticking with is the cloud. Owners and managers know they ought to be using “the cloud” but it can be confusing to understand what it is exactly and then choose from among the different types […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are countless technology-related trends that come and go, but one of the most important technologies that business owners are sticking with is the cloud. Owners and managers know they ought to be using “the cloud” but it can be confusing to understand what it is exactly and then choose from among the different types of services available. To help, here is an overview of three of the most common cloud service models used by small to medium businesses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  1. Software-as-a-Service (SaaS)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Easily the largest and most well known cloud-based service, SaaS uses the cloud to deliver apps to users, and these apps are then usually accessed via a web browser. This means users who have access to the internet can access the software from any device, at any time. Unlike physical software that you install on your computer, SaaS solutions are hosted on a provider’s servers. In a nutshell, SaaS is:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With SaaS, your provider is responsible for software maintenance and updates, which means users will all be using the same version of software and get updates at the same time. As a business owner, this means that managing the software on all of your computers is not only easier, but more affordable.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    SaaS software solutions include office document creation suites, accounting software, email, HR solutions, content management, customer relationship management (CRM), and more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  2. Platform-as-a-Service (PaaS)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    PaaS is primarily used by developers who need a virtual environment for developing and testing their own custom software or applications. This means developers don’t need to build and maintain their own infrastructure (which is comprised of networking devices, storage, servers, an operating system, and other necessary hardware and software) from scratch when developing applications, saving the firm time and money. Most companies who utilize PaaS do so to either host or develop their own software solutions, or to provide support for software used by employees. PaaS platforms are:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While PaaS is gaining in popularity with many small businesses, most won’t have firsthand interaction with this type of cloud because they won't need to build their own software or app.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  3. Infrastructure-as-a-Service (IaaS)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    IaaS offers services such as pay-as-you-go storage, networking, and virtualization. The most popular and well-known type of IaaS is the virtual machine — a digital version of a computer or server that is accessed over an internet connection. IaaS gives users cloud-based alternatives to expensive on-premises infrastructure so businesses can use their funds to invest in other things.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In other words, if you are looking to virtualize your systems via the cloud, IaaS is a good place to start, as it allows you to move existing support systems into the cloud. Other solutions can then be migrated or introduced as needed. IaaS is essentially:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While the cloud offers a wide variety of benefits and solutions, choosing the service which is best for your company’s needs can be tedious. To ease this burden, get in touch with us today. We’ll help you find the best solution your business needs and ensure proper migration and implementation so you can focus on running your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/top-3-cloud-service-models-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1359180193.jpg" length="8493" type="image/jpeg" />
      <pubDate>Tue, 24 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/top-3-cloud-service-models</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1359180193.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Things to avoid when investing in IT</title>
      <link>https://www.apogeemsp.com/2019/09/5-things-to-avoid-when-investing-in-it</link>
      <description>Running a business can be time-consuming, especially if you’re managing staff, looking for growth opportunities, and looking after clients. This leaves you little time to search for an IT system that can benefit your business. Because of this, you may be forced to make an impulsive technology purchase that does more harm than good. To […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Running a business can be time-consuming, especially if you’re managing staff, looking for growth opportunities, and looking after clients. This leaves you little time to search for an IT system that can benefit your business. Because of this, you may be forced to make an impulsive technology purchase that does more harm than good. To avoid this, here are five IT investment mistakes you should be aware of.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Spending without finding the perfect fit
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Advertisers like to make you believe that the newest technology will solve all your problems. While the latest cloud or virtualization offering is likely to make things better for many companies, they won’t work for everyone. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Don’t let the flash and hype of new products deceive you. Take time to think about the results you want to achieve with technology. Make a list of your goals and check if they can be fulfilled with your new IT investment. A good IT provider should guide, not confuse you. That provider should see to it that you make the best choice. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Believing everything will magically work together
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      As technology evolves, it becomes easier to use. User-friendly products help people work better and faster. However, not all products follow that route, and many business owners wrongly assume that the new technologies they invest in will work well with the other IT systems they already have. This mistaken belief can get them in trouble. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      While many technologies are compatible with one another, those that don’t work together can result in massive and costly downtimes that can cripple your business. So, don’t push your luck. Be smart, do some research, or consult an IT professional before making a purchase. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Not training your team 
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Now that you’ve found the perfect fit technology that will integrate with your current IT, go ahead and purchase it. After that, you think you can relax and let your sparkly new IT solution power your company to new levels of success and profits, right? Wrong! 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Don’t forget that not all employees will be comfortable with your new investment. Nor will everyone know how to use it. That’s the time to consult an IT provider for support and training. If this is not possible, look elsewhere or think twice before buying anything. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Forgetting your budget
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      More and more IT solutions are packaged with pay-as-you-go monthly pricing. While this is a great way to help you avoid a large upfront capital investment, implementing too many different technologies quickly without thinking about recurring costs can eat up your money. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Think carefully before opening your wallet. Do a little research, draft a budget, or get help from a consultant. This will spare you a lot of frustrations. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Not getting feedback
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      It’s wise to consult employees who will be using the new technology on a daily basis. Do this even before you make a purchase. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Remember that not everyone may feel at home with the new product. They might even discover some downsides you aren’t aware of. Talk to people to get important feedback, or you may find it difficult to convince them to use it. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Need an IT professional to create a complete technology solution for your business? We’re happy to serve you.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/5-things-to-avoid-when-investing-in-it/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2615469994.jpeg" length="34842" type="image/jpeg" />
      <pubDate>Mon, 23 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/5-things-to-avoid-when-investing-in-it</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2615469994.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Juice jacking: What is it?</title>
      <link>https://www.apogeemsp.com/2019/09/juice-jacking-what-is-it</link>
      <description>We’ve come to rely on our smartphones to help complete daily tasks, and this has resulted in the need to recharge our phones multiple times a day. But when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to an incident of “juice jacking.” If this […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      We’ve come to rely on our smartphones to help complete daily tasks, and this has resulted in the need to recharge our phones multiple times a day. But when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to an incident of “juice jacking.” If this is news to you, find out what juice jacking is and how you can avoid it.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What’s juice jacking?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While newer phones have ditched the cable charger and moved on to wireless charging, older models still rely on power cords to transmit power to the mobile device. The problem with this setup is that the cable used for charging can also be used for transferring data. This setup is easily exploitable, and trust opportunists to do just that. When you use a public cable, they gain user access by leveraging the USB data/power cable to illegitimately access your phone’s data and/or inject malicious code into your device.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Attacks can be an invasion of privacy: your phone pairs with a computer concealed within the charging kiosk, and information such as private photos and contact information are transferred to a malicious computer. The computer can then access a host of personal information on the device, including your address book, notes, photos, music, SMS database, and keyboard cache. It can even initiate a full backup of your phone, all of which can be accessed wirelessly anytime.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But attacks can also be in the form of malicious code directly injected into your phone. A public USB hub can be used to transmit malware-ridden programs or tracking applications to the user’s mobile phone. All it takes is one minute of being plugged into a harmful charger.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How to avoid juice jacking

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The most effective precaution is simply not charging your phone using a third-party system. Here are some tips to help you avoid using a public kiosk charger:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Technology threats are all around us. Even the tiniest detail like charging your phone at a kiosk charger could affect the security of your device.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Looking to learn more about today’s security and threats? Contact us today and see how we can help.
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/juice-jacking-what-is-it/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1659024132.jpg" length="16896" type="image/jpeg" />
      <pubDate>Wed, 18 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/juice-jacking-what-is-it</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1659024132.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What to consider when selecting EMR</title>
      <link>https://www.apogeemsp.com/2019/09/what-to-consider-when-selecting-emr</link>
      <description>You and your patients can benefit from having an electronic medical record (EMR) software system in your clinic, healthcare facility, or hospital. It significantly helps healthcare professionals keep a more comprehensive and detailed record of all their patients’ medical information and treatment procedures. However, with so many EMR vendors out there, choosing the best EMR […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You and your patients can benefit from having an electronic medical record (EMR) software system in your clinic, healthcare facility, or hospital. It significantly helps healthcare professionals keep a more comprehensive and detailed record of all their patients’ medical information and treatment procedures. However, with so many EMR vendors out there, choosing the best EMR to suit your practice can be overwhelming. Here are some criteria to consider when selecting an EMR system.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Determine your requirements

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    EMR software offers a vast selection of functions — and you don’t want to pay for one that is irrelevant to your practice. Avoid this by making a list of all requirements from the ground up. Be process-oriented and begin from patient admission, then move on to patient scheduling, medication lists, visual reports, and so on. Prioritize the features that would bring the most value to your practice.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Get the appropriate EMR for your specialty

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    EMR systems with broad functions may not offer the specific features that you need. On the other hand, the right EMR system can be customized to suit your specialties and provide a familiar workflow. For instance, doctors who specialize in midwifery will need a unique EMR platform designed for logging in a newborn’s medical details.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Simple usability

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    EMRs should help healthcare professionals manage their patients. Usability issues can hinder this, so how will you know if your EMR solution is easy to use? Try out the demo version and test a few common functions that will assist you in your everyday routine. You should be able to figure out how to use it more or less right away. You’ll also need your staff to be able to catch up quickly, so simplicity helps a lot when implementing a new system.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Support and upgrades

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Reputable sellers usually provide 24/7 support, which is beneficial as most likely you’ll come across technical problems at some point. You never know when you might need someone ready to answer questions late at night. And when it comes to software, support often includes upgrades with new features and bug fixes. Find out more about your potential vendor’s track record in giving quality care and consistent software updates.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Vendor viability

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Take into account your vendor’s plans for the future before buying their EMR product. You’re not just buying from your vendor, but you’re also creating a long-term relationship with them. Remember that technology is always changing, as are medical regulatory standards. Make sure that your vendor has good customer relations and that they have the ability to invest in future development. After all, EMR implementation can be costly and you don’t want to be making major changes to your EMR system every few months.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/what-to-consider-when-selecting-emr-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4083036833.jpg" length="27423" type="image/jpeg" />
      <pubDate>Thu, 12 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/what-to-consider-when-selecting-emr</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4083036833.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Defining HDD and SSD</title>
      <link>https://www.apogeemsp.com/2019/09/defining-hdd-and-ssd</link>
      <description>Buyers used to have a limited choice for what kind of storage they got with their laptop or desktop PCs. With the invention of the solid state drive (SSD), you can now choose to configure your system with either the traditional hard disk drive (HDD), SSD, or in some cases both. So what’s the better […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Buyers used to have a limited choice for what kind of storage they got with their laptop or desktop PCs. With the invention of the solid state drive (SSD), you can now choose to configure your system with either the traditional hard disk drive (HDD), SSD, or in some cases both. So what’s the better pick between the two? Here, we compare the two so you can decide for yourself which one best fits your needs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is an HDD?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A hard disk drive (HDD) is a computer storage device that’s comprised of metal platters with a magnetic coating, spindle, and various moving parts to process and store data. The common size for laptop hard drives is the 2.5” model, while a larger 3.5” model is usually found in desktop computers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is an SSD?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A solid state drive (SSD) is another type of data storage device that performs the same job as an HDD. But instead of storing data on metal platters, an SSD uses flash memory chips and an embedded processor to store, retrieve, and cache data. It is roughly the same size as a typical HDD and looks like a smartphone battery. .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  HDD and SSD comparison

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Now let’s take a closer look at the two devices. We break it down into the following main categories:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Speed

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This is where SSDs truly prevail. While HDDs need a long time to access data and files because the disk must spin to find it, SSDs can complete this task 200% faster since data is instantly accessed through flash memory chips. This is why an SSD-equipped PC will boot within seconds and deliver blazing fast speeds for launching programs and applications, whereas a computer that uses an HDD will take a much longer time to boot the operating system, and will perform slower than an SSD during normal use.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Capacity

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As of writing, SSD units max out at 60 TB storage capacity. Although there are large SSDs, anything that’s over 512 GB is beyond most people’s price range. HDDs, on the other hand, have large capacities (1–2 TB) available for much more affordable prices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Durability

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    HDDs consist of various moving parts and components, making them susceptible to shock and damage. The longer you use your HDD, the more they wear down and eventually end up failing. Meanwhile, SSDs use a non-mechanical flash storage mounted on a circuit board, providing better performance and reliability, and making it more likely to keep your files and data safe.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Noise

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    An HDD can sometimes be the loudest part of your computer. Even the highest-performing HDDs will emit some noise when the drive is spinning back and forth to process data. SSDs have no moving parts, so it makes no noise at all.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Heat

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More moving parts means more heat, and HDD users will have to accept that their device will degenerate over time because of the heat HDDs produce. An SSD uses flash memory, generating less heat, so they have a longer lifespan.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cost

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    SSDs are much more expensive than HDDs, although today the price difference has narrowed considerably. This is why most computers with an SSD only have a few hundred gigabytes of storage. HDDs are about twice as cheap as SSDs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Despite the higher costs and lower storage capacity, SSD is the clear winner over HDD in terms of performance. While you’re paying more for less memory with an SSD, you’re investing in a faster and far more durable data storage option in the long run.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We recommend using an SSD as the primary storage for your operating system, applications, and most-used programs. You can install an HDD on the same computer to store documents, movies, music, and pictures; these files don’t need to leverage the incredible access times and speed of SSD.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/defining-hdd-and-ssd/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4211549423.jpg" length="12091" type="image/jpeg" />
      <pubDate>Wed, 11 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/defining-hdd-and-ssd</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4211549423.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>SEO recommendations for website images</title>
      <link>https://www.apogeemsp.com/2019/09/seo-recommendations-for-website-images</link>
      <description>Search engine optimization (SEO) is one of the most difficult and frustrating aspects of running a business. Web services and platforms that provide automated SEO reports like WordPress, Google, and Raven Tools tend to oversimplify their advice. If you’re trying to get a green light for SEO, you might need to look more closely at […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Search engine optimization (SEO) is one of the most difficult and frustrating aspects of running a business. Web services and platforms that provide automated SEO reports like WordPress, Google, and Raven Tools tend to oversimplify their advice. If you’re trying to get a green light for SEO, you might need to look more closely at the images on your site.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Do images really affect my SEO?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the reasons images tend to be overlooked when auditing SEO is because it’s easy to forget just how many images your website has. Maybe you only had a few photos on your homepage when you first built your site. Over time however, you probably added countless visual elements to blog posts, landing pages, and team photos — drastically increasing the influence of your images on your SEO.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Image resolution and load speed

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The first thing to check is how your images affect your site’s speed. If you’re using ultra high-resolution photos, those with mobile devices or satellite data connections will have trouble loading your site. Site load times affect your site’s ranking on Google, so make sure to pair your images down to a more reasonable resolution and save them as web-friendly file types.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Keywords and image title

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The days of keyword-stuffing are long gone, but that doesn’t mean you can get away with uploading images with filenames like “DSC2558.jpg”. Before doing so, make sure the names of your images are relevant to their content, such as “gym-trainer-helping-lift.jpg” or “call-center-customer-service.jpg”. This makes it easier for search engines to derive information from the images on a page.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  “Alt text” and title text

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Even though Google is getting better at recognizing image content without any help from text identifiers, describing your images in your website’s back-end is still important for SEO. Every image on your site should have enough text-based information without disrupting the user experience.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
To see how this works in WordPress, open your site dashboard and click on Media. This will display all the images, videos, and audio there. Click on any photo and you'll have access to text editing tools. Whatever you include in the Caption field will be shown below the image, so check that it corresponds with your content. If not, skip it. In this case, user experience takes priority over SEO.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The Alternative Text and Description fields will be visible to visitors only if the image doesn’t load or if they select it manually. They may not seem that important, but these should be considered non-negotiable for SEO purposes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Check that your site is doing all these things before requesting another SEO report. If your score changes, audit your image optimizations regularly. If you’re still seeing red, there are a number of web- and cloud-based platforms that can help improve your content. Give us a call today to find out more!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/seo-recommendations-for-website-images/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4216906358.jpg" length="16627" type="image/jpeg" />
      <pubDate>Fri, 06 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/seo-recommendations-for-website-images</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4216906358.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Data backup solutions for your business</title>
      <link>https://www.apogeemsp.com/2019/09/data-backup-solutions-for-your-business</link>
      <description>Any business owner worth their salt knows the value of data to business. This is why it’s bizarre that many business owners don’t have a proper data backup strategy in place. Organizations of all sizes need to take a proactive approach to backing up their data, and there are several solutions they can implement to […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Any business owner worth their salt knows the value of data to business. This is why it’s bizarre that many business owners don’t have a proper data backup strategy in place. Organizations of all sizes need to take a proactive approach to backing up their data, and there are several solutions they can implement to do that. Here are four to consider.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to data backups, there’s no one-size-fits-all solution. As such, you’ll want to consider the pros and cons of each before making a choice.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  USB flash drives

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    USB flash drives are basically miniature hard drives that you connect to your computer using a USB port. Aside from being inexpensive, USB flash drives are also portable. They can be used to back up data from several computers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    However, because of their size and portability, USB flash drives are easy to misplace, which is why they’re not recommended for long-term storage of crucial information. They are best used for intermediate backups.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  External hard drives

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As a backup storage medium, external hard drives have the lowest cost per gigabyte compared to other backup devices. Since an external hard drive has the same plug-and-play functionality as USB flash drives, you can just plug it into your computer and start selecting the files you want to back up. The transfer rate is also very fast, and you can back up a large amount of data within seconds.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the drawbacks of using an external hard drive is that you’ll need to update your backups on a regular basis, or else new files won’t be included. There’s also the risk of the device being misused or stolen. For example, an employee might use the drive for storing personal files or take it with them when they quit.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Network attached storage (NAS)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    NAS is a dedicated server for storing data, and it can also be used as an email server. It has its own IP address and can operate either wired or wirelessly. NAS offers data redundancy, which means it will generate a backup of your backups, so you can ensure your files are fully protected.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    On the downside, NAS can’t be scaled beyond the limits of the system. This means you have to purchase additional hard drive bays when you need more capacity. You also have to take full responsibility for data security if you’re implementing NAS.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cloud storage

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud storage is becoming more and more popular among businesses of all sizes because of its many benefits. It gives users anytime, anywhere access to data and lets them work with the most current hardware and up-to-date software. It’s also affordable since businesses pay for what they use only. Additionally, cloud computing is convenient, because service providers take care of the installation, management, and maintenance processes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    However, some cloud service providers don’t employ sufficient security measures on their systems, so your data could be exposed to potential cybersecurity threats. For this reason, cloud storage is not always the ideal solution for medical practices, law firms, and other organizations that handle sensitive data. If they want to use cloud storage, they must find a service provider that implements top-of-the-line cybersecurity protocols and specializes in data regulations compliance.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Choosing the best backup solution has far-reaching impacts on your business. Each method or device has trade-offs, which is why you need to select the one best suited to your business’s needs. Enlist the help of our experts to ensure you make the right choice.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/data-backup-solutions-for-your-business/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2679520388.jpg" length="35165" type="image/jpeg" />
      <pubDate>Thu, 05 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/data-backup-solutions-for-your-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2679520388.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Check the list of free ransomware decryptors</title>
      <link>https://www.apogeemsp.com/2019/09/check-the-list-of-free-ransomware-decryptors</link>
      <description>We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Make sure to check these free resources before responding to a cyberattacker’s demands. The state of ransomware […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Make sure to check these free resources before responding to a cyberattacker’s demands.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The state of ransomware in 2019

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For businesses, the challenge of dealing with ransomware is both from outside and within. On the one hand, there are more cybercriminals trying to infiltrate your network. And thanks to an ever-increasing variety of social engineering scams, there are more internal staff members who are tricked into providing sensitive information or downloading malware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The statistics are sobering. Ransomware cost businesses more than $75 billion per year. Over the past two years, ransomware attacks have increased by over 97%. And compared to 2017, this year’s ransomware from phishing emails increased by 109%.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    According to studies, by 2021 there will be a ransomware attack targeting a business every 11 seconds. That is up from every 14 seconds in 2019, and every 40 seconds in 2016.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Zombie ransomware is easy to defeat

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not every type of infection is targeted to individual organizations. Some infections may result from self-propagating ransomware strains, while others may come from cyberattackers who are hoping targets become so scared that they pay up before doing any research on how dated the strain is and how to remove it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    No matter what the circumstances of your infection are, always check the following lists to see whether free decryption tools have been released to save you a world of hurt:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Prevention

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But even when you can get your data back for free, getting hit with malware is no walk in the park. There are essentially three basic approaches to prevent ransomware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    First, train your employees about what they should and shouldn’t open when browsing the web and checking email.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Second, back up your data as often as possible to quarantined storage. As long as access to your backed-up data is extremely limited and not directly connected to your network, you should be able to restore everything in case of an infection.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Finally, regularly update all your software solutions (operating systems, productivity software, and antivirus). Most big-name vendors are quick to patch vulnerabilities, and you’ll prevent a large portion of infections just by staying up to date.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether it’s dealing with an infection or preventing one, the best option is to always seek professional advice from seasoned IT technicians. It’s possible that you could decrypt your data with the tools listed above, but most ransomware strains destroy your data after a set time limit, and you may not be able to beat the clock. And even if you do, you probably won’t have the expertise to discern where your security was penetrated.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Don’t waste time fighting a never-ending stream of cyberattacks — hand it over to us and be done with it. Call us today to find out more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/09/check-the-list-of-free-ransomware-decryptors-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2455231690.jpg" length="35895" type="image/jpeg" />
      <pubDate>Tue, 03 Sep 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/09/check-the-list-of-free-ransomware-decryptors</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2455231690.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>3 Easy ways to protect your business data</title>
      <link>https://www.apogeemsp.com/2019/08/3-easy-ways-to-protect-your-business-data</link>
      <description>Most business owners are too busy running their respective offices to be concerned about optimized security settings and other technical matters. To spare them the agony of deciphering IT jargon, here are three easy ways to prevent data theft.  Cover your webcam If Facebook founder Mark Zuckerberg, former FBI Director James Comey, and National Security […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Most business owners are too busy running their respective offices to be concerned about optimized security settings and other technical matters. To spare them the agony of deciphering IT jargon, here are three easy ways to prevent data theft. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cover your webcam

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If Facebook founder Mark Zuckerberg, former FBI Director James Comey, and National Security Agency whistleblower Edward Snowden all believe their webcams could be compromised, there’s no reason you should feel safe. They’re not overreacting because of some ruthless paparazzi that’s hounding them. It’s a fact that cybercriminals can use your webcam to spy on you. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Though it might sound like a scene from an action movie or crime thriller, this has actually happened on several occasions. Hackers do this either to satisfy their voyeuristic tendencies or, more commonly, to steal personal information. This is a very real threat with disturbing repercussions. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      With your webcam, cybercriminals can examine your surroundings, determine your location, as well as spy on the people you’re with. They can use this information to hold you ransom and threaten to broadcast your most intimate and vulnerable moments if you don’t pay up. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Fortunately, guarding yourself against this danger is easy. Covering your webcam should do the trick. You can use regular tape or you can purchase a cheap webcam cover online. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use a privacy shield

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Think of privacy guards as those iPhone screen protectors but with an anti-snooping feature. These are thin covers you put on your computer, laptop, or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere — except straight-on — sees nothing. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Privacy filters are commonly used to protect work devices that display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to “shoulder surfing” — the act of peeking at someone else’s screen, with or without ill intent. This is the reason we recommend using these protectors on all devices. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Get a physical authentication key

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Requiring more than one set of credentials to access sensitive resources has become the standard practice for established online services. With two-factor authentication in place, you can gain access to your account only after you’ve entered an authentication code. This is something that the website sends to your smartphone once you’ve entered your account credentials. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Until recently, two-factor authentication relied mostly on text messages sent to mobile phones. But professionals now realize that phones can be hijacked to redirect text messages. Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you’re looking for authentication services that can’t be hijacked, stolen, or lost, your best bet is a USB or Bluetooth key that you can carry always. This means nobody — not even you — will be able to access your account without the physical key. Talk about ultimate security at your fingertips. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you need help setting up two-factor authentication or IT security services, contact our experts and have peace of mind. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/08/3-easy-ways-to-protect-your-business-data/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2271496016.jpg" length="56807" type="image/jpeg" />
      <pubDate>Tue, 27 Aug 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/08/3-easy-ways-to-protect-your-business-data</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2271496016.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Mobile phone biometrics enhances security</title>
      <link>https://www.apogeemsp.com/2019/08/mobile-phone-biometrics-enhances-security</link>
      <description>Constantly using passwords on a smartphone can be a pain, not to mention a high security risk. Luckily, popular mobile browsers like Chrome and Firefox Lite are now supporting biometrics for authentication to make logging in to social media, email, and online shopping accounts easier and more secure. Here’s what you need to know about […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Constantly using passwords on a smartphone can be a pain, not to mention a high security risk. Luckily, popular mobile browsers like Chrome and Firefox Lite are now supporting biometrics for authentication to make logging in to social media, email, and online shopping accounts easier and more secure. Here’s what you need to know about the Web Authentication API.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Authenticate your profile on your mobile device

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Chrome OS, Windows, MacOS, Linux, and Android are all adding features to help users safely log in using biometric identification via USB, Bluetooth, and NFC devices connected to smartphones and tablets. With such convenience, users can verify their accounts on the go.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Preventing cyberattacks with browser-based biometrics.

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Passwords are notoriously bad at protecting users’ accounts and the information they store. Facial scans, fingerprints, and voice recognition would make it exponentially harder for hackers to commit identity theft. That means you’re also less likely to be duped by an email from a hacker pretending to be your boss asking for the company credit card's details.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Enjoy more secure online transactions

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Biometric verification will also retire the need for logging in your information when shopping online, streaming video, using cloud applications, and other internet-based transactions. Windows 10 has already adopted features that offer limited account management with fingerprints and facial scans. Samsung phones now have
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.samsung.com/us/support/answer/ANS00045081/"&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Samsung Pay
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      , which turns them into digital wallets that are protected by fingerprint or iris scans.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Browser-based biometrics is starting to revolutionize and streamline the steps in verifying online accounts. It promises to add more security and ease in logging in and transacting on the internet. To keep up with the latest and greatest in browser-related innovations at your company, give us a call now.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/08/mobile-phone-biometrics-enhances-security/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2249304886.jpg" length="20142" type="image/jpeg" />
      <pubDate>Wed, 21 Aug 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/08/mobile-phone-biometrics-enhances-security</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2249304886.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How robust dashboards help your business</title>
      <link>https://www.apogeemsp.com/2019/08/how-robust-dashboards-help-your-business</link>
      <description>A dashboard is a business intelligence tool that displays metrics and key performance indicators (KPI) for organizations. Dashboards give you an overall view of your business. Here are some uses of dashboards in real-life business situations. Marketing insights An organization's marketing department typically analyzes a significant amount of data from various channels. Whether the purpose […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A dashboard is a business intelligence tool that displays metrics and key performance indicators (KPI) for organizations. Dashboards give you an overall view of your business. Here are some uses of dashboards in real-life business situations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Marketing insights

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    An organization's marketing department typically analyzes a significant amount of data from various channels. Whether the purpose is to forecast monthly sales, predict trends, or build marketing strategies, marketing officers use dashboards to compare, sort, and analyze raw data to churn out meaningful information presented in an easy-to-understand format. This allows key decision makers to easily make decisions using that information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Tracking sales opportunities

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Sales dashboards are perfect for tracking products and services. They help you identify sales opportunities by monitoring top-selling products and comparing the growth in revenue on a periodical basis. They sync to your raw data, so your charts are always up to date, thus eliminating the need to spend hours manually entering and preparing sales reports and charts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Social media management

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Social media management is more than just posting regularly on your business’s social media accounts. And in most cases, your social media platform’s default dashboard doesn’t give you deep insight into your social media campaigns. What’s more, managing multiple social media accounts can quickly become a cumbersome process since you have to use several login credentials. Instead, you can manage your accounts all at once through a comprehensive social media dashboard, saving you valuable time and effort.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Financial reports

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Presenting financial data is so complex that it often leads to misinterpretation and misunderstanding of critical data. Dashboards make creating financial reports much easier, and financial analysts can take advantage of dashboards to display sensitive data in a comprehensible graphical format — be it customer invoices, progress toward revenue goals, or business expenses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Project collaboration

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses of all sizes require their employees to collaborate on projects, whether on-site or online. Project supervisors need to get their teams together to give them projects’ requirements, deadlines, and responsibilities, and to get progress updates. With the help of project collaboration dashboards, members will see the complete workflow of the project, allowing for a more efficient and collaborative working environment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Dashboards eliminate the complications of presenting complex business data and make your team more efficient. If you’re looking to implement dashboards and other cutting-edge tools to make your job easier, contact our consultants today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/08/how-robust-dashboards-help-your-business/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3845028937.jpg" length="42650" type="image/jpeg" />
      <pubDate>Tue, 20 Aug 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/08/how-robust-dashboards-help-your-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3845028937.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Safeguarding your social media from hackers</title>
      <link>https://www.apogeemsp.com/2019/08/safeguarding-your-social-media-from-hackers</link>
      <description>Social media phishing is on the rise. Facebook is one of the most commonly impersonated brands in phishing attacks. Hackers now employ more sophisticated tactics, so you must strengthen your privacy settings to keep them away. Lock screens exist for a reason Lock all your computing devices as soon as you stop using them. This […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Social media phishing is on the rise. Facebook is one of the most commonly impersonated brands in phishing attacks. Hackers now employ more sophisticated tactics, so you must strengthen your privacy settings to keep them away.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Lock screens exist for a reason
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Lock all your computing devices as soon as you stop using them. This way, you are safe from the simplest hack of all: someone opening a browser on your computer that has your social media login saved. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Strong passwords are never out of fashion
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Unlocking your phone may be limited to a six-digit passcode, but you’ll need something much more complicated for your account password. Create a password that you don’t use for any other account because with the regular occurrence of data breaches, hackers probably already have a long list of your favorite passwords from other websites and platforms. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      It is best to use a password manager like an app or online service that allows you to generate and retrieve complex passwords.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      You can also enable two-factor authentication, which requires a secondary verification step such as a code sent to your phone. Even if hackers have your password, they won’t be able to log in without your phone.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Make use of social media features
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Facebook can help you keep tabs on who’s accessing your account and from where. Click on the down arrow located at the upper right corner of your Newsfeed and select 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Settings
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      . Then click 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Security and Login 
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      to get more information. If you sense an imposter, click the right-hand icon so you can log out remotely or report the person.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      From there, turn on 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Get alerts about unrecognized logins
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       to get notifications via Facebook, Messenger, or email if someone is logged into your account from an unrecognized browser. Unfortunately, Twitter doesn’t have the same option (which makes two-factor authentication extremely necessary).
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Hackers can also barge into your Facebook and Twitter accounts through third-party services that you’ve given access to your profiles, so make sure to double-check what you have approved.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Lastly, be sure to check the permissions Facebook and Twitter have on your smartphone or tablet.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Less personal info, fewer problems
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      These steps are just the beginning of what you should be doing. You should also limit the personal data you input into your social media accounts. Avoid oversharing.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      By following these tips, you can prevent Facebook and Twitter hacking. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Cybersecurity is a sprawling issue and social media privacy is such a small sliver of what you need to stay on top of. For 24/7 support, call our team of experts today.
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/08/safeguarding-your-social-media-from-hackers/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2548395223.jpg" length="23737" type="image/jpeg" />
      <pubDate>Fri, 16 Aug 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/08/safeguarding-your-social-media-from-hackers</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2548395223.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Ways healthcare practices benefit from online scheduling</title>
      <link>https://www.apogeemsp.com/2019/08/ways-healthcare-practices-benefit-from-online-scheduling</link>
      <description>To succeed in today’s technology-driven world, healthcare facilities now have to provide convenience alongside top-notch patient care. Online scheduling makes it easy for patients to book their medical appointments. Even if the use of smartphones, tablets, and other internet-connected devices has already permeated society, many healthcare facilities have trouble keeping up with the times. But […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      To succeed in today’s technology-driven world, healthcare facilities now have to provide convenience alongside top-notch patient care. Online scheduling makes it easy for patients to book their medical appointments. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Even if the use of smartphones, tablets, and other internet-connected devices has already permeated society, many healthcare facilities have trouble keeping up with the times. But those that have kept up with tech trends have seen an uptick in both the number of patients they take in and the quality of care they are able to provide, while facilities relying on the old ways continue to remain stagnant in both areas.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Online scheduling is one of the simplest and most popular technologies used by forward-thinking health clinics and hospitals. It allows patients to see when a doctor is available and schedule an appointment on your website. Practices that use online scheduling are able to reap the following benefits. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      More potential new patients
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Today, people are less inclined to make phone calls, especially if it involves ringing up someone they don’t know. For many people looking for a new doctor or specialist, they will simply keep looking for one that has online scheduling to avoid calling. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      More time for your staff, better care for your patients
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Think about how much time your staff spend each day answering phone calls from people making an appointment. It’s probably a lot if you have a busy practice. Online scheduling lessens phone time required so that your staff can better focus and care for patients at your facility. As a result, patients will feel truly cared for and will more likely return to the healthcare facility in the future.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Setting appointments beyond clinic hours 
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      In the past, patients had to wait for the clinic to open just to make an appointment. With online scheduling, patients can simply log in to your website and see when you are available so they can plan their schedule accordingly around their visit.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Still unsure whether you need online scheduling?
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Sure, you probably can get away with not having it at the moment, but eventually, most patients will expect this technology from you. And the sooner you roll out online scheduling, the sooner your staff will get the hang of it, and the sooner your patients can enjoy its benefits. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Need help setting up online scheduling for your practice? Talk to our IT experts today and we’ll make sure this technology will make things easier for your patients.
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/08/ways-healthcare-practices-benefit-from-online-scheduling/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/495920009.jpg" length="21797" type="image/jpeg" />
      <pubDate>Thu, 15 Aug 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/08/ways-healthcare-practices-benefit-from-online-scheduling</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/495920009.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Considerations for buying a business projector</title>
      <link>https://www.apogeemsp.com/2019/08/considerations-for-buying-a-business-projector</link>
      <description>A business projector provides you with a platform to present your case to an audience. It’s an essential tool for meetings, so it’s important that you have the right projector for your needs. Unfortunately, you might not be familiar with the various measurements and specifications of projectors. The following list will help you brush up […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      A business projector provides you with a platform to present your case to an audience. It’s an essential tool for meetings, so it’s important that you have the right projector for your needs. Unfortunately, you might not be familiar with the various measurements and specifications of projectors. The following list will help you brush up on what you should look for in a good business projector.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Brightness and light output
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      A projector cannot display bright images without enough light output. Even if you dim the lights in the room to compensate, images will appear muddy and blurred if the light output is too low. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      To find out if a projector’s lamp has the correct brightness for your needs, look for its
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="http://www.differencebetween.net/technology/difference-between-ansi-lumens-and-lumens/"&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        ANSI (American National Standards Institute) Lumens
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       rating. It will tell you how much light that particular projector can put out. Projectors that have 1,000 ANSI Lumens or more are relatively perfect for the job, but other factors like ambient light, the distance or size of the screen, and the size of the room will also impact the need for fewer or more lumens.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Connectivity options
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Some projectors in the market are more affordable because they’re only equipped with an HDMI port to connect to a TV or computer. You may have to spend more money on a projector that has multiple connectivity options, such as Wi-Fi, Bluetooth, USB, and VGA inputs. If you want more flexibility, buy a projector that is compatible with various audio and video formats as well.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Front or rear projection
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Many projectors can now be set up to project images from either the rear or the front of the screen, and can be mounted on the ceiling instead of just stationed on a table or flat surface. Front projection is the easiest to configure, and the most common set up for projectors.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Contrast ratio
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      This setting determines the variance between the darkest black and the brightest white, so the higher the contrast ratio, the clearer the images. Projectors with a good contrast ratio figures will allow you to enhance the quality of text onscreen and the depth of displayed images. For typical meeting rooms, the contrast ratio can range from 3000:1 to 20000:1. Any contrast higher than 20000:1 will intensify the presentation quality but bump up the price of the projector as well.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Resolution
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Because high-resolution images and videos are so readily available these days, you may want your projector to have 720p as a native resolution. But if you can afford the full HD models, you will have the capacity to show off a comprehensive data image on screen. The caveat here is that your resolution will depend on the specs of your source media player.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Our customers often forget to utilize one of our most useful service options: hardware consulting. If you’re ever in the market for new equipment at your organization, or need advice on how to get the most of what you currently have, don’t hesitate to ask. We’re an office full of gadget geeks who love the opportunity to talk about the latest and best that the industry has to offer. Contact us today!
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/08/considerations-for-buying-a-business-projector/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3860420132.jpg" length="20808" type="image/jpeg" />
      <pubDate>Fri, 09 Aug 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/08/considerations-for-buying-a-business-projector</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3860420132.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How the human cloud benefits SMBs</title>
      <link>https://www.apogeemsp.com/2019/08/how-the-human-cloud-benefits-smbs</link>
      <description>If the prevalent image of a startup is a couple of guys in a garage (think Amazon, Apple, Disney), the emerging picture of the workforce of the future consists of skilled talents collaborating in the cloud. Thanks to the human cloud, small- or medium-sized businesses (SMBs) nowadays can eliminate the barriers associated with traditional workspaces […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If the prevalent image of a startup is a couple of guys in a garage (think Amazon, Apple, Disney), the emerging picture of the workforce of the future consists of skilled talents collaborating in the cloud. Thanks to the human cloud, small- or medium-sized businesses (SMBs) nowadays can eliminate the barriers associated with traditional workspaces and enjoy cost-effective solutions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Foundr Magazine’s Editor-in-Chief and Publisher Nathan Chan started a ‘passion project’ that led him to interview some of the most influential entrepreneurs around the world, which he shared through his monthly digital publication.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For Mr. Chan, the launch of this successful project would not have been possible if it wasn’t for human cloud service Elance, a freelancing platform that allowed him to leverage overseas talent and build a solid team of graphic designers, audio/video editors, and writers. All tasks and projects for each issue of his magazine are run via the platform, which also conveniently processes payments for his contractors.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Just like Mr. Chan, many business owners are shifting their labor sources from local to global. According to an online survey by social project manager Wrike, close to 44% of business owners predict a rapid shift to distributed teams within their companies.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    They believe technology makes their virtual teams just as efficient as if their members were collaborating in one office. Remote collaboration via the human cloud is indeed a game-changer that benefits companies, such as startups, that are inclined to spend fewer resources to build their business infrastructure.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is the “human cloud?”

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The human cloud is a working platform where staff performs white-collar tasks from any location and on any device. Collaboration, file sharing, or discussions on projects are done in a flexible and productive manner, rewarding team members solely for their output. Although having a virtual workforce comes with a few challenges, overcoming them can yield great benefits for SMBs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Benefits of hiring on the human cloud

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Low cost
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     – The human cloud helps save time and money spent on traditional employment processes. Hiring is fast and easy; you pay for the skills you need on a transactional basis, as opposed to paying a high monthly wage on physically hired talent who may have too much idle time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      No overhead
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     – Hiring on the human cloud requires no overhead for office space, thereby enabling firms to stay lean and profit-focused. By becoming “virtual,” teams can work independently from their homes or anywhere.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Get skills on-demand
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     – Employers can contract for micro-tasks, such as copying text from business cards, to larger tasks like selling products for a fee, to even more complex projects such as software design and programming.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Global talent pool
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     – Today, even startups can be ‘multinational’, i.e., they are no longer limited by geography in finding key talent with specialized skills. A good idea can come from just about anywhere and can be performed and delivered from anywhere.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Easy collaboration
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     – Using an online platform gives SMBs the ability to manage projects through virtual workrooms. Wrike’s survey revealed that collaboration software is extremely important and even mission-critical for remote teams to work efficiently.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As more startups and SMBs become familiar (and comfortable) with the advantages of the human cloud, the future of work means that location is not the most important factor in determining who will contribute to your business’s success. A worldwide network of online contractors is now ready to serve you with the qualifications, skill sets, and shared enthusiasm you seek to turn ideas into valuable products or services.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      For more information on how to leverage cloud technologies or collaboration software, please get in touch with any of our cloud specialists.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/08/how-the-human-cloud-benefits-smbs/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3732964740.jpg" length="27745" type="image/jpeg" />
      <pubDate>Mon, 05 Aug 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/08/how-the-human-cloud-benefits-smbs</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3732964740.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>7 Video content types you should know</title>
      <link>https://www.apogeemsp.com/2019/08/7-video-content-types-you-should-know</link>
      <description>Video content can be a great addition to your post-click landing page. It’s also a nice way to get more out of your marketing campaign efforts. In fact, it has become increasingly important as customers expect brands and businesses to bo present on Facebook, Instagram, Twitter, and other social platforms. So what types of video […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Video content can be a great addition to your post-click landing page. It’s also a nice way to get more out of your marketing campaign efforts. In fact, it has become increasingly important as customers expect brands and businesses to bo present on Facebook, Instagram, Twitter, and other social platforms. So what types of video content can you use to drive engagement?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Business introduction/Behind-the-scenes

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your company lacks an online presence, one of the best things you can do is give customers direct access to your staff and your product. Take your viewers on an office tour and show them how a product is made, or even broadcast your business’s launch event.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Make sure to invite as many viewers as you can, but remember most live broadcasts can be saved and viewed later. You’ll likely want to keep the video available after it’s finished.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  News and trending topics

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Current and live events are great not only because they’re fresh but they also give your audience something to share.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Facebook Live and Instagram stories allow people and businesses to share recent information, trending news, and other relevant stories. For example, a live coverage of your cooking show would allow you to engage your viewers by inviting them to participate in a live Q &amp;amp; A activity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These features could instantly reach millions of viewers in a span of a few seconds.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ask me anything (AMA)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Depending on your product or service, you may be getting a lot of conceptual questions about innovative ways to use it, what direction the company is heading, and so forth. There’s no better way to address these questions than to do so in a personal and unscripted AMA segment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If there’s a good turnout, make sure to keep questions and answers moving in relevant and interesting directions. There’s nothing wrong with updating everyone on what you had for breakfast, but addressing service bugs or product feature requests is going to be a lot more beneficial for wider audiences.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How-tos

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether it’s a soon-to-be-released product or a simple rehash of an existing one that’s getting lots of support requests, there’s no better way to guide customers than thorough how-to videos.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not only do these show existing clients the best way to use your product or service, it also allows potential customers to see both your product and your customer service philosophy in action. Saving these videos can be invaluable as you continue to get questions on the product or service outlined in these videos — it’s an easy way to build a video reference library for sales and support.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Webinars

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Webinars are events held on the internet and are attended by an online audience. They allow for online participation thanks to audio and video feeds.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In addition to video images, presentation slides can be broadcast and run in sync with the rest of the presentation. You can also make use of the screen capture functionality to show your viewers an application or website. Webinars also offer various interactive opportunities such as chat, polls, surveys, and tests,
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Live broadcast announcements

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether on Twitter or Facebook, post live broadcast updates about an upcoming product or service to make your announcement far more interesting and personal than a press release or faceless status update.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Text-based announcements and pre-recorded videos severely limit how you address the "fine print" questions from customers. Think of live broadcasts as a chance to hold your own personal press briefing and address questions after your scripted announcement.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Social media reports that Facebook users spend three times longer watching live broadcasts than pre-recorded video. Combine that with Facebook’s announcement that live videos are more likely to be promoted to the top of news feeds and you’d be crazy not to utilize live broadcasts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are a handful of different services to use for live video broadcasting and deciding which one is the best for you can depend on a lot of different variables.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Promotional videos

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Use social media to promise a special promotion to anyone who tunes in to a live broadcast. Your promotional videos should portray your business in a positive light and make people want to buy from you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many companies use influencers nowadays to attract more people. This is a quick way to gain the attention of potential customers, especially those who are hearing about your product or service for the first time. A familiar face is almost always a quick way to earn someone’s trust.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Remember that promotional videos should be straight to the point and should last no longer than 10 to 15 minutes at most.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Call us with any of your questions and we’ll be happy to assist you in adding value to your business with today’s best live video services.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/08/7-video-content-types-you-should-know/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/571655104.jpg" length="20143" type="image/jpeg" />
      <pubDate>Fri, 02 Aug 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/08/7-video-content-types-you-should-know</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/571655104.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Tips and tricks to prevent watering hole attacks</title>
      <link>https://www.apogeemsp.com/2019/07/tips-and-tricks-to-prevent-watering-hole-attacks</link>
      <description>Hackers are getting creative nowadays with their illicit activities, which means the onus is on computer users to take steps to protect their computers. The first step to staying ahead of the game is by learning more about cyberattacks. Here are some pointers to help you deal with oneway criminals steal data: watering hole attacks. […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Hackers are getting creative nowadays with their illicit activities, which means the onus is on computer users to take steps to protect their computers. The first step to staying ahead of the game is by learning more about cyberattacks. Here are some pointers to help you deal with oneway criminals steal data: watering hole attacks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What are watering hole attacks?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Watering hole attacks are used to distribute malware onto victims’ computers in a similar way phishing activities are conducted. Cybercriminals infect popular websites with malware, and anyone who has had the misfortune to visit have their computers automatically loaded with malware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The malware used in these attacks usually collects the target’s personal information and sends it back to the hacker’s server. In extreme cases, the hacker will actively take control of the infected computer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But how does a hacker choose which websites to hack? With internet tracking tools, hackers find out which websites companies and individual users visit the most. They then attempt to find vulnerabilities in those websites and embed them with malicious software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With such highly skilled hackers these days, virtually any website can fall victim to a watering hole attack. In fact, even high-profile websites like Twitter, Microsoft, Facebook, and Apple were compromised in 2013.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can protect yourself by following these tips:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Update your software
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Watering hole attacks often exploit holes and vulnerabilities to infiltrate your computer, so by updating your software and browsers regularly, you can significantly reduce the risk of an attack. Make it a habit to check the software developer’s website for any security patches. Or better yet, hire a managed IT services provider to keep your system up to date.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Watch your network closely
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Regularly conduct security checks using your network security tools to try and detect watering hole attacks. For example, intrusion prevention systems allow you to detect suspicious and malicious network activities. Meanwhile, bandwidth management software will enable you to observe user behavior and detect abnormalities that could indicate an attack, such as large transfers of information or a high number of downloads.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Hide your online activities
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Cybercriminals can create more effective watering hole attacks if they compromise websites only you and your employees frequent. As such, you should hide your online activities with a VPN and your browser’s private browsing feature. Also, block social media sites from your office network, as these are often used as share points of links to infected sites.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    At the end of the day, the best protection is staying informed. As cyberthreats continue to evolve, you must always be vigilant and aware of the newest threats. Tune in to our blog to find out about the latest developments in security and to get more tips on how to keep your business safe.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/tips-and-tricks-to-prevent-watering-hole-attacks/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2802795336.jpg" length="16339" type="image/jpeg" />
      <pubDate>Tue, 30 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/tips-and-tricks-to-prevent-watering-hole-attacks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2802795336.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How does telemedicine help patients?</title>
      <link>https://www.apogeemsp.com/2019/07/how-does-telemedicine-help-patients</link>
      <description>Telemedicine means exactly as it sounds — a medical service delivered via telephone or any communications platform. It sounds like a new development in medicine, but it’s really not. While most people still prefer to go to the hospital to receive treatment, the many advancements in telemedicine are beginning to change this. Making telemedicine work […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Telemedicine means exactly as it sounds — a medical service delivered via telephone or any communications platform. It sounds like a new development in medicine, but it’s really not. While most people still prefer to go to the hospital to receive treatment, the many advancements in telemedicine are beginning to change this.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Making telemedicine work

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A key element in making telemedicine work is technology, which comprises of video-teleconferencing equipment, a fast and stable internet connection, and advanced telemedicine software. These elements are indispensable because this special type of medical practice requires highly visual interactions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Healthcare businesses and individual medical practices with telemedical capability also need to comply with the regulations of the Health Insurance Portability and Accountability Act (HIPAA), the Health Information Technology for Economic and Clinical Health Act (HITECH), and other healthcare legislation. Mostly, these regulations involve compliance with the handling and storage of personally identifiable patient data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To make telemedicine effective, healthcare providers need to exert as much effort in following the same rules as a traditional medical practice. But is it truly worth considering?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Benefits of telemedicine

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Telemedicine is not meant to take over conventional medical care, as the technology supplements it instead. Patients can expect an expansion of this practice among many medical providers, while healthcare providers can expect rapid growth in telemedicine technology, especially as healthcare compliance requirements evolve.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We stand at the forefront of technological innovations that will continue to define an industry as dynamic as healthcare. If you need industry-based knowledge, contact us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/how-does-telemedicine-help-patients-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3959788253.jpg" length="28112" type="image/jpeg" />
      <pubDate>Wed, 24 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/how-does-telemedicine-help-patients</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3959788253.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The ideal keyboard setup</title>
      <link>https://www.apogeemsp.com/2019/07/the-ideal-keyboard-setup</link>
      <description>Think of your keyboard as your lover: you spend time with it, caress it, and you sometimes fight with it. But when your keyboard starts to age, you could have a hard time typing even simple words or executing basic commands. They say the greatest expression of love is to let go, so love yourself […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Think of your keyboard as your lover: you spend time with it, caress it, and you sometimes fight with it. But when your keyboard starts to age, you could have a hard time typing even simple words or executing basic commands. They say the greatest expression of love is to let go, so love yourself and let go of your old keyboard. Look for the following when you buy a new one.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Connectivity

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If your computer mouse can go wireless, why can’t your keyboard too? But it will depend on what exactly you use the keyboard for. Keyboards are normally plug-and-play devices that don’t require additional software installation (excluding certain gaming models).; Wired models draw power from a USB connection, eliminating the use of batteries. Gamers tend to prefer wired over wireless because they won’t have to deal with lag and interference issues.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you want to declutter, then wireless is the way to go. With this type of keyboard, data is transmitted to your PC either through 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      a radio frequency
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       connection to a USB receiver or via Bluetooth. Wireless models have their pros and cons, but they reduce the number of cables on your desk and give you more flexibility. You can lie on the couch and type from across the room. Also, most models connect to the PC via a 2.4-GHz wireless dongle that can also be used for cordless phones and Wi-Fi, providing connectivity to multiple devices at once.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The right type of key switches

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      This aspect of keyboard design is widely mentioned in reviews, yet many people overlook the importance of the type of switches used for individual keys. Although the intricate mechanisms that hide beneath the keys may not excite you, the difference you feel from each type will. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      The three main types of key switches include silicone dome, scissor, and mechanical switches. Keyboards that come with a new desktop PC generally use silicone-dome switches, whereby two dimpled layers of silicone membrane form a grid of rubber bubbles that acts as the switch for each key. This requires you to press the key hard to type a letter, gradually diminishing its springiness and responsiveness over time.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      The newer laptops and ultrabooks use scissor switches which have a mechanical stabilizer for uniformity. Moreover, under each keycap is a plunger that allows for shorter key travel. This causes scissor switch keyboards to have a shallow typing feel, making them more durable than silicone dome switches.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      What keyboard enthusiasts can’t get enough of are mechanical switch keyboards. Their advantages lie in the spring-loaded sliding keypost beneath each key. Several variations are available with slightly different sensations or sounds. Mechanical switches generally provide enhanced tactile feedback and have a  clicking sound. Thanks to their sturdy switch mechanisms and durable springs, these keyboards last longer and can easily be repaired.. Furthermore, each keystroke registers quickly, making them ideal for touch typists.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ergonomics

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      To keep carpal tunnel syndrome and repetitive stress injury at bay, keyboards are designed to keep your hands in a neutral position while typing. Not only do ergonomic keyboards provide greater comfort, but they also reduce joint and tendon stress. This prevents inflammation and pricey surgical procedures. Ergonomic features range from simple padded wrist-rests to elaborate curved and sloped keyboards.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      It won’t take long to examine your current keyboard and see how well it works.  Do not settle for anything but the best. If you need help finding the right keyboard,  email or drop us a line. We’re more than happy to hear from you.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/the-ideal-keyboard-setup/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2743016322.jpg" length="25952" type="image/jpeg" />
      <pubDate>Tue, 23 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/the-ideal-keyboard-setup</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2743016322.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Web hosting defined</title>
      <link>https://www.apogeemsp.com/2019/07/web-hosting-defined</link>
      <description>Every business, regardless of size and industry, needs to have an online presence these days. To publish your own website, you’ll need a web host. Here’s a quick overview of what a web host is and the two most common types of hosting. What is a web host? A web host sells or leases memory […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every business, regardless of size and industry, needs to have an online presence these days. To publish your own website, you’ll need a web host. Here’s a quick overview of what a web host is and the two most common types of hosting.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      What is a web host?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
A web host sells or leases memory space on its servers so your website can have a virtual location on the internet. Their services include online storage for all of your site’s files and web pages.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many web hosts also offer domain name hosting, which creates a web address that users can type to access your website (e.g. google.com, inc.com, etc.). Combine these two hosting services and you have the main foundations for your website.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also get domain-based email addresses (e.g. ryan@google.com) and website databases from web hosts. Essentially, your web host can store everything your website needs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you sign up with a web host, you will usually pay a monthly fee, which the company uses to maintain and invest in new servers for hosting, increase access speeds, and provide better services.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      What are the two most common types of web hosting?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
There are hundreds, if not thousands of web hosts around the world, but they usually fall in one of two categories:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Which hosting type is best for my business website?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Most websites use shared hosting because it’s more affordable while still offering generally stable access and access speeds. This is the ideal hosting type for most small- and medium-sized businesses (SMBs) with fairly simple websites.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your website is going to be large (e.g. thousands of pages) and you are going to host complex features like advanced eCommerce, streaming, etc., then it would be best to opt for a dedicated hosting service. Examples of large sites include Google, Amazon, and government sites, among others.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With numerous web hosts out there, selecting the right fit can be quite challenging. But with our IT expertise and solutions, we can help you find the web host that will work best for your business needs. Contact us today to get started with your online presence.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/web-hosting-defined/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1924789630.jpg" length="35389" type="image/jpeg" />
      <pubDate>Thu, 18 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/web-hosting-defined</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1924789630.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Use data analytics to manage backups</title>
      <link>https://www.apogeemsp.com/2019/07/use-data-analytics-to-manage-backups</link>
      <description>The amount of data that the average business manages is unprecedented. And with that shift comes an unavoidable challenge: Deciding which files and records are most important to business continuity. However, with a little creative thinking and implementation, you can ensure the security of your most critical data. An excess of information Nowadays, too much […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The amount of data that the average business manages is unprecedented. And with that shift comes an unavoidable challenge: Deciding which files and records are most important to business continuity. However, with a little creative thinking and implementation, you can ensure the security of your most critical data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  An excess of information

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Nowadays, too much data may sound like a good thing. But for many organizations, creating backups in real-time isn’t economical. So if you’ve wondered how you should structure your backup plan to prioritize the critical files, we have an answer: Analytics tools.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Analyzing vast amounts of data quickly and affordably has never been easier for small- and medium-sized businesses (SMBs). The key is working with experienced IT professionals to customize a solution to meet your needs. As an MSP (managed IT services provider), we’ve spent years designing business continuity and disaster recovery plans, often for SMBs that couldn’t create backups every hour.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  A smarter solution

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Depending on your needs, we can set up sophisticated analytics tools that determine what is most essential to your business’s day-to-day operations. These solutions prioritize data in order of importance and translate that to a backup structure that ensures the right data is safe and sound should disaster strike.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These tools integrate with your existing data-backup solution but provide it with a map of what to save first, and what to leave for later. That results in faster recovery times in the event of untimely outages or disruptions. Furthermore, using analytics increases efficiency and decreases overall backup costs by providing a better picture of what is unimportant versus what is unnecessary.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    SMBs have been the drivers of innovation for decades because, as they say, “necessity is the mother of invention.” So whether you’re interested in top-of-the-line IT solutions or just need to get a better handle on disaster recovery, we’re ready to create a customized backup solution, just for you. Take a second to analyze that, then give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/use-data-analytics-to-manage-backups/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/636132662.jpg" length="37055" type="image/jpeg" />
      <pubDate>Wed, 17 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/use-data-analytics-to-manage-backups</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/636132662.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Distributed spam distraction used for illegal activities</title>
      <link>https://www.apogeemsp.com/2019/07/distributed-spam-distraction-used-for-illegal-activities</link>
      <description>Usually, when victims find out their account has been hacked or hijacked, serious damage has already been done. But there’s a new illegal activity that cybercriminals are employing — and it’s done in plain sight. Distributed spam distraction involves sending thousands of spam email, and they do more than cause distractions. Understanding DSD Distributed spam […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Usually, when victims find out their account has been hacked or hijacked, serious damage has already been done. But there’s a new illegal activity that cybercriminals are employing — and it’s done in plain sight. Distributed spam distraction involves sending thousands of spam email, and they do more than cause distractions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Understanding DSD
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Distributed spam distraction (DSD) is designed to inundate your inbox with thousands of nonsensical email. There are no dangerous links, ads, or attachments involved, just random excerpts of text stolen from books and websites. What’s worse, the email and IP addresses used are all different, so victims can’t simply block a specific sender.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These attacks last anywhere from 12 to 24 hours and can flood inboxes with as many as 60,000 messages. While they may seem like harmless annoyances, the true purpose of DSD is to draw victims’ attention away from what hackers are doing behind the scenes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    And what hackers are doing is exploiting your personally identifiable information (PII) to make unauthorized purchases or pilfer cash directly from your accounts. The DSD acts as a sort of smokescreen to hide payment confirmation messages behind a deluge of spam messages.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      New tactics
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Over the years, hackers have developed new tactics involving DSD. Several reports have shown that, instead of nonsensical emails, hackers are using automated software to have their targets sign up for thousands of free accounts and newsletters to distract them with authentic messages. This allows DSD blasts to slip past spam filters that have been designed to weed out malicious code and gibberish text used by traditional DSD attacks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What’s even more worrying is that any ill-intentioned individual can go on the dark web and pay for DSD services. They just have to provide a hacker with their target’s name, email address, and credit card numbers — all of which can also be purchased on the dark web — and pay as little as $40 to send 20,000 spam messages.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      How to stop it
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
DSD is a clear sign that your account has been hijacked, so whenever you receive dozens of emails in quick succession, contact your bank to cancel any unfamiliar transactions and change your login credentials as soon as possible. It’s also important to update your anti-spam software (or get one if you still don’t have one) to protect your inbox from future DSD attacks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Hackers only initiate DSD attacks after they’ve obtained their target’s email address and personal information, so make sure your accounts and identity are well protected. You should regularly change your passwords and pins, enable multifactor authentication, set up text alerts for whenever online purchases are made in your name, and be careful about sharing personal information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For more tips on how to deal with DSD attacks and other cyberattacks, call us today. We offer powerful tools and expert advice that will ensure your business’s safety.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/distributed-spam-distraction-used-for-illegal-activities/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3266349078.jpg" length="61460" type="image/jpeg" />
      <pubDate>Mon, 15 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/distributed-spam-distraction-used-for-illegal-activities</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3266349078.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Ask these 3 questions about your servers</title>
      <link>https://www.apogeemsp.com/2019/07/ask-these-3-questions-about-your-servers</link>
      <description>While you’re still alive and kicking, your heart should never skip a beat. It’s the same with your servers. They’re always working, ensuring your business stays operational even if you don’t pay attention to them. However, business owners tend to overlook their servers as most times it is a simple case of being out of […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While you’re still alive and kicking, your heart should never skip a beat. It’s the same with your servers. They’re always working, ensuring your business stays operational even if you don’t pay attention to them. However, business owners tend to overlook their servers as most times it is a simple case of being out of sight, out of mind. This is a dangerous way of thinking because once your servers go down, you could start losing money and maybe even go under. Even if your servers seem to be running smoothly, do yourself a favor and consider these three questions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      When do my servers need to be replaced?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      This is a difficult question, but there are two factors you will want to consider — age and performance. The useful life of a server is around three years. While it’s not unheard of for servers to function properly beyond year three, relying on them beyond this point can be risky as hardware problems occur more often. This means you will have to deal with costly repairs and possible unpredictable downtime.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Performance is another factor to consider. Even if your servers are only a year old, it doesn’t make sense to keep them around until year three if they are slow and too costly to maintain. It’s important to do a cost-benefit analysis in these situations and look at how much money you will lose in repairs and downtime and then compare it to the cost of buying new hardware.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Do I have an alternative to buying new servers?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Believe it or not, the answer to your server problems might not necessarily be purchasing more physical hardware. One way to avoid this is by embracing virtualization. This process allows your servers to be stored and maintained off-site with everything being delivered to your office via the internet. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      There are two notable benefits of virtualizing your servers. First, you don’t have to spend a ton of money on new equipment. Second, virtualization is a scalable technology, meaning you only pay for the data capacity you use. For instance, if you only need two and a half servers, you can do that. This is in contrast to having physical equipment which would require your business to either make do with two servers or splurge and buy the third one even if you didn’t need all of that space.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Of course there are a few things you need to consider before making the switch to server virtualization. One of the biggest issues is security. Ask yourself if you feel comfortable keeping all of your data off-site. While this isn’t a concern for some companies, others may not see this as palatable. There are several workarounds to this issue, including the hybrid option where you keep sensitive data on-site and everything else off-site.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Can I do anything to prevent a full-scale server replacement?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Yes. It’s certainly possible for you to buy some time and give your current servers additional life, but these are short-term fixes, not long-term solutions. Server upgrades are a good place to start if your servers are less than three years old but are degrading in performance. Installing additional CPUs or memory may increase server performance at a fraction of the cost of buying new servers.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      You can also utilize old servers for non-critical workloads. It’s possible to extend the life of servers that may have four or five years of wear-and-tear on them via repurposing. Instead of swapping out all of your servers, use the old ones for non-critical processes and purchase new ones to handle critical workloads. This will help you get a better ROI on your technology while avoiding a wholesale hardware purchase which could cripple your budget.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you have any questions about your servers and how you can increase their performance, get in touch with us today. We can help you procure new hardware or show you the benefits of virtualization.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/ask-these-3-questions-about-your-servers-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3097614435.jpg" length="41977" type="image/jpeg" />
      <pubDate>Mon, 08 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/ask-these-3-questions-about-your-servers</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3097614435.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How to make your WordPress website load faster</title>
      <link>https://www.apogeemsp.com/2019/07/how-to-make-your-wordpress-website-load-faster</link>
      <description>Whether it’s food delivery or commute, speed matters. And when it comes to website loading time, this principle couldn’t be more true. Twenty-first-century internet surfers expect a site to load in at least one or two seconds. So how does your WordPress site measure up? If you’re looking for ways to increase your site’s speed […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Whether it’s food delivery or commute, speed matters. And when it comes to website loading time, this principle couldn’t be more true. Twenty-first-century internet surfers expect a site to load in at least one or two seconds. So how does your WordPress site measure up? If you’re looking for ways to increase your site’s speed and reduce your bounce rates, here are some tips that can help.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Keep WordPress and plugins up to date

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While you may already know that updating WordPress and plugins will keep your website secure, you may not know that doing this also increases your site’s speed. So if you want a fast site, install those updates as soon as they become available.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Choose a host wisely

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your host can make or break your website, so before you select your host, do some research on the various options out there, particularly on their website speed and uptime.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Also, while your first impulse may be to choose shared hosting because of its low cost, be aware that it’s also going to be your slowest option in terms of speed because many websites are simultaneously relying on the same server for bandwidth.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If it’s not an option for small- or medium-sized businesses (SMBs) to use a dedicated server because of cost restrictions, their best alternative in the middle price and performance range is a virtual private server (VPS). This acts like a dedicated server in terms of functionality, but still technically uses a shared server. Regardless, using a VPS will give you a boost in speed over typical shared hosting.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Keep your site lean

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The leaner your site is, the faster its speed will be. To create a lean site, be mindful of these four aspects:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Mind your plugins

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You should stick to only the essential plugins to speed up your site. Cache plugins like W3 Total Cache and WP Super Cache can provide more speed by caching every aspect of your site and reducing its download times. Another helpful plugin is Lazy Load. It speeds up your site by loading the elements at the top of the website first, where viewers are looking when they first visit your site. Before installing the Lazy Load plugin, check your Theme Options to see if you already have it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Create redirects sparingly

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If a page on your site needs to be redirected to another page, it can really slow down your site so it’s best to use them as little as possible. And to ensure you aren’t using any unnecessary links without knowing it, use the 
    
  
  
                    &#xD;
    &lt;a href="https://varvy.com/tools/redirects/" target="_blank"&gt;&#xD;
      
                      
    
    
      Redirect mapper tool
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     or similar alternatives that help you find redirects you don’t need.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you implement some or all of the speed tips above, you’re sure to see a noticeable difference in the speed of your site. Do you need more tips to optimize your website? Do you need help with web or IT matters? We’re just a phone call away.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/how-to-make-your-wordpress-website-load-faster/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1498126337.jpg" length="35072" type="image/jpeg" />
      <pubDate>Tue, 02 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/how-to-make-your-wordpress-website-load-faster</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1498126337.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Three types of business dashboards</title>
      <link>https://www.apogeemsp.com/2019/07/three-types-of-business-dashboards</link>
      <description>Dashboards allow you to better understand your customers and easily make informed business decisions. But with many types of dashboards out there, each serving a unique purpose, how do you determine which one is best for your company? We’ve listed three types of the most widely used dashboards below. Strategic dashboards Ideal for senior managers […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Dashboards allow you to better understand your customers and easily make informed business decisions. But with many types of dashboards out there, each serving a unique purpose, how do you determine which one is best for your company? We’ve listed three types of the most widely used dashboards below.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Strategic dashboards

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Ideal for senior managers and executives, strategic dashboards are designed to help identify potential opportunities for business expansion and improvement. This type of dashboard gives a bird’s-eye view of your business and track performance metrics against enterprise-wide strategic goals.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    They summarize performance over set time frames: past month, quarter, or year. They can contain anything from overall sales numbers to sales and revenue comparisons to inventory levels, making it easy for executives to understand the overall health of the organization and monitor the long-term company strategy.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Operational dashboards

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Business owners use operational dashboards to monitor and measure in real time the effectiveness and efficiency of their employees’ progress in relation to their targets. Since these dashboards focus on tracking operational processes, they are often more detailed than strategic dashboards and are usually viewed by junior levels of management multiple times throughout the day.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    They are also commonly found in departments that need to respond to critical information quickly, such as marketing and operations. They help departments stay proactive and ahead of problems. For example, marketing teams can use this type of dashboard to monitor their campaign’s metrics such as cost per acquisition, total number of clicks, total acquisitions gained, and the total amount spent. Any significant changes would immediately alert the team. The operations team of manufacturing firms, on the other hand, may use this to track products manufactured, number of defects, complaints, and returns. They are then alerted right away when performance falls below targets.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Analytical dashboards

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to creating and implementing strong business strategies, understanding the trends and events in your data is crucial. Analytical dashboards use volumes of data collected over time so you could compare current against historic data, enjoy in-depth analysis, identify patterns and opportunities, and determine why processes are working in certain departments. These dashboards present complex data, utilizing complex models and what-if statements, so they are commonly just used by staff with advanced training such as business analysts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How do I know which dashboard to choose?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To help you choose which dashboard best suits your needs, you can ask yourself the following questions:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      #1. What business problems are we trying to solve?
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      #2. Who will be using the dashboards?
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      #3. What are our goals?
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Dashboards concentrate all data, metrics, and parameters in one place, bringing a totally new dimension to business intelligence. Your company can significantly benefit from the right dashboard. If you’re looking to implement dashboards for the first time or to enhance the functionality of your current dashboard, get in touch with us today.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/07/three-types-of-business-dashboards-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4019557087.jpg" length="46503" type="image/jpeg" />
      <pubDate>Mon, 01 Jul 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/07/three-types-of-business-dashboards</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4019557087.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Tips for securing your email account</title>
      <link>https://www.apogeemsp.com/2019/06/5-tips-for-securing-your-email-account</link>
      <description>Email is one of the best things the internet has made possible. We use email to signup for websites, apply for jobs, make payments, and many more. But email users also run the risk of account hijacking, malware attacks, and other cyberthreats. To secure your emails, follow these crucial tips. Use separate email accounts Most […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Email is one of the best things the internet has made possible. We use email to signup for websites, apply for jobs, make payments, and many more. But email users also run the risk of account hijacking, malware attacks, and other cyberthreats. To secure your emails, follow these crucial tips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use separate email accounts

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most people use a single email account for all their personal needs. As a result, information from websites, newsletters, shopping deals, and messages from work get sent to this one inbox. But what happens when someone breaks into it? There’s a good chance they would be able to gain access to everything else.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Having at least two separate email accounts will not only boost your security, but will also increase your productivity. You can have a personal account to communicate with your friends and family, while another is used solely for work-related communications.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Set strong passwords

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Too many email accounts have predictable passwords. You might be surprised to learn that email passwords like “123456,” “qwerty,” and “password” are still the most common around. For the sake of security, set longer passwords (or passphrases) that contain a good mix of upper- and lowercase letters, numbers, and special characters. Make sure these passwords are unique to that account to keep all your other password-protected accounts safe.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You should also consider enabling multifactor authentication (MFA). This creates an extra layer of security by requesting for another method to verify your identity like a fingerprint scan or a temporary activation code sent to your mobile phone.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Beware of email scams

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you see a link in an email, don’t click on it unless you’ve assessed its authenticity. You never know where those links might lead you. Sometimes they can be safe, but other times they can infect your computer with malware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you’re expecting a file from your friend or family, then go ahead and open the attachment. It’s always good to know the person sending the file. But be wary of attachments in emails from strangers. Even if the file name looks like a JPEG image, you should never open it. Attached files may seem harmless, but they may actually be a malicious program ready to latch itself onto your computer the moment you click on it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These types of attacks are known as phishing and they can be remarkably clever. For example, cybercriminals may masquerade as high-profile companies like Amazon, Facebook, or the Bank of America to catch their victims off guard. They might even create a sense of urgency by claiming that there’s an issue with your account, and that you should send them information or click on a dangerous link to “confirm” your personal details. Even if there was a genuine issue with your account, these companies would never ask something so suspicious over email. If you get these messages, contact the company directly through a verified website or phone number — not the contact details on the email.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Monitor account activity

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Periodically watch over your account activity. Make sure to limit access privileges to apps if you want to ensure maximum privacy and security. Also, check for any suspicious activities in your logs like unusual devices and IP addresses that have accessed your account. This indicates that hackers may have successfully broken into your account. If this is the case, sign out of all web sessions and change your password as soon as possible.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Encrypt emails and update your software

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Email encryption ensures that any message you send won’t be intercepted and viewed by unauthorized users. Meanwhile, installing the latest updates for your anti-malware, firewalls, and email security software filters potential email scams and fixes any vulnerabilities hackers can exploit.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Protecting your email accounts from various threats can be a daunting process, but with the right support, it should be effortless. Talk to us today for all your cybersecurity needs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/06/5-tips-for-securing-your-email-account/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4199890658.jpg" length="50193" type="image/jpeg" />
      <pubDate>Thu, 27 Jun 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/06/5-tips-for-securing-your-email-account</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4199890658.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Here’s what to look for in apps or wearable tech</title>
      <link>https://www.apogeemsp.com/2019/06/heres-what-to-look-for-in-apps-or-wearable-tech</link>
      <description>Are you overwhelmed by the many choices you have in getting the right technology to monitor your health? Do you download an app on your mobile to track your pulse rate? Or buy a wearable device that can tell you more about your health? While it’s best to leave the professional recommendations to your healthcare […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Are you overwhelmed by the many choices you have in getting the right technology to monitor your health? Do you download an app on your mobile to track your pulse rate? Or buy a wearable device that can tell you more about your health? While it’s best to leave the professional recommendations to your healthcare provider, it would be great if you’re also in the know, so you have a better idea of what suits you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A growing number of patients are quizzing their doctors about which healthcare apps and wearable technology they should be using. With the popularity and prevalence of both technologies set to increase over the coming years, doctors are going to have to decide if these will be something they’ll recommend to their patients. It can be a tough decision, but here are a few of the issues one needs to take into consideration before making a choice.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What devices/operating systems do you feel comfortable with?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The sudden expansion of the mobile apps and wearable technology market left many healthcare professionals out of the loop. A lot of doctors are apprehensive about making recommendations without knowing the ins and outs of how something works, and this is why many of them are avoiding this subject with their patients.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To solve this dilemma, choose the operating system you prefer to use. If you use an iPhone, then download and test apps for iOS, not Android. It should be the same with wearable devices. Take a few out for a test drive and learn more about them. It’s also possible to have your technology provider arrange a demonstration of these devices and explain how they work. This way, you have a general idea of what they can do.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Figure out the scope of your recommendations

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One thing doctors notice when exploring the world of health apps and wearable technology is just how massive and varied it can be. If you’re a specialist, it will be much easier to figure out which one to recommend to patients, but if you’re a general health practitioner who covers a broader range of medicine, you might find yourself lost in a wide world of technology choices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to wearable technology, it is a little easier to figure out the items patients will be interested in. However, when it comes to health apps, you need to be on your toes. Because their scope varies wildly from nutrition and medicine reminders to heart health and stroke prevention, you are going to want to focus your recommendations on the areas you feel comfortable with.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Talk to your patients

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A lot of doctors don’t speak with their patients about what mobile health apps or wearable technology they use or are thinking about using. But by talking to them, doctors will get a better idea of what their patients want from this technology. It also makes it easier for doctors to figure out what technologies they should be focusing on.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ask a tech expert

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Just because a particular piece of technology works great for you doesn’t mean your patients will have the same experience with it. There are a lot of factors involved when it comes to wearable technology and mobile apps, and learning more about these will be important to you and your patients. Tech experts, like those on our staff, can properly assess technology in terms of security and other issues. There’s nothing worse than recommending a technology that contains viruses or other problems for your patients.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to recommend specific technology to your patients, get in touch with us first. We’ll make sure your picks have a clean bill of health.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/06/heres-what-to-look-for-in-apps-or-wearable-tech/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2583113654.jpg" length="24656" type="image/jpeg" />
      <pubDate>Wed, 26 Jun 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/06/heres-what-to-look-for-in-apps-or-wearable-tech</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2583113654.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cooling tips for an overheating laptop</title>
      <link>https://www.apogeemsp.com/2019/06/cooling-tips-for-an-overheating-laptop</link>
      <description>Aside from coffee spills, the greatest threat for your laptop is overheating. This can cause hardware failure and permanent damage to your device. To improve the performance and increase the lifespan of your device, follow these tips. Causes of overheating Laptops generate heat when in use. That’s why they have internal fans that blow out […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Aside from coffee spills, the greatest threat for your laptop is overheating. This can cause hardware failure and permanent damage to your device. To improve the performance and increase the lifespan of your device, follow these tips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Causes of overheating

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Laptops generate heat when in use. That’s why they have internal fans that blow out hot air and suck in cooler air. So when your laptop keeps shutting down or suffers some serious slowdowns, chances are it’s overheating.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Some causes of overheating are:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Damaged or malfunctioning fans are due to dirt and grime clogging up the fan, preventing it from rotating properly.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Blocked air vents prevents air from flowing into the laptop.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Old laptop battery rely on lithium, a chemical that naturally decays over time; as the battery gets older, it becomes less efficient and generates more heat
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Running too many software programs in the background can cause your processor and fans to go on overdrive.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Bad habits when using your laptop, such as using uneven or soft surfaces as padding, can block the air vents, leading to overheating.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What to do if your laptop’s overheating

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your laptop starts overheating, the first thing you should do is turn your laptop off and check if the fan is damaged in any way. This can slow down its rotation. Next, inspect the vents and fan for any dirt, grime, or other possible causes of blockage.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Also, check how many software programs or apps run immediately after switching your laptop on. If your laptop is overheating or shutting down after a while, you may have to disable applications on startup.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Keeping it cool

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Always make sure that there’s adequate airflow when you’re using your laptop. Avoid using your laptop in bed or on a carpet. And never use pillows as padding as they can block the air vents of your laptop. Better yet, invest in a cooling pad. They lift your laptop and have built-in fans that facilitate better airflow.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Other ways to avoid overheating are limiting the number of programs that run when you start your laptop, changing your settings to power save mode, and shutting down your laptop when you’re not using it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Users often take their laptops for granted because they’re built as plug-and-play devices. However, with a little extra care and attention, your laptops can last longer. If you want to prolong the lifespan of your hardware, call our experts today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/06/cooling-tips-for-an-overheating-laptop/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3820407765.jpg" length="32385" type="image/jpeg" />
      <pubDate>Thu, 20 Jun 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/06/cooling-tips-for-an-overheating-laptop</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3820407765.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What are the top 5 benefits of a cloud ERP?</title>
      <link>https://www.apogeemsp.com/2019/06/what-are-the-top-5-benefits-of-a-cloud-erp</link>
      <description>As more and more solutions are made available on the cloud, more and more businesses are flocking to use them. One increasingly popular solution is cloud-based enterprise resource planning (ERP). If you want to integrate your systems using an ERP, then you should seriously consider a cloud-based ERP. Define: Cloud-based ERP ERP is management software, […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As more and more solutions are made available on the cloud, more and more businesses are flocking to use them. One increasingly popular solution is cloud-based enterprise resource planning (ERP). If you want to integrate your systems using an ERP, then you should seriously consider a cloud-based ERP.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Define: Cloud-based ERP

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    ERP is management software, usually offered as a bundle of applications, that aims to help businesses automate the collection, storage, management, and interpretation of data from various sources like accounting, inventory, marketing, service delivery, etc. With ERP, business owners and managers can get an integrated real-time view of business processes, resources, and commitments.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud-based ERP solutions are simply a suite of ERP apps delivered to users over the Internet, usually accessed via a browser. The software usually does not need to be installed on computers and is offered on a per-user, per-month, flat-rate fee.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Companies using a cloud-based integrated ERP solution have experienced the following five benefits:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  1. Increased ERP performance

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One issue with in-house ERP solutions is that they require proper set up and maintenance to function at their most efficient. If all that is done poorly, then performance suffers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With cloud-based solutions, the provider takes care of hosting the solution. You know that experts are the ones maintaining the system, so you’re assured that your ERP should perform at its peak performance.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  2. Decreased operating costs

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    An in-house ERP solution requires the purchase of the software, its related licenses, and the hardware to support it. Plus you need to hire staff to install and maintain it. All that will drive up the overall IT budget, something most SMBs cannot immediately afford.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But with a cloud-based ERP, you normally only have to pay a flat-rate monthly fee, so the total cost of implementation will likely be far lower. Many providers can also manage the solution for you. This will even out your operating costs, and if implemented correctly, will result in an overall decrease in expenses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  3. Enhanced access to information

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Companies that don't have any ERP will likely struggle to find the information they need, when they need it. ERPs can help consolidate the relevant information in a more effective manner than, say, spreadsheets.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    And since cloud-based ERP solutions are accessible via the Internet, you now have access to your information from anywhere with an Internet connection.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  4. Increased security

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    ERP systems process critical business information, so you will want to keep your data secure from outside sources and unauthorized users within your organization.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To keep your data safe from unauthorized outside sources, cloud-based ERP solutions offer enhanced security measures that protect your data when it is at rest and when it moves from your systems to the host servers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    And for internal data security, users will need an assigned account to access your ERP systems. This gives you control over who is given an account or not. Furthermore, you can also limit who can access your system via central admin panels.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  5. Continued support

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud-based ERP solutions offer 24/7 support. ERP solutions providers can fix problems faster than if you leave them to your employees.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Providers also make sure that solutions are kept updated. Hackers have been known to attack businesses that use outdated versions of popular ERP programs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to learn more about cloud-based ERP solutions, contact us. We’ll be glad to assist you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/06/what-are-the-top-5-benefits-of-a-cloud-erp/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3460721838.jpg" length="39053" type="image/jpeg" />
      <pubDate>Fri, 14 Jun 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/06/what-are-the-top-5-benefits-of-a-cloud-erp</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3460721838.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Increase your leads by automating SMB marketing</title>
      <link>https://www.apogeemsp.com/2019/06/increase-your-leads-by-automating-smb-marketing</link>
      <description>Marketing automation was once a technology reserved for mega-corporations. Fortunately, the IT industry is making business tools cheaper and more accessible all the time. Nowadays, if you’re a small business owner, you’d have to be crazy to pass up all that marketing automation has to offer. If you haven’t already implemented this wonderfully profitable technology, […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Marketing automation was once a technology reserved for mega-corporations. Fortunately, the IT industry is making business tools cheaper and more accessible all the time. Nowadays, if you’re a small business owner, you’d have to be crazy to pass up all that marketing automation has to offer. If you haven’t already implemented this wonderfully profitable technology, read the five best reasons to do so.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Instant responses to email requests
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
If a customer or prospect sends your business an email via your website or a “Contact Us” form, any delay in response could ultimately cost you a client. But if you have a marketing automation plan in place, you can customize automatic email responses to respond to these leads as soon as an email is received. This either provides potential customers with the information they requested or informs them that you will be responding in greater detail soon.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Stop leaving voicemails and start closing deals
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
There’s a reason most people prefer to communicate via email: Keeping in touch over the phone can be tough if both parties are always busy. An automated system solves this by logging when you’ve contacted leads and automatically emailing them about follow-up times. The call, email, and its response are all logged in your CRM and calendar without a single minute wasted on inputting mundane information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Inbound lead assignment
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
When you have phone calls, emails, and meetings piling up, it’s hard to keep track of which customer goes where and who is working with them. With marketing automation software and tracking, customer service representatives are automatically assigned to inbound leads based on specialties and demographics so they can begin working on building profitable rapport right away.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Give and you shall receive
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Potential clients and leads get dozens, sometimes hundreds, of business emails every day. You need something to set your business apart from the rest. By offering valuable content such as how-to guides and total cost of ownership tools in exchange for contact information, you can provide prospects with content they actually want.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    All it takes is a web form and some creative writing that ultimately leads visitors back to your products and/or services. Your automation software delivers content to anyone who provides contact information, and it downloads metrics that can be tracked and analyzed by your solution.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Never type another phone number again
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Networking events mean new contacts and new leads. They used to mean having to keep track of thick stacks of business cards, but cutting-edge marketing tools now make it possible to take a picture of contact information and automatically store it as part of a cloud-based database. Call-ins, scanned business cards, and received emails all get organized into a single digital Rolodex with recommendations on whom to contact and when it is best to do so — without one minute of tedious data entry.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Every business owner knows that automating mindless tasks is a worthwhile investment. But not everyone knows just what sort of tools are available to help you cut down on wasted work. Our team specializes in using technology to add value to your business, and we believe that if you’re not utilizing any of the solutions above, that’s the best place to start. Get in touch with us today to make your marketing technology work for you.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/06/increase-your-leads-by-automating-smb-marketing/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2308456868.jpg" length="51171" type="image/jpeg" />
      <pubDate>Fri, 14 Jun 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/06/increase-your-leads-by-automating-smb-marketing</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2308456868.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Guarding your company’s data</title>
      <link>https://www.apogeemsp.com/2019/06/guarding-your-companys-data</link>
      <description>Some of the most well-known companies in the world have been victims of cyberattacks, including Sony Pictures, Home Depot, Adobe, and eBay. While major corporations are high-profile targets for hackers, small- and medium-sized businesses are not exempt, so they need to secure their networks and data. It may be difficult or impossible to undo any […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Some of the most well-known companies in the world have been victims of cyberattacks, including Sony Pictures, Home Depot, Adobe, and eBay. While major corporations are high-profile targets for hackers, small- and medium-sized businesses are not exempt, so they need to secure their networks and data. It may be difficult or impossible to undo any damage caused by cybercriminals, so it’s imperative for you to take certain steps to prevent it. Applying the following security tips can help guard your company’s data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Use Two-Factor Authentication
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Using a complicated password to secure your system is no longer an effective way to solve the issue of cybersecurity. We tend to use that same complex password in our email accounts or bank accounts, and if one of your logins is compromised, this can result in grave consequences.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Two-factor authentication (2FA) adds an extra layer of security for your systems and accounts. It can be biometric verification for devices that you own, or a time-sensitive auto-generated code that is sent to your mobile phone. This security feature works in the same way websites would require you to confirm your email address. They want to make sure that you’re not a bot or anything else.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Encrypt all data
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Encryption is a great obstruction to hackers, since it scrambles and descrambles data every time someone tries to read it. Encryption also causes compatibility issues if the data is not being accessed via the company’s own network systems. While applying encryption can be costly, it is certainly well worth the money if it can protect your business data from falling into the wrong hands.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Keep systems up to date
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Technology is moving at a fast pace. Hackers are always upgrading their tools to take advantage of outdated security systems, so companies should do likewise to protect their valuable resources. Yet many companies don’t install software updates immediately. If the update closes existing security loopholes, delaying an update exposes you to external attacks. So install software updates as soon as they are released.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Back up frequently
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Although you’ve implemented several layers to your security, sometimes hackers can still find their way in. This is why you need to back up data frequently, whether it’s on-site, off-site, or by way of cloud backups. In the worst-case scenario where your systems do get infiltrated, you can restore lost data from those backups.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Monitor connectivity
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Many businesses have no idea how many computers they have, so it’s very hard to keep track of which computers are online. Sometimes a company’s computers and servers are online when they don’t need to be, making them tempting targets for attackers. It’s advisable to configure business servers properly, ensuring that only necessary machines are online and that they’re well-protected.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      It’s much more expensive to recover from a data breach than to prevent one. If you’re looking to protect your business IT systems for potential threats, contact us today so we can help.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/06/guarding-your-companys-data/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3967646220.jpg" length="57900" type="image/jpeg" />
      <pubDate>Mon, 10 Jun 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/06/guarding-your-companys-data</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3967646220.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Hospital readmissions down thanks to big data</title>
      <link>https://www.apogeemsp.com/2019/06/hospital-readmissions-down-thanks-to-big-data</link>
      <description>Readmission rates are a key performance indicator (KPI) for hospitals. They indicate the quality of care the practice provides as well as the tendency of the establishment to get overcrowded. Some legislation even reduces government payouts to hospitals with high readmission rates. Regardless of whether you want to avoid a stiff penalty or just improve […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Readmission rates are a key performance indicator (KPI) for hospitals. They indicate the quality of care the practice provides as well as the tendency of the establishment to get overcrowded. Some legislation even reduces government payouts to hospitals with high readmission rates. Regardless of whether you want to avoid a stiff penalty or just improve your patient services, data analytics may help you lower your readmission rates. We’ve put together all the interesting facts and figures right here.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    At its core, business intelligence (BI) software is all about data analytics. BI software is able to accept overwhelming amounts of data in short periods of time and use advanced analysis algorithms to search for trends in the data that even the most experienced statistician cannot find. Because it can provide deep insights in short periods of time, businesses across industries have utilized different BI software to gain competitive advantages and streamline their workflows. For instance, businesses in the healthcare industry use BI to manage their readmission rates.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For the context of this article, 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      readmission
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     refers to when a patient returns for more care within 30 days of their original hospital stay. Cases like these usually stem from conditions immediately following the initial visit, such as mismanagement of the original condition, improper self-medication, and not enough access to proper medical services and medications in their community.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    BI can help reduce readmission rates in several ways. For instance, by using patient fields such as income level, English proficiency, housing conditions, and community resources instead of variables like previous number of purchases, order size, and order frequency, hospital administrators will have a better insight on the patient demographics. This knowledge will enable them to provide extra care to people who need it most and help them prevent expensive readmissions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Furthermore, by combining socioeconomic data with electronic medical records (EMR) in a BI software environment, medical professionals can easily create individual profiles that will predict how likely a patient is going to require readmission, even before care is provided. For practices looking for methods to reduce readmissions by 3 percent or greater, predictive analytics allow doctors to ensure that certain types of patients can totally avoid readmissions with proper initial care.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Effective implementation of these solutions can definitely save hospitals a lot of money. In fact, 
    
  
  
                    &#xD;
    &lt;a href="https://www.bizjournals.com/baltimore/print-edition/2016/02/19/how-st-josephs-climbed-out-of-a-72-million-hole.html"&gt;&#xD;
      
                      
    
    
      one particular practice
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     was able to save $72 million on medical services after reducing the incidence of readmissions by 6,000 patients annually while avoiding $4 million in Medicare penalties and boosting its reputation by leaps and bounds.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Big data isn’t only for big business. BI software can deliver your practice unprecedented levels of care and efficiency. Whether you want to lower readmission rates or ensure your EMR compliance, we have the knowledge and experience to get it done for you. Call us today to partner with a trusted IT expert.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/06/hospital-readmissions-down-thanks-to-big-data/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2634781208.jpg" length="26671" type="image/jpeg" />
      <pubDate>Tue, 04 Jun 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/06/hospital-readmissions-down-thanks-to-big-data</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2634781208.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Top 4 reasons for sluggish mobile internet</title>
      <link>https://www.apogeemsp.com/2019/06/top-4-reasons-for-sluggish-mobile-internet</link>
      <description>Fed up with your smartphone because of its slow internet speed? Before you rush off to the nearest electronics store to buy a new one, take a look at these four possible reasons why your phone’s internet connection is slow. Router location One simple yet overlooked reason why your Wi-Fi-connected phone may be experiencing internet […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Fed up with your smartphone because of its slow internet speed? Before you rush off to the nearest electronics store to buy a new one, take a look at these four possible reasons why your phone’s internet connection is slow.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Router location

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One simple yet overlooked reason why your Wi-Fi-connected phone may be experiencing internet lag is because of your router’s location. Although Wi-Fi has a range of up to 230 feet, the farther away you are from the router, the weaker the signal. Large objects like doors and walls situated in between you and the router can also weaken the transmission.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s recommended to place your router in a centralized location, preferably away from concrete and masonry walls or other big objects like a chimney. As the router signal radiates from all sides, blocking any side with big objects will impact your Wi-Fi’s signal quality and as a result, your phone’s internet speed is impeded.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Wi-Fi noise

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Did you know that home electronic appliances emit wireless signals at a frequency similar to your router’s (2.4GHz)? So before deciding on your router’s location, determine whether there are any wireless devices nearby, as they emit signals that can interfere with your router’s signal. For example, even if the ideal location for your router is at the center of your house, you shouldn’t place it there if there’s a cordless phone nearby.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also set your router on a 5GHz band, as this frequency is less prone to interference from other appliances. But before you start tuning it, make sure your phone supports 5GHz; otherwise, it won’t be able to connect to the router.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Slow network

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Another reason for your phone’s slow internet connection is fluctuating network speeds. Ask yourself these two questions to know the exact cause of this problem:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You should increase your router’s internet bandwidth speed if you discover you have many users and all of them are either streaming movies, or downloading computer games or software updates. This will allow every phone to enjoy faster internet speeds.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you’re outdoors, and you’re connected to a public Wi-Fi network, consider using your mobile data instead. You won’t have to share your internet when you use mobile data, enabling you to experience faster connectivity at all times as long as you have a high-speed data plan.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Too much cache

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Last, you should check your smartphone’s cache if fixing your router, network, and positioning doesn’t improve your device’s internet speed. Cache is a component in your phone that saves data from earlier searches in order to increase the speed of similar searches in the future. Although your phone becomes more efficient for that particular search, it also makes your phone much slower when you do other things that require the internet.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can clear out your cache manually or use a cache cleaner app to thoroughly get rid of useless cache and optimize your phone’s internet speed. If you decide to download a cache cleaner app, make sure that it is reputable and trustworthy so you don’t accidentally download a malware-infected program instead.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are more reasons to your phone’s lagging internet speed. If your business relies heavily on a speedy mobile internet connection and you’re unable to fix the problem, call our experts today. We’re always ready to help you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/06/top-4-reasons-for-sluggish-mobile-internet/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3998238002.jpg" length="24372" type="image/jpeg" />
      <pubDate>Mon, 03 Jun 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/06/top-4-reasons-for-sluggish-mobile-internet</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3998238002.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Flood-proof your business technology now</title>
      <link>https://www.apogeemsp.com/2019/05/flood-proof-your-business-technology-now</link>
      <description>In 2018, eight hurricanes left a trail of devastation that destroyed homes and businesses. Things aren’t looking bright in 2019, as experts have warned that major hurricanes will likely occur this year, too. Businesses looking to avoid the effects of Hurricanes Harvey and Irma from years past must build a solid disaster recovery (DR) plan […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In 2018, eight hurricanes left a trail of devastation that destroyed homes and businesses. Things aren’t looking bright in 2019, as experts have warned that major hurricanes will likely occur this year, too. Businesses looking to avoid the effects of Hurricanes Harvey and Irma from years past must build a solid disaster recovery (DR) plan — now.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Determine recovery hierarchy

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Certain parts of your IT are more mission-critical than others. Ask yourself which systems or data must be recovered in minutes, hours, or days to get your business back to running efficiently.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For example, you may find that recovering sensitive customer information and eCommerce systems take priority over recovering your email server. Whatever the case may be, prioritizing your systems ensures that the right ones are recovered quickly after a disaster.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Pay attention to location

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    First and foremost, your backup site should be in a hurricane-free zone. Ideally, your off-site facility should be located at least 100 miles away from your main location. If this isn’t possible, make sure it is built to withstand wind speeds of 160 mph (as fast as Category 5 storms), and is supported by backup generators and uninterruptible power supplies.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You should also request an upper floor installation or, at the very least, keep critical IT equipment 18 inches off the ground to prevent water damage.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use image-based backups

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Unlike fragile tape backups, image-based backups take “snapshots” of your systems, creating a copy of the OS, software, and data stored in it. From there, you can easily boot the virtual image on any device, allowing you to back up and restore critical business systems in seconds.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Take advantage of the cloud

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The cloud allows you to host applications and store data in high-availability, geo-redundant servers. This means your backups can be accessed via the internet, allowing authorized users to access critical files from any device. Expert technicians will also watch over and secure your backups, allowing you to enjoy the benefits of enterprise-level backup facilities and IT support.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Back up your data frequently

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Back up your data often, especially during disaster season. If your latest backups were created on the 15th of September and the next storm makes landfall on the 28th, you could lose nearly two weeks of data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Get in the habit of replicating your files at the end of each day, which should be easy if you’ve opted for image-based backups.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Test your DR plan

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    After setting up your backups, check whether they are restoring your files accurately and on time. Your employees should be drilled on the recovery procedures and their responsibilities during and after disaster strikes. Your DR team should also be trained on how to failover to the backup site before the storm hits. Finally, providers, contractors, and customers need to be notified about how the hurricane will affect your operations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As cell towers and internet connections may be affected during this time, make sure your company forums are online and have your employees register with the 
    
  
  
                    &#xD;
    &lt;a href="https://safeandwell.communityos.org/cms/index.php"&gt;&#xD;
      
                      
    
    
      Red Cross Safe and Well website
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     so you can check their statuses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s nearly impossible to experience little-to-no disruptions during disasters like Harvey or Irma, but with the right support, you can minimize downtime. If you’re concerned about any natural disasters putting you out of business, call us today. We offer comprehensive business continuity services that every company should have.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/flood-proof-your-business-technology-now/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2278165838.jpg" length="28088" type="image/jpeg" />
      <pubDate>Wed, 29 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/flood-proof-your-business-technology-now</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2278165838.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Get ahead of cybersecurity with these basic IT terms</title>
      <link>https://www.apogeemsp.com/2019/05/get-ahead-of-cybersecurity-with-these-basic-it-terms</link>
      <description>If you just called a malware a “virus,” then you are definitely being left behind in digital talk. Knowing a few IT things here and there not only enables you to have some rapport with your tech-savvy colleagues, but it also helps you have a better understanding of some basic IT know-how. Read on to […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you just called a malware a “virus,” then you are definitely being left behind in digital talk. Knowing a few IT things here and there not only enables you to have some rapport with your tech-savvy colleagues, but it also helps you have a better understanding of some basic IT know-how. Read on to get you started.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Malware

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For a long time, the phrase “computer virus” was misappropriated as a term to define every type of attack that intended to harm or hurt your computers and networks. A virus is actually a specific type of attack, or malware. Whereas a virus is designed to replicate itself, any software created for the purpose of destroying or unfairly accessing networks and data should be referred to as malware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ransomware

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Don’t let all the other words ending in “ware” confuse you; they are all just subcategories of malware. Currently, one of the most popular of these is “ransomware,” which is malware that encrypts valuable data until a ransom is paid for its return.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Intrusion protection system(IPS)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are several ways to safeguard your network from malware, but IPSs are quickly becoming one of the non-negotiables. IPSs sit inside of your company’s firewall and look for suspicious and malicious activity that can be halted before it can exploit or take advantage of a known vulnerability.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Social engineering

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not all types of malware rely solely on fancy computer programming. Experts agree that the majority of attacks require some form of what is called “social engineering” to be successful. Social engineering is the act of tricking people, rather than computers, into revealing sensitive or guarded information. Complicated software is totally unnecessary if you can just convince potential victims that you’re a security professional who needs their password to secure their account.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Phishing

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Despite often relying on face-to-face interactions, social engineering does occasionally employ more technical methods. Phishing is the act of creating an application or website that impersonates a trustworthy and often well-known business in an attempt to elicit confidential information. Just because you received an email that says it’s from the IRS doesn’t mean it should be taken at face value — always verify the source of any service requesting your sensitive data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Antivirus

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Antivirus software is often misunderstood as a way to comprehensively secure your computers and workstations. These applications are just one piece of the cybersecurity puzzle and can only scan the drives on which they are installed for signs of well-known malware variants.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Zero-day attacks

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Malware is most dangerous when it has been released but not yet discovered by cybersecurity experts. When a vulnerability is found within a piece of software, vendors will release an update to amend the gap in security. However, if cyberattackers release a piece of malware that has never been seen before, and if that malware exploits one of these holes before the vulnerability is addressed, it is called a zero-day attack.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Patch

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When software developers discover a security vulnerability in their programming, they usually release a small file to update and “patch” this gap. Patches are essential to keeping your network secure from the vultures lurking on the internet. By checking for and installing patches as often as possible, you keep your software protected from the latest malware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Redundant data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When antivirus software, patches, and intrusion detection fail to keep your information secure, there’s only one thing that will: quarantined off-site storage. Duplicating your data offline and storing it somewhere other than your business’s workspace ensures that if there is a malware infection, you’re equipped with backups.We aren’t just creating a glossary of cybersecurity terms; every day, we’re writing a new chapter to the history of this ever-evolving industry. And no matter what you might think, we are available to impart that knowledge on anyone who comes knocking. Get in touch with us today and find out just how we can help you with your IT woes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/get-ahead-of-cybersecurity-with-these-basic-it-terms/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3756607406.jpg" length="47874" type="image/jpeg" />
      <pubDate>Tue, 28 May 2019 07:33:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/get-ahead-of-cybersecurity-with-these-basic-it-terms</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3756607406.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Using Alexa in your office</title>
      <link>https://www.apogeemsp.com/2019/05/using-alexa-in-your-office</link>
      <description>Amazon's Alexa can do more than just receive calls and messages, provide weather forecasts, play music, and control your smart devices at home. Her developers are setting her up to be a next-generation AI technology that has many features for home and office users. Here is how Alexa can become more relevant in an office […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Amazon's Alexa can do more than just receive calls and messages, provide weather forecasts, play music, and control your smart devices at home. Her developers are setting her up to be a next-generation AI technology that has many features for home and office users. Here is how Alexa can become more relevant in an office setting.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Create and manage to-do and shopping lists
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      You have meetings to attend and deadlines to meet. Alexa has a straightforward To-do List feature that helps you stay on top of all your tasks. It’s ideal for busy professionals who prefer a no-frills checklist that allows them to simply view completed items, or to edit or delete items on the list.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      You can also seamlessly sync third-party applications like Any.do and Todoist. Those apps offer more features for organizing tasks, adding subtasks and folders, creating reminders, setting due dates, attaching files, and prioritizing items.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      To connect to a third-party app:
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Alexa also has a default Shopping List that works exactly like the To-do List. It lets you add or delete items that can be browsed in the Amazon store or searched for in Bing.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Reorder office supplies
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Ordering supplies on an Amazon smart home device is especially convenient because you would already have an Amazon account. When voice shopping with Alexa, you can either add items to your Amazon cart (“Alexa, add toner to my cart”) or directly order a single item (“Alexa, reorder toner”) without having to lift a finger.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      When you place an order, Alexa checks product availability, walks you through Amazon search results, and asks you to confirm or cancel the order. Voice shopping is enabled by default, but it can be disabled in 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Settings &amp;gt; Voice Purchasing
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       in the Alexa app.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Sync your calendars
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      One of the best ways to maximize Alexa in the office is to sync it with your calendars. You can view scheduled appointments, set meetings, or have Alexa read the day’s entries with simple commands like “Alexa, what time is my next meeting?” or “Alexa, when is the company barbecue?”.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      To add a calendar:
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Set a timer
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      A Pomodoro timer is a productivity enhancement tool that works by prescribing ideal work intervals and breaks. For example, you can set a timer that reminds you to take a 15-minute break for every hour worked, and setting this up in Alexa is easy.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      To set a single timer:
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      To set several timers at once, say:
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      The commands we’ve included here work for simple instructions, but you can modify them and use tons of other Alexa commands to suit your purposes. If you need recommendations on how you can work smarter with AI and other productivity tools, get in touch with us today.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/using-alexa-in-your-office/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3364891703.jpg" length="25419" type="image/jpeg" />
      <pubDate>Mon, 20 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/using-alexa-in-your-office</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3364891703.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Protection through browser extensions</title>
      <link>https://www.apogeemsp.com/2019/05/protection-through-browser-extensions</link>
      <description>In these times of internet fraud, phishing scams, and high-profile hacks, you can never be too careful. Even if you think you have enough precautions in place, it always helps to take another look at your online safety. Here are some browser extensions you can add to improve your online security. Prevent browser tracking If […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      In these times of internet fraud, phishing scams, and high-profile hacks, you can never be too careful. Even if you think you have enough precautions in place, it always helps to take another look at your online safety. Here are some browser extensions you can add to improve your online security. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Prevent browser tracking
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you don’t like the idea of a third party being able to track your browsing habits, try installing a tool that offers private browsing. These programs offer protection against tracking by blocking third-party cookies as well as malware. Some extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter or Facebook. Some examples include Disconnect, uBlock Origin, and Ghostery. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Blocking ads
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      While online ads may seem harmless, the truth is that they can contain processes that might send your data back to a third party. A decent ad blocking program, like AdBlock Plus and uBlock Origin, will block banner, rollover, and pop-up ads, and also prevent you from inadvertently visiting a malicious site. Many blockers contain additional features such as the ability to disable cookies and scripts used by third parties on websites, the option to block specific items, and even “clean up” Facebook, and hide YouTube comments. The major blockers work with Google Chrome, Safari, and Firefox, and you’ll be able to find everything from user-friendly solutions to more advanced tools that are customizable down to the tiniest degree. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Consider installing a VPN
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      A VPN (virtual private network) browser extension is a simple way to connect your web browser to a VPN server. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing, and then routes it through the server to hide your location and IP address. Commonly used in countries such as China where the internet is heavily censored by the government, a VPN enables users to access blocked sites — in China’s case, that’s anything from blogs criticizing the government to Facebook and Instagram. There are a huge number of VPN browser extensions in the market, like NordVPN and ExpressVPN, so do a little research and find one that suits you best.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you’d like to know more about staying safe on the internet or would like to schedule a security assessment for your company, get in touch with us today.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/protection-through-browser-extensions/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3287831681.jpg" length="37866" type="image/jpeg" />
      <pubDate>Tue, 14 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/protection-through-browser-extensions</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3287831681.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Boost office productivity with technology</title>
      <link>https://www.apogeemsp.com/2019/05/boost-office-productivity-with-technology</link>
      <description>When it comes to increasing your employees’ efficiency and productivity, technology can provide countless opportunities to streamline workflows, eliminate redundant processes, and reduce costs within your organization. If you’re looking to stay ahead of the competition, you need to ditch the traditional ways of working and follow the tips below. Change office communication To increase […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to increasing your employees’ efficiency and productivity, technology can provide countless opportunities to streamline workflows, eliminate redundant processes, and reduce costs within your organization. If you’re looking to stay ahead of the competition, you need to ditch the traditional ways of working and follow the tips below.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Change office communication

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To increase efficiency, set up instant messaging software such as Slack or Microsoft Teams. This allows employees to communicate anytime, anywhere instead of having to get up from their desks to see whether the person is available.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Of course, if you need to discuss big projects or issues, face-to-face communication is likely the best choice. But you can simply send a quick message for more trivial conversations, saving precious minutes and allowing you to get more work done.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Install video conferencing

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Traveling to offsite meetings and training sessions takes time. Rather than commuting for hours outside your office, opt for a networked phone solution that offers video calls and conferencing. This way, you can hold a video conference to discuss business matters from the comfort and convenience of your office. You can also take things up a notch and equip the conference room with tools to pull up documents and have them displayed on a big screen so that everyone in the meeting can follow the conversation with ease.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Upgrade workstations

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Outdated technologies and workstations limit your business’s progress and are a hindrance to developing clued-up, efficient employees. Aging systems and slow networks can frustrate your team and bring productivity to a standstill. That’s why it’s important to take the time to assess your current workstations, applications, hardware, and tools. This doesn’t mean that you have to buy a set of entirely new workstations. But you should replace obsolete equipment with more up-to-date machines. In addition, make sure all software and applications are up-to-date to ensure maximum efficiency and employee satisfaction.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Implement ERP software

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Enterprise Resource Planning (ERP) is a business process management software that allows organizations to automate processes and centralize data in order for employees to collaborate more efficiently. ERP software provides employees with up-to-date business information that they can easily access and use. What’s more, ERP also eliminates redundant data entry and reduces the number of spreadsheets that are used to record critical business data, by storing information in a centralized database.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To get the maximum return on your technology investment, it’s also important to partner with a knowledgeable and reliable service provider. Get in touch with our tech experts today to find out how we can implement technology to help your employees become more efficient and productive.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/boost-office-productivity-with-technology/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3410183500.jpg" length="37105" type="image/jpeg" />
      <pubDate>Mon, 13 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/boost-office-productivity-with-technology</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3410183500.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Two excellent ways to verify user identity</title>
      <link>https://www.apogeemsp.com/2019/05/two-excellent-ways-to-verify-user-identity</link>
      <description>To keep your network safe from cybercriminals, your first line of defense should be a secure login process. When it comes to verifying user identity, you can choose between two-step authentication and two-factor authentication. Know more about the difference between the two, so you can have a better appreciation of your cybersecurity options. If you […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To keep your network safe from cybercriminals, your first line of defense should be a secure login process. When it comes to verifying user identity, you can choose between two-step authentication and two-factor authentication. Know more about the difference between the two, so you can have a better appreciation of your cybersecurity options.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to improve your business's cybersecurity for you and your customers, you should look at your authentication process. Two-step and two-factor authentication are two of the most commonly used options in cybersecurity. Many businesses use the terms two-step and two-factor authentication interchangeably. There are, however, subtle differences between the two.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Two-step authentication

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A two-step authentication process requires a single-factor login (such as a password or biometric reading) as well as another similar type of login that is essentially sent to the user. For example, you may have a password for your first step and then receive a one-time-use code on your cell phone as the second step.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Two-step authentication adds an extra step in the verification process, making it more secure than single-step authentication (i.e., just the password). However, if a person or business is hacked, it won't be enough to stop hackers from getting a hold of whatever they are looking for.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Two-factor authentication

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    On the other hand, there is two-factor authentication (sometimes referred to as multifactor authentication), which is significantly more secure. This type of authentication requires two different types of information to authenticate a user’s identity. For example, it could be a combination of a fingerprint or retinal scan as well as a password or passcode. Because the types of information are different, it would require a hacker a great deal more effort to obtain both forms of authentication.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The difference between the two

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In essence, every two-factor authentication is a two-step authentication process, but the opposite is not true. With this information in mind, make sure that you are using the right type of authentication in your business to keep your company and customer information as secure as possible.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your network needs the best security technology has to offer. The type of authentication you should use is just one of hundreds of choices that must be made to achieve that end. To take the stress out of securing and protecting your network, call us today for all the help you could ever ask for.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/two-excellent-ways-to-verify-user-identity/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1551923652.jpg" length="35928" type="image/jpeg" />
      <pubDate>Thu, 09 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/two-excellent-ways-to-verify-user-identity</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1551923652.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Is your PC being used for cryptojacking?</title>
      <link>https://www.apogeemsp.com/2019/05/is-your-pc-being-used-for-cryptojacking</link>
      <description>Cryptocurrencies such as Bitcoin and Monero are secure and potentially worth thousands of dollars, so naturally, hackers are looking for opportunities to mine them. They are using malicious tactics to obtain cryptocurrency, and they’re doing it with something called cryptojacking. Is your PC safe, or is it being used for cryptojacking? Find out now. Surge […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Cryptocurrencies such as Bitcoin and Monero are secure and potentially worth thousands of dollars, so naturally, hackers are looking for opportunities to mine them. They are using malicious tactics to obtain cryptocurrency, and they’re doing it with something called cryptojacking. Is your PC safe, or is it being used for cryptojacking? Find out now.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Surge in cryptojacking

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The biggest reason why cryptojacking is becoming so popular is that it’s a low-risk, high-reward scheme. Instead of extorting money directly from the victim, hackers can secretly generate digital currencies without the victim knowing. And even if it’s detected, it’s almost impossible to track down who initiated the attack. Moreover, since nothing was actually “stolen” (other than a portion of computing power), victims have little incentive to apprehend the culprit.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cryptojacking is also a cheap investment. For as little as $30, anyone can purchase a cryptojacking kit from the dark web to force other computers to generate Bitcoin or Monero for them. And while it’s difficult to tell how much exactly are hackers earning by cryptojacking, we can only surmise that it’s more than the initial $30.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Because of these reasons, there’s a good chance that this type of attack will be as popular as ransomware was in 2017. According to several reports, even sites like The Pirate Bay, Openload, and OnlineVideoConverter are allegedly using cryptojacking exploits to diversify their revenue streams.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Prevention and response

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Prevention is always better than cure, so include cryptojacking in your monthly security training sessions. If employees practice extra caution in dealing with unsolicited emails and suspicious links, then hackers will have no way into your systems. Using ad-blocker or anti-cryptomining extensions on web browsers is also a great way to stay protected.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Beyond prevention, network monitoring solutions should also be used to detect any unusual computer behavior. For example, if you notice a significant number of PCs running slower than usual, assume that cryptojacking is taking place. And once it’s confirmed, advise your staff to close browser tabs and update browser extensions as soon as possible.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Because cryptojacking doesn’t steal data, it may seem less threatening than some malware, but in reality, its effects are just as severe — it can incur real power, cooling, and performance costs to your business when several systems are compromised. To make sure your business stays in top form (and that you don’t end up enriching any hackers), contact us today. Our hardware solutions and cybersecurity tips will keep your business safe and sound.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/is-your-pc-being-used-for-cryptojacking/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1548907517.jpg" length="30119" type="image/jpeg" />
      <pubDate>Tue, 07 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/is-your-pc-being-used-for-cryptojacking</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1548907517.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybercriminals target healthcare data</title>
      <link>https://www.apogeemsp.com/2019/05/cybercriminals-target-healthcare-data</link>
      <description>Medical facilities depend on healthcare systems, whether through data entry software, prescription management, or electronic medical records. Sadly, many healthcare providers don't know how easy it is for cybercriminals to break into their networks and steal their data. One reason why there are cyberattacks is digitization. Converting paper medical data records to electronic files has […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Medical facilities depend on healthcare systems, whether through data entry software, prescription management, or electronic medical records. Sadly, many healthcare providers don't know how easy it is for cybercriminals to break into their networks and steal their data. One reason why there are cyberattacks is digitization. Converting paper medical data records to electronic files has its advantages, but this also increases the risk of data theft. Stolen medical information can be used for financial crimes or identity theft, so protecting healthcare data should be a priority.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        From financial information to medical information
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      In the past few years, cybercriminals have focused on stealing financial data, including credit card numbers and personal information. But things are taking a turn, the result of financial institutions fortifying their database and raising client awareness of the problem. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Stronger data protection measures in the financial industry have forced criminals to turn their attention to medical data, which is typically much less secure. Patient data includes date of birth, medical and physical records, and social security number — information that can’t be easily reset, and is significantly more valuable than credit card data.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Securing healthcare data
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Healthcare data has become more attractive to criminals, and it’s crucial that medical institutions take necessary precautions to secure their patients’ information from data thieves. Here are some best practices to secure healthcare data.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      It is important for healthcare providers to secure the sensitive information of their patients. If you want to know how your organization can better protect your patients’ information, give us a call.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/cybercriminals-target-healthcare-data/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/481532990.jpg" length="45225" type="image/jpeg" />
      <pubDate>Mon, 06 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/cybercriminals-target-healthcare-data</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/481532990.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Ways Office 365 migrations fail</title>
      <link>https://www.apogeemsp.com/2019/05/5-ways-office-365-migrations-fail</link>
      <description>Office 365, the cloud-based version of Office, is one of the most popular software suites used by small- to medium-sized businesses (SMBs) today. With an ever-increasing number of companies migrating to this solution, it’s not surprising that many others are considering making the move. However, there’s always a chance of migration failure. Learn how to […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Office 365, the cloud-based version of Office, is one of the most popular software suites used by small- to medium-sized businesses (SMBs) today. With an ever-increasing number of companies migrating to this solution, it’s not surprising that many others are considering making the move. However, there’s always a chance of migration failure. Learn how to avoid this by knowing the five most common ways that Office 365 migration can fail.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  1. Slow internet connection speeds

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To avoid this, ask an Office 365 provider to test your existing network connections to ensure that your internet connection can handle the migration and day-to-day operation of Office 365. If not, they should be able to offer you a more efficient solution.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Because Office 365 is primarily cloud-based, you are going to need a connection with a solid bandwidth. When migrating your files and system over to Office 365, you will likely need to consume a large quantity of bandwidth. This demand will often be enough to tax most small business lines, resulting in slower internet speeds all around during the process. Employees might struggle to do their jobs properly if they’re reliant on the internet, so it is recommended to do migrations during off hours.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Beyond this, Office 365 is most often delivered over an internet connection, rather than in-house servers. This means that the day-to-day demand for bandwidth will increase. If you are already noticing slow speeds and service interruptions before implementing Office 365, you will likely see these issues compounded after implementation.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  2. Mailboxes and files are too big

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While the business versions of Office 365 come with 100 GB of email storage and over 1 TB of file storage per user, getting your emails and files online could take a while, especially if you have users whose inboxes are approaching the storage limit.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As a general rule of thumb, larger files will cause the migration of files to take longer. If you don’t prepare for this, then you could see migration affecting work or even causing recurring issues of unavailable data when it’s needed.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To avoid this, encourage your staff to archive their email inboxes and either delete or remove emails with large attachments that aren’t necessary.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  3. Uninformed users

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The average Office 365 migration takes around one to three days, depending on the size of the business and the amount of data being carried over. If you start migration without informing users that some files and emails won’t be accessible during this period, or that some systems may not be working, you could end up with employees unable to do their jobs and creating resentment for the new platform.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Instead, inform your employees about how the migration will run and what they can expect during the process. Beyond this, you should run training sessions on how to use the new systems to ensure that everyone is briefed before they start to use them. This will increase the overall chance that the platform migration and subsequent use will be successful.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While many versions of Office 365 do come with subscriptions to the latest version of Microsoft Office, there’s built-in support for systems that are running slightly older versions of Office. If your business is using a version older than Office 2010 (e.g., Office 2003), you won’t be able to properly use Office 365.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Beyond this, you’ll also need to use the latest version of your internet browser. If you use Chrome or Firefox, this won’t be a problem. However, if you use Internet Explorer, you may run into issues, as Microsoft has already discontinued the program in favor of Microsoft Edge.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The good news about Office 365 is that actual systems requirements are low, so almost every business will be able to integrate it. We recommend that in order to be able to use all of Office 365's features, ask your provider to ensure that your software and systems are compatible with it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  5. DIY migrations

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    On paper, migrating to Office 365 is a fairly simple and straightforward process. What many companies find when they do the migration themselves is that the process is much more difficult than expected. They come across unexpected issues that require an IT expert to solve.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In order to ensure a smooth migration, it’s a good idea to work with an IT provider like us. We can ensure that your systems are ready and the migration is smooth. Contact us today to learn more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/avoiding-office-365-migration-failure-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3368330605.jpg" length="52052" type="image/jpeg" />
      <pubDate>Fri, 03 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/5-ways-office-365-migrations-fail</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3368330605.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Organize online sales with an OMS</title>
      <link>https://www.apogeemsp.com/2019/05/organize-online-sales-with-an-oms</link>
      <description>More and more businesses today are seeking ways to run their operations optimally from top to bottom, a huge reason behind the proliferation of order management systems (OMSs). Find out if your business will benefit from one. First off, we need to clarify that inventory management systems (IMSs) are not the same as OMSs. The […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More and more businesses today are seeking ways to run their operations optimally from top to bottom, a huge reason behind the proliferation of order management systems (OMSs). Find out if your business will benefit from one.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    First off, we need to clarify that inventory management systems (IMSs) are not the same as OMSs. The former is a solution for analyzing your sales history and forecasting demand for your product and the materials you will need; in contrast, the latter is all about the here and now, as it tackles transactions as they happen.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h6&gt;&#xD;
  
                  
  What can an OMS do for you?

                &#xD;
&lt;/h6&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A complicated-but-necessary part of running an eCommerce store requires juggling sales, each at completely different stages in your shipping process and at varying rates of arrival every day. An OMS service is all about organizing product orders into a coherent and manageable workflow. Here are just some of the difficulties it helps you wrangle:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your eCommerce store can be connected to your inventory. If a certain product runs out of stock, it can be reflected on your site so customers aren’t misled about the availability of your product.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Payment authorizations can be automated and integrated with your shipping services.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
You can provide reports to your customers about their order’s shipping status. From intra-warehouse movements to on-the-truck updates, one page will provide all the information they need.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Products and materials can be automatically restocked once they dip below a certain threshold.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Refunds and returns can be automatically processed by your OMS.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
And like any industry, there are dozens of OMS platforms with niche functionalities that may be better for specific business models regardless of the industry. The most important thing is that you find a solution that reduces the most tedious organizational tasks for tracking your store’s orders.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h6&gt;&#xD;
  
                  
  The cloud-based OMS

                &#xD;
&lt;/h6&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The cloud is generally one of the most reliable ways to add value to your business. There are dozens of cloud-based platforms, just like OMSs, that require virtually no hardware and allow you to pay for exactly what you use. Cloud-based OMSs expand the capabilities of your business because they serve multiple purposes:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The cloud isn’t the future of business anymore — the cloud is the backbone of business now. It allows business owners and managers to run their enterprise in a cheaper, more efficient, and more flexible manner.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For advice on which solutions are best for your business and how to deploy them, give us a call today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/05/organize-online-sales-with-an-oms/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1197963430.jpg" length="34170" type="image/jpeg" />
      <pubDate>Thu, 02 May 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/05/organize-online-sales-with-an-oms</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1197963430.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Warning signs your computer has malware</title>
      <link>https://www.apogeemsp.com/2019/04/warning-signs-your-computer-has-malware</link>
      <description>With the rise of eCommerce and online banking, cybercrime has evolved. Like criminals who pull smash-and-grab jobs, they go where the money is. However, unlike bank robbers, cybercriminals do their best to avoid detection by letting malware do the work for them. Viruses and ransomware sneak into PCs to quietly steal passwords, financial credentials, and […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the rise of eCommerce and online banking, cybercrime has evolved. Like criminals who pull smash-and-grab jobs, they go where the money is. However, unlike bank robbers, cybercriminals do their best to avoid detection by letting malware do the work for them. Viruses and ransomware sneak into PCs to quietly steal passwords, financial credentials, and other personal information to be sold on the black market for profit. Not all malware is stealthy though. Here are some telltale signs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Slow computer

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Are your operating systems and programs taking a while to start up? Is your data bandwidth suspiciously slow? If so, your computer may potentially have a virus.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    However, just because your PC is running slower than usual doesn’t necessarily mean that it’s infected, as there could be other causes to your computer slowing down. First, check if you’re running out of RAM. For Windows, open task manager (press Ctrl + Shift + Esc) and go to the Performance tab and check how many gigabytes of RAM are used up under the Memory section. For Mac OS users, you can open the Activity Monitor app and, under System Memory, you should be able to find out your RAM usage.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Other causes could include lack of space on your hard drive or even damaged hardware. Once you’ve ruled out other possible causes, then malware may have infected your device.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Blue screen of death (BSOD)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your PC crashes regularly, it’s usually either a technical problem with your system or a malware infection. You might not have installed the latest drivers for your device or the programs you’re running could possibly be incompatible with your hardware. If none of these problems are apparent in your PC, then a virus could be clashing with other programs and causing your crashes.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To check what caused your last BSOD, go to Control Panel &amp;gt; System and Security &amp;gt; Administrative Tools &amp;gt; Event Viewer and select Windows Logs. Those marked with “error” are your recorded crashes. For troubleshooting solutions, consult forums or your IT department to figure out what to do next.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Lack of storage space

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are several types of malware that can manipulate and corrupt the files saved on your computer. Most tend to fill up your hard drive with suspicious files. Ransomware, for example, is a notorious type of malware that denies you access to your data until you pay a so-called ransom. There are more aggressive forms of ransomware, like NotPetya, known for exploiting security holes to infect computers without needing to trick users.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you find any unknown programs that you have never installed before, notify IT personnel in person immediately (do not email them) and have them handle the situation for you. Your device might not be the only one in your network that is infected with suspicious programs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Suspicious modem and hard drive activity

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Combined with the other warning signs, if your hard disk is working excessively while no programs are currently running or if you notice that your external modem is always lit, then you should scan your computer for viruses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Pop-ups, websites, toolbars, and other unwanted programs

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Pop-ups come from clicking on suspicious pages, such as those where users are asked to answer survey questions to access a website’s service or install free applications. While they’re inherently harmless, they could be downright annoying. Refrain from clicking pop-up pages and just close them instead. Run malware scans and update your browsers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You might think that downloading free applications is harmless, but the installation process can inject malware into your device. When you’re installing a program from the internet or even app stores, it’s easy to just skim over the terms and conditions page and repeatedly press next. This is where they get you. In the process of skipping over certain installation steps, you might have agreed to accepting a new default browser and opening unwanted websites and other programs filled with viruses. Be cautious when downloading something for free.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  You’re sending out spam

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your friends are telling you that you’ve been sending them suspicious messages and links over social media or email, you might be a victim of spyware. Warn your friends not to open anything that appears to be spam and make sure to reset your passwords across all your devices and enable multifactor authentication.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Knowing how malicious software affects your computer can help you take the necessary precautions and steps to rectify the situation as soon as possible. Regardless of whether or not your system has experienced these symptoms, it’s always smart to perform regular malware scans to ensure your business is safe. To find out more about malware and IT security, contact us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/how-to-know-if-your-pc-is-infected/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/107771571.jpg" length="80654" type="image/jpeg" />
      <pubDate>Wed, 24 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/warning-signs-your-computer-has-malware</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/107771571.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Enjoy an improved laptop experience</title>
      <link>https://www.apogeemsp.com/2019/04/enjoy-an-improved-laptop-experience</link>
      <description>Did you just get the newest MacBook Pro? Or the Lenovo Yoga 920? Either would be very exciting, but before you start showing off your new purchase, there are five steps you should take to make your laptop experience even more enjoyable and long-lasting. 1. Update your laptop’s operating system One of the first things […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Did you just get the newest MacBook Pro? Or the Lenovo Yoga 920? Either would be very exciting, but before you start showing off your new purchase, there are five steps you should take to make your laptop experience even more enjoyable and long-lasting.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  1. Update your laptop’s operating system

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the first things you should do before using your laptop is upgrade its operating system (OS). Assuming you did not purchase the laptop when it was first released, your laptop will still be running an older OS. With important patches and fixes released with each new update, it is recommended that you install the latest one to ensure your laptop is free of any vulnerabilities.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  2. Remove bloatware

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When turning on your laptop for the first time, you might notice that there are several preloaded software in the system — some of which you will probably never use. These are known as bloatware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    These apps take up a lot of your valuable drive space, so consider getting rid of them. The easiest way to do this is by downloading a bulk uninstaller, which allows you to check all the bloatware apps you don’t want and remove them in one fell swoop.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  3. Install protection software

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s no secret that the world we live in is unsafe. And with so much confidential information nowadays becoming digitalized, it is necessary to protect yourself against losing important data from your computer. The solution to this is very simple. By installing antivirus software that can automatically — or manually — scan your computer at a scheduled time, potential attacks can be thwarted before they become more serious.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not only is your laptop’s data vulnerable to cyberattacks, but there is always a chance your laptop can get lost or stolen. While there are preventive steps you can take — such as being mindful while using your laptop in public places — another solution would be to install anti-theft software. Security features such as Find My Device for Windows 10 and Prey for other operating systems can help you locate your device if it’s ever stolen or misplaced.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  4. Optimize your power settings

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the most frequent problems that laptop users have is that their batteries run out of juice too fast. However, you can actually extend the battery life by making a few tweaks to your power settings.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Reduce your display brightness, but not so much that it causes eye and mental fatigue.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Use the Sleep or Hibernate mode for your operating system.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  5. Set up a backup plan

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Imagine spending months working on an important project and suddenly finding it nonexistent the next day just because your laptop crashed. Deadlines will be missed. Profit margins will decrease. Customers will leave unhappy. And if worse comes to worst, you’ll be out of business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Why add stress if you can prevent it from happening in the first place? By setting up an automatic backup system, you can regularly save all your important files; that way, you’d still be able to recover your data should anything happen to the original file.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also store all your important documents in the cloud, which ensures access whenever you need, even if your laptop crashes or gets stolen.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Getting a new laptop can be fun, but the joy might be short-lived if you don’t set up any preventive measures from the start. Call us for information on how we can help you secure your company’s laptops today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/enjoy-an-improved-laptop-experience/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2988659926.jpg" length="26138" type="image/jpeg" />
      <pubDate>Mon, 22 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/enjoy-an-improved-laptop-experience</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2988659926.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Five design tips to improve your website</title>
      <link>https://www.apogeemsp.com/2019/04/five-design-tips-to-improve-your-website</link>
      <description>It’s not enough for small businesses to have a beautiful-looking website these days. Small business owners must also adopt web design trends that not only attract more visitors but ultimately increase sales. Consider the following web design ideas to achieve just that. Scrolling Scrolling is a convenient method to navigate a website. Instead of clicking […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s not enough for small businesses to have a beautiful-looking website these days. Small business owners must also adopt web design trends that not only attract more visitors but ultimately increase sales. Consider the following web design ideas to achieve just that.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Scrolling

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Scrolling is a convenient method to navigate a website. Instead of clicking on confusing menus and drop-down tabs, you can just scroll through a one-page site that has a cleaner look and is usually more intuitive to users. This web design style is definitely more important now that people have grown more accustomed to mobile web browsing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You also have to decide how far visitors will have to scroll to get to know your company. While a long scrolling page gives you more white space and content to work with, a short scrolling page can quickly convey your company’s message and encourages action.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Animations

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One way businesses have been setting themselves apart from others is by adding customized animations to their pages. This doesn’t mean you should overload your site with flashy effects that take forever to load. If you want to use animations on your site, give it a subtle twist. For instance, Slack’s loading animation features their logo.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Additionally, animations can be used to increase user interaction and engagement. 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Hover animations
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     will allow your users to position the mouse over your content and get an immediate response without having to move between pages. 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Slideshows
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     on your homepage can also showcase what your company is about without throwing too much information at the audience. When deciding to add animation to your page, figure out how a specific effect can enhance the user experience while showcasing your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Flat design

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To achieve an optimal viewing experience for users, many companies have adopted a flat design for their websites. The flat design style replaces the elements that give an illusion of depth, like shadows and textures, with minimalist typography and colors. For example, Google employed this style to get content to viewers more effectively. The company added flat-design colors and used a sans-serif font. This allows the logo to load faster and makes it easier to read, as well.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Full-screen forms

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More websites and apps are using full-screen forms to increase user interaction. Rather than being redirected to another page where your visitors decide to register or login to a website, they are welcomed by a full-screen form right on the home page. This is also especially useful for mobile users since they are less likely to misclick sections of the form.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Customized photos

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The next time you want to use photographs to highlight your company, forget about using stock photos. Business websites that exhibit the company’s own photographs on their homepages look more personal and stand out from the competition.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While these trends are popular at the moment, don’t blindly adopt them all because it might end up looking messy. Instead, use the trends that are best suited to your company.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to learn more about current web design trends, give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/five-design-tips-to-improve-your-website/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1078553419.jpg" length="47657" type="image/jpeg" />
      <pubDate>Fri, 19 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/five-design-tips-to-improve-your-website</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1078553419.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Keep your business alive with BCP</title>
      <link>https://www.apogeemsp.com/2019/04/keep-your-business-alive-with-bcp</link>
      <description>Power outages, disasters, and other disruptions are inevitable. Thousands of businesses around the globe are affected by them every year, with lost profits ranging into the millions, if not billions. So how can your business protect itself and stay open when the unexpected strikes? Here is a standard business continuity plan (BCP) your company can […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Power outages, disasters, and other disruptions are inevitable. Thousands of businesses around the globe are affected by them every year, with lost profits ranging into the millions, if not billions. So how can your business protect itself and stay open when the unexpected strikes? Here is a standard business continuity plan (BCP) your company can rely on.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Backup your data, applications, and servers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Today, companies are more dependent than ever on IT and data. If these critical components suddenly become inaccessible, there’s little chance your business will survive. Regularly backing up these elements ensures they can be restored quickly in the event of a disaster, security breach, or damage to IT equipment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In the past, most businesses would create backups on-site and with tape backups, but today more and more businesses are using the cloud, and here are several reasons why:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Virtualize servers and desktops

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you virtualize your servers or desktops, they can be used at any location – be it at your workplace, home, or a coffee shop in the Bahamas. In terms of business continuity, this is useful in case your main office suddenly becomes unusable due to hostile weather conditions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Have a backup power supply

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    No electricity means zero productivity and money down the drain. Having a backup power supply will ensure that when the electricity goes down, your employees can continue working.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A good solution is an uninterrupted power supply (UPS), which gives employees a fair amount of time to finish their work as if nothing ever happened. Also, if you have a server room, a UPS will ensure your vital servers stay cool.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Utilize social media

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether it’s Facebook, Twitter, or Google+, most people are on at least one social network these days. And if there is any kind of outage or disaster, social media is usually one of the first places customers, colleagues, staff, and vendors will check the status of your business. So when it comes to business continuity, keep at least one social media account active to keep your customers and followers informed.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Implement unified communications

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Unified communication (UC) creates a virtualized communication infrastructure. That means instead of your communication tools – like phones, instant messaging, and video calls – all being stored locally at your workplace, you can access them anywhere. So if your office is inaccessible, employees can still use your phones and other communication tools from their homes. What’s more, UC tools can route business calls to your employees’ smartphones. That means they’ll never miss an important call, even if they’re not in the office.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Keep in mind that these are only the first few items you have to address in your business continuity plan. You’ll also need to consider things like training employees and having a communications plan for informing stakeholders. If you want more advice on these areas or need top-class business continuity tools, contact us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/keep-your-business-alive-with-bcp/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3078778362.jpg" length="55696" type="image/jpeg" />
      <pubDate>Thu, 18 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/keep-your-business-alive-with-bcp</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3078778362.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Should you monitor your employees online?</title>
      <link>https://www.apogeemsp.com/2019/04/should-you-monitor-your-employees-online</link>
      <description>To monitor your employees, or not to monitor them, that is the topic of this blog post. If you’ve ever considered checking in on your staff’s online activities, you may have hesitated about whether or not it’s the right decision. We’ve listed the pros and cons of monitoring your employees, and some tips to make […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To monitor your employees, or not to monitor them, that is the topic of this blog post. If you’ve ever considered checking in on your staff’s online activities, you may have hesitated about whether or not it’s the right decision. We’ve listed the pros and cons of monitoring your employees, and some tips to make it a success if you go through with it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The case for monitoring

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are a number of reasons why monitoring your employees’ activities on company devices is a good idea. Doing so can help you:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The sad fact of the matter is that many business owners who begin monitoring their employees often end up discovering that their staff members aren’t focused solely on the company’s success.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Arguments against employee monitoring

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Of course, there are some potential downsides to monitoring that you should be aware of as well. These include:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Monitoring guidelines to follow

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you decide to monitor your employees, here are a few tips you should follow.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      1. Create written policies
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
When you decide to monitor your employees, ask yourself: Am I doing this for security purposes? Is it to ensure your employees aren’t wasting time on social media? If your monitoring policies are too strict, you could create an atmosphere of distrust.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Set guidelines for acceptable use of email, social media, web browsing, instant messaging, and downloading software and apps. Also, make sure to include how monitoring will be carried out and how data will be secured or destroyed.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      2. Tell your employees
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
It’s important to inform your employees about the scope of your monitoring policies. If they find out you’re doing it without their knowledge, you could face legal issues. By being transparent and open, you may actually see a boost in productivity by deterring employees from wasting time on the web.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you tell your employees, explain why you’re doing it and the risks your business faces from misuse of digital assets. Reassure them you’re not doing it to spy on their personal life, but to create a compliant and law-abiding workplace. Because their activities will now be less private, encourage your staff to keep their personal communication to their smartphones. Also, provide a copy of your written policy to employees to read and sign.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      3. Get the right technology tools
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
You don’t need to know every little employee activity, so look for apps and software that alert you of the most relevant problems so you can focus on more important tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If implemented correctly, employee monitoring makes your business more secure and productive. For more information about security and other IT support tools, get in touch with us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/should-you-monitor-your-employees-online-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1424303438.jpg" length="35152" type="image/jpeg" />
      <pubDate>Tue, 09 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/should-you-monitor-your-employees-online</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1424303438.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Small company IT hardware checklist</title>
      <link>https://www.apogeemsp.com/2019/04/small-company-it-hardware-checklist</link>
      <description>The IT hardware issues your business experienced in previous years should, ideally, be a thing of the past. Although some minor issues may remain, they can be avoided by taking care of your computer hardware. The following checklist can help you better manage your hardware. ✓ Clean up your computer components Wipe your monitor with […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The IT hardware issues your business experienced in previous years should, ideally, be a thing of the past. Although some minor issues may remain, they can be avoided by taking care of your computer hardware. The following checklist can help you better manage your hardware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      ✓ 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Clean up your computer components
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Wipe your monitor with clean, static-free fabric; remove excess dirt from your mouse’s exterior; and tidy up your keyboard with compressed air. Don’t forget your computer tower! Dust buildup can block your computer’s air vent and affect its performance. Ensure that your workstation is getting adequate ventilation and isn’t directly exposed to sunlight and other heat sources.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      ✓ 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Manage your cables
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you’re not giving your computers’ cables the attention they deserve, now’s a good time to do so. Other than wiping the thick coat of dust off of computer cables, consider using cable management solutions that unclutter and untangle messy wires. These don’t just organize and secure your cables, they also help ensure your PCs run quieter and are less prone to overheating as a result of blocked air vents.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Planning to relocate or upgrade in the near future? Organizing your computers’ cables now makes future relocation and upgrading processes much easier.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      ✓ 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Review and update your inventory
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Keeping an inventory of all your hardware helps you manage hardware life cycles and purchases, identify items that are near their end of life, and ensure you avoid duplicate purchases of items already in stock.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Your inventory list should include all owned and leased devices: PCs and laptops, printers and scanners, tablets and smartphones, and modems and other network hardware. Update all your assets’ serial numbers and keep track of their respective users and location.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      ✓ 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Printer maintenance
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Clean the interiors and exteriors of your printers, including paper trays, which are sure to have accumulated dirt from years of use. You should also repair and/or replace parts and accessories such as print heads and cartridges that are no longer in good condition. Should you decide to do a complete printer maintenance, check for the latest software updates for your printers and install them immediately.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      ✓ 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Implement a hardware policy
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      This is also a good time to create a technology guideline that your employees can follow to ensure they work efficiently. These guidelines reduce the need to spend on unnecessary repairs, keeping the succeeding year’s checklist shorter. With clear instructions on the proper use, replacement, and storage of your hardware and devices, you’ll be better able to manage your hardware for years to come.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      With a more organized IT hardware inventory, you have one less thing to worry about. Want to get more in-depth hardware management advice? Call our experts today.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/small-company-it-hardware-checklist/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3700717441.jpg" length="43418" type="image/jpeg" />
      <pubDate>Thu, 04 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/small-company-it-hardware-checklist</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3700717441.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Must-have extensions for your Google Chrome</title>
      <link>https://www.apogeemsp.com/2019/04/must-have-extensions-for-your-google-chrome</link>
      <description>Google Chrome is the most popular and most used browser in the world. And because of its unparalleled speed, user-friendly interface, and powerful performance, it’s also touted as the best browser. But did you know that the Chrome Web Store is full of extensions you can install to add extra features to your browser? Here […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Google Chrome is the most popular and most used browser in the world. And because of its unparalleled speed, user-friendly interface, and powerful performance, it’s also touted as the best browser. But did you know that the Chrome Web Store is full of extensions you can install to add extra features to your browser? Here are some extensions you should definitely try.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  StayFocusd

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As the name suggests, StayFocusd helps you stay focused. This is a perfect tool for people who work on computers all day to stop themselves from getting distracted by the many wonderful things on the internet. Essentially, it’s an extension that restricts your time on websites that can cause your productivity to dip, particularly social media sites like Facebook, YouTube, and Twitter. Once you’ve reached the time limit, StayFocusd blocks access to those sites, reminding you to focus on your work.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  AdBlock

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    AdBlock claims to be the most popular extension for Chrome. It has over 10 million active users, and for good reason. In a virtual world full of advertisements, AdBlock offers a break by blocking most ads from showing on Chrome. It’s also bound to improve your experience and increase the speed of your browser, since it blocks shady advertisements on the web, some of which are designed to trick people into downloading something that could harm their computers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  LastPass

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Remembering passwords can be quite a headache; good thing there’s LastPass. While Chrome already has a built-in password manager, LastPass is a better option when it comes to password management. Instead of trying to memorize countless passwords for your online accounts, LastPass can generate new and secure passwords every time you log in to a website and sync your passwords whenever you need them. With LastPass, you can easily gain access to your accounts, enter credit card details, and fill out online forms with just a few clicks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Evernote Web Clipper

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Never lose anything on the internet again by storing web pages on Evernote. While you can mark sites by using Chrome’s built-in bookmarks option, Evernote is a more powerful option. The extension allows you to quickly and easily save web content from Chrome and transfer it straight into your Evernote account. With the press of a button, you can grab an image from the web page, make annotations, create summary links, and save a distraction-free version for later use.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Pocket

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Pocket is another way to keep track of your favorite web content. With Pocket, you can save articles, videos, and any other web pages for later viewing. Simply hit the Pocket extension button when you come across something interesting and that page will automatically be synced to all your devices, so you can view it at any time, even without an internet connection. With Pocket, you can set things aside when you have important work at hand. If you can’t read the content now, Pocket it for later.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Momentum

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Momentum is an alternative new tab page that replaces the default Chrome landing page. Equipped with a personalized dashboard that features a beautiful scenic background, a daily inspirational quote, the weather report, a to-do list, and quick links widgets for your favorite sites, Momentum could just be the dose of inspiration you’re looking for.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Learn more about the different productivity apps the Chrome Web Store has to offer. Get in touch with our experts today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/must-have-extensions-for-your-google-chrome/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2893410046.jpg" length="39374" type="image/jpeg" />
      <pubDate>Wed, 03 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/must-have-extensions-for-your-google-chrome</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2893410046.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Add minutes to your day with email automation</title>
      <link>https://www.apogeemsp.com/2019/04/add-minutes-to-your-day-with-email-automation</link>
      <description>How many routine emails would you say your sales and marketing teams send every day? If it isn’t that much, is that because you don’t have the manpower to accomplish mass outreach campaigns? If that’s the case, email automation is the perfect solution to staying in touch with customers and prospects economically. What is email […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    How many routine emails would you say your sales and marketing teams send every day? If it isn’t that much, is that because you don’t have the manpower to accomplish mass outreach campaigns? If that’s the case, email automation is the perfect solution to staying in touch with customers and prospects economically.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is email automation?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Usually included in customer relationship management (CRM) software, email automation centers around the idea of integrating your business data into emails to customers and prospects. This allows you to draft templates with placeholders for names, addresses, and other variables that the platform will match with individuals from your email list.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What’s more, you can personalize how and when your emails go out to clients. Automatically inserting customer data into an email is great, but it still requires that you draft the content that surrounds it and hit 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Send
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    . Email automation grants you the ability to create templated emails that are automatically merged with client data and sent when certain conditions are met.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Examples of email automation

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To really get an idea of how valuable this solution is, it’s important to see what it looks like in action. Say you own an e-commerce site that sells complementary goods, such as golf clubs and golf balls. You could create a campaign wherein anytime someone buys a set of clubs, pre-written emails automatically go out one month later on how high-quality golf balls improve your handicap.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You’re not limited to two-step workflows either. Take a look at this example:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Email automation means there’s no need to micromanage your customer relationships. As long as you define the path to purchase for high-volume products, you can program workflows to nurture customers and prospects automatically.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For as little as a couple of hundred dollars per month, your customer outreach campaigns can compete on the same level as your corporate counterparts with little effort from your team. Throw an expert IT provider into the mix and you have the ability to blow the competition out of the water. To learn more, contact us today!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/add-minutes-to-your-day-with-email-automation-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1779439371.jpg" length="9522" type="image/jpeg" />
      <pubDate>Tue, 02 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/add-minutes-to-your-day-with-email-automation</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1779439371.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>IT innovations that transform healthcare</title>
      <link>https://www.apogeemsp.com/2019/04/it-innovations-that-transform-healthcare</link>
      <description>The mere mention of the word “technology” elicits a certain expectation. Namely, that we’re dealing with something that’s modern, new, and has the potential to change our lives. In healthcare, new and transformative solutions are constantly being created. Here are some you should know about. The “internet of things” The “internet of things” (IoT) literally […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The mere mention of the word “technology” elicits a certain expectation. Namely, that we’re dealing with something that’s modern, new, and has the potential to change our lives. In healthcare, new and transformative solutions are constantly being created. Here are some you should know about.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The “internet of things”

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The “internet of things” (IoT) literally means that more "things" other than computers are being connected to the internet. People, cars, buildings, household objects, etc. will all be fitted with sensors and network connectivity that will allow them to send and receive data over the internet.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The implication for healthcare providers is all about data capture and analysis, as this kind of technology will allow physicians to have access to patients’ vital signs on demand: blood pressure, body temperature, glucose levels, and respiratory rate will be read, analyzed, and recorded, all while patients remain in the comfort of their home.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Machine learning and artificial intelligence

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Computers are programmed to do everything from making coffee to flying planes. But with machine learning and artificial intelligence, they can also track terabytes of health information culled from electronic health records (EHRs), laboratory tests, and recommend an appropriate diagnosis.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The need for highly trained doctors in hospitals won’t go away anytime soon, but AI could enable organizations to provide speedy treatments and improve patient turnover.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  A virtual healthcare reality

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    By simply donning a special virtual reality (VR) headset, a user can be “tricked” into thinking they’re in an environment that they’re not. And the technology is already being used to treat autism and post-traumatic stress disorder (PTSD), as well as conduct training in emergency response and patient diagnosis.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But it’s the future possibilities that defy belief: imagine a doctor in a big city being “transported” via VR to a rural clinic in the countryside to interact with patients, participate in evaluating them, and even perform their surgeries.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This sort of scenario isn’t as far-fetched as it may sound, and it may not even be that far off, either. So now might not be a bad time to evaluate how these futuristic-sounding advances — these disruptive technologies — might impact your future.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To find out more about the latest groundbreaking developments in healthcare IT, call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/04/it-innovations-that-transform-healthcare/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4252226948.jpg" length="23979" type="image/jpeg" />
      <pubDate>Mon, 01 Apr 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/04/it-innovations-that-transform-healthcare</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4252226948.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity and managed IT services</title>
      <link>https://www.apogeemsp.com/2019/03/cybersecurity-and-managed-it-services</link>
      <description>The saying that every company is a technology company is undeniably true, with today’s enterprises unable to function without digital hearts, veins, and arteries. This system, however, comes with a price: a daily onslaught of hacking and other cyberthreats. As such, expertise and robust solutions in cybersecurity are no longer the privilege and luxury of […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The saying that every company is a technology company is undeniably true, with today’s enterprises unable to function without digital hearts, veins, and arteries. This system, however, comes with a price: a daily onslaught of hacking and other cyberthreats. As such, expertise and robust solutions in cybersecurity are no longer the privilege and luxury of large companies, but a necessity for all businesses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The numbers

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    According to the Ponemon Institute’s 2018 State of Cybersecurity in Small &amp;amp; Medium Size Businesses (SMBs) survey, cyber attacks on SMBs have increased from 61 percent in 2017 to 67 percent in 2018. Only 28 percent of these SMBs evaluated their ability to mitigate threats, vulnerabilities, and attacks as highly effective. 58 percent of SMBs in the study experienced a data breach in the last year.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Most SMBs in Ponemon’s research said attacks against their companies had severe financial consequences. For instance, the report cited that many of them spent an average of $1.43 million because of the damage or breach of IT resources, a 33 percent increase from 2017. Disruption to operations also cost an average of $1.56 million, a 25 percent increase from 2017.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The attacks

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    So what types of cyberattacks on SMBs were prevalent last 2018? According to the study, the order from most to least common are as follows: phishing/social engineering, web-based attacks, general malware, compromised/stolen devices, denial of services, advanced malware/zero day attacks, SQL injection, malicious insider, cross-site scripting, and uncategorized attacks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Why managed services?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Partnering with MSPs is the most effective way to prevent attacks and protect your business from these malicious threats. They include a full range of proactive IT support that focuses on advanced security, such as around the clock monitoring, data encryption and backup, real-time threat prevention and elimination, network and firewall protection, security awareness training, and more.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Not only that, but because managed services are designed to identify and fix weak spots in your IT infrastructure, you’ll optimize the digital backbone of your business processes. You’ll have faster network performance, a business continuity and disaster recovery strategy, as well as minimal downtime. One of the best things about managed services is that you get a dedicated team of IT professionals ready to assist you for any technology problems you may encounter. This is much more effective and budget-friendly than having in-house personnel handling all your IT issues.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Being proactive when it comes to cybersecurity is the only way to protect what you’ve worked hard to build. If you’d like to know more about how managed services can benefit your business, just give us a call, we’re sure to help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/03/cybersecurity-and-managed-it-services/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1783002908.jpg" length="30409" type="image/jpeg" />
      <pubDate>Fri, 22 Mar 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/03/cybersecurity-and-managed-it-services</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1783002908.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Stretch your laptop’s battery life</title>
      <link>https://www.apogeemsp.com/2019/03/stretch-your-laptops-battery-life</link>
      <description>More people use laptops to do work on the go, making long battery life a major priority. Wouldn't it be great if you could stretch and optimize the life of your laptop battery? These useful tips will make sure that your laptop's battery will last longer. Some truths about your laptop battery Batteries in many […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More people use laptops to do work on the go, making long battery life a major priority. Wouldn't it be great if you could stretch and optimize the life of your laptop battery? These useful tips will make sure that your laptop's battery will last longer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Some truths about your laptop battery

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Batteries in many modern devices are lithium-based — either lithium-ion or lithium-polymer — and users must take note of the following guidelines for proper battery maintenance:
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What else can degrade your battery

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Besides being naturally prone to deterioration, your battery can degrade due to higher-than-normal voltages, which happens when you keep your battery fully charged at all times. Even though a modern laptop battery cannot be overcharged, doing so will stress and harm your battery.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Both extremely high temperatures (above 70°F) and low temperatures (32–41°F) can also reduce battery capacity and damage its components. The same goes for storing a battery for long periods of time, which can lead to the state of extreme discharge. Another factor is physical damage. Remember that batteries are made up of sensitive materials, and sustaining a shock from a fall or similar  can damage them.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How to prolong your battery life

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Now that you know some facts about your laptop battery, it’s time to learn how to delay its demise:
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      These are just a few tips on extending the life of your hardware. There are many more ways you can maximize your hardware efficiency and extend its longevity. Call our experts today to find out more!
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/03/stretch-your-laptops-battery-life/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2440830547.jpg" length="39352" type="image/jpeg" />
      <pubDate>Wed, 20 Mar 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/03/stretch-your-laptops-battery-life</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2440830547.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>3 Reasons why security is better in the cloud</title>
      <link>https://www.apogeemsp.com/2019/03/3-reasons-why-security-is-better-in-the-cloud</link>
      <description>If small- and medium-sized businesses (SMBs) think cybersecurity is impossible to manage now, just think about what it was like before the internet provided a way to receive IT support remotely. Today, enterprise-level solutions and security can be delivered from almost anywhere in the world. Read on to find out why that’s even safer than […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If small- and medium-sized businesses (SMBs) think cybersecurity is impossible to manage now, just think about what it was like before the internet provided a way to receive IT support remotely. Today, enterprise-level solutions and security can be delivered from almost anywhere in the world. Read on to find out why that’s even safer than you realize.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Hands-on management

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Unless you have an overinflated budget, relying on local copies of data and software means your IT staff is forced to spread themselves across a bevy of different technologies. For example, one or two in-house tech support employees can’t become experts in one service or solution without sacrificing others. If they focus on just cybersecurity, the quality of hardware maintenance and help desk service are going to take a nosedive.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    However, cloud service providers (CSPs) benefit from economies of scale. CSPs maintain tens, sometimes thousands, of servers and hire technicians who specialize in every subset of cloud technology.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Fewer vulnerabilities

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud security isn’t superior just because more technicians are watching over servers. When all the facets of your business’s IT are in one place, your technology is more susceptible to a slew of cyber incidents.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For example, a server sitting on the same network as workstations could be compromised by an employee downloading malware-infested files. And this exposure extends to physical security as well. The more employees you have who aren’t properly trained in cybersecurity, the more likely it is that one of them will leave a server room unlocked or unsecured.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    CSPs exist solely to provide their clients with cloud services. There are no untrained employees and there are significantly fewer access points to the network.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Business continuity

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The same technology that allows you to access data from anywhere in the world also allows you to erect a wall between your local network and your data backups. Most modern iterations of malware are programmed to aggressively replicate themselves, and the best way to combat this is by storing backups in the cloud. In the cybersecurity world, this is commonly referred to as data redundancy, and nowhere is it as easy to achieve as in the cloud.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The cloud doesn’t only keep your data safe from the spread of malware; it also keeps data safe from natural and man-made disasters. When data is stored in the cloud, employees will still have access to it in the event that your local workstations or servers go down.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The cloud has come a long way over the years. It’s not just the security that has gotten better; customized software, platforms, and half a dozen other services can be delivered via the cloud. Whatever it is you need, we can secure and manage it for you. Call us today!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/03/3-reasons-why-security-is-better-in-the-cloud-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/937268428.jpg" length="10346" type="image/jpeg" />
      <pubDate>Tue, 19 Mar 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/03/3-reasons-why-security-is-better-in-the-cloud</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/937268428.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Top ways ERP improves your business</title>
      <link>https://www.apogeemsp.com/2019/03/top-ways-erp-improves-your-business</link>
      <description>The only way for your business to succeed is for it to keep improving. There are many areas you can always refine, like company policy and customer service. One important improvement you should consider, however, is getting enterprise resource planning (ERP) software, and here’s why. ERP explained ERP is a program that integrates all your […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      The only way for your business to succeed is for it to keep improving. There are many areas you can always refine, like company policy and customer service. One important improvement you should consider, however, is getting enterprise resource planning (ERP) software, and here’s why.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  ERP explained

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    ERP is a program that integrates all your systems into a single database, so if you want to take a look at human resources, accounting, or sales, you only need to access one system instead of three. In practice, this means that everyone, regardless of department, will be able to access the same information. This also means that employees will no longer have to re-enter data onto their department-specific database, because all databases will already have been linked.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Deeper insight

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Simplicity isn’t the only merit of an ERP, however. A single database lets you see all information across every branch of your business and gain actionable insights that enable you to make more informed decisions. Financial reporting, for example, benefits a lot from ERP, since general ledgers, revenue recognition, and tax reporting functionality are built into most ERP software solutions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In addition to this, ERP systems come equipped with business intelligence features that provide intuitive analysis into your operations and forecast the growth of your company. This helps you and other executives identify bottlenecks and business opportunities.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Better customer service

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    ERP makes better and faster customer service possible. For instance, if a customer asks whether or not an item is still in stock, customer service representatives can easily access the ERP database and provide a quick answer, instead of having to ask the supply manager.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Simplified compliance

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With an ERP, meeting stringent data management regulations is much easier. That’s because the software generally comes with audit functionality, giving you full visibility into your processes. It also provides templates and guidance to help you meet regulations within your industry, such as the Sarbanes-Oxley Act and the International Financial Reporting Standards.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Streamlined workflows

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    ERP streamlines workflows by eliminating redundant and time-consuming tasks through automation. For one, you can set your ERP to instantly reorder materials when stock levels have reached a certain threshold. This ensures that your enterprise won’t have to deal with out-of-stock or overstocking incidents. Moreover, you can even assign workflows that route invoices and reimbursements to the right accountant to make sure tasks are handled quickly and efficiently.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Rich integrations

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the most beautiful things about ERP is its integration capabilities: you can integrate it with other services to extend its capabilities. For example, if you need to track customer information and sales figures, you can combine ERP with customer relationship management software or pair it with e-commerce services to streamline web-based purchases. This way, your processes will be seamless and everything you need will be at your fingertips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As your business grows, your business needs change as well. ERP systems can adapt to your ever-changing needs by giving you unparalleled business management solutions. If you need to add further value to your business, call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/03/top-ways-erp-improves-your-business/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4198350225.jpg" length="31748" type="image/jpeg" />
      <pubDate>Fri, 15 Mar 2019 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/03/top-ways-erp-improves-your-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4198350225.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Threats facing financial institutions today</title>
      <link>https://www.apogeemsp.com/2019/03/threats-facing-financial-institutions-today</link>
      <description>Despite efforts to remain secure, financial services make up 35% of all data breaches, earning the unfortunate title of most breached sector. It provides multiple avenues for cybercriminals to monetize their skills through extortion, theft, and fraud. These incidents compel businesses and individuals to take cybersecurity seriously. How prepared is your business? A good starting […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Despite efforts to remain secure, financial services make up 35% of all data breaches, earning the unfortunate title of most breached sector. It provides multiple avenues for cybercriminals to monetize their skills through extortion, theft, and fraud. These incidents compel businesses and individuals to take cybersecurity seriously. How prepared is your business? A good starting point is to be in the loop of the latest threats and techniques. Find out what they are.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Extortion
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Distributed denial of service (DDoS) attacks, which are typically delivered from massive botnets of zombie computers or internet of things (IoT) devices, have been used to bring down banking networks. This occurs when a targeted server or system is overwhelmed by multiple compromised networks. It’s essentially like a traffic jam clogging up the highway, preventing regular traffic from arriving at its intended destination.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Some cybercriminals are relentless with DDoS attacks and follow them up with cyberextortion, demanding payment in return for release from costly downtime. Banks cannot defend against these attacks alone, so they rapidly share information among themselves through organizations such as FS-ISAC4 and rely upon the ability of their internet service provider to handle and redirect massive quantities of traffic.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Social media attacks
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
This happens when fraudsters use fake profiles to gather information for social engineering purposes. Thankfully, with new regulations such as the General Data Protection Regulation (GDPR), big companies like Facebook and Twitter have significantly enhanced their security and privacy policy with regards to their data handling practices. The unprecedented reach of social media is something companies cannot afford to ignore because of the possible implications a data breach can have on businesses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Spear phishing
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Spear phishing is an attack where cybercriminals send out targeted emails ostensibly from a known or trusted sender in order to trick the recipient into giving out confidential information. Over the years, hackers have upped their game and cast a bigger net, targeting unwitting employees to wire money. This attack is called business email compromise (BEC), where a fraudster will purport to be a CEO or CFO and request for large money transfers to bogus accounts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Point-of-sale (PoS) malware
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
PoS malware targets PoS terminals to steal customer payment (especially credit card) data from retail checkout systems. Cybercriminals use a memory scraper that operates by instantly detecting unencrypted type 2 credit card data, which is then sent to the attacker’s computer to be sold on underground sites.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      ATM malware
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
GreenDispenser is an ATM-specific malware that infects ATMs and allows criminals to extract large sums of money while avoiding detection. Recently, reverse ATM attacks have also emerged. Here, PoS terminals are compromised and money mules reverse transactions after money is withdrawn or sent to another bank account. In October 2015, issuers were mandated to shift to EMV or Chip-and-PIN system to address the weakness of the previous payment system.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Credential theft
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Dridex, a well-known credential-stealing software, is a banking Trojan that is generally distributed through phishing emails. It infects computers, steal credentials, and obtain money from victims’ bank accounts.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Other sophisticated threats
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Various data breach methods can be combined to extract data on a bigger scale. Targeting multiple geographies and sectors at once, this method normally involves an organized crime syndicate or someone with a highly sophisticated setup. For example, the group Carbanak primarily targeted financial institutions by infiltrating internal networks and installing software that would drain ATMs of cash.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Additionally, with the rise of cryptocurrency, cybercriminals are utilizing cryptojacking, a method that involves the secret use of devices to mine cryptocurrency.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The creation of defensive measures requires extensive knowledge of the lurking threats, and our team of experts is up to date on the latest security information. If you have any questions, feel free to contact us to find out more about TTPs and other weapons in the hacker’s toolbox.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/03/threats-facing-financial-institutions-today/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1072042649.jpg" length="30885" type="image/jpeg" />
      <pubDate>Wed, 06 Mar 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/03/threats-facing-financial-institutions-today</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1072042649.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Managed IT for healthcare: Why it’s vital</title>
      <link>https://www.apogeemsp.com/2019/03/managed-it-for-healthcare-why-its-vital</link>
      <description>Working with a reliable managed services provider (MSP) doesn’t just help you comply with healthcare regulatory authorities when it comes to securing data. It also provides hassle-free staffing services for workflow efficiency, increased staff productivity, improved customer relations, and more. Read on to understand the benefits of partnering with a reliable MSP. They guarantee response […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Working with a reliable managed services provider (MSP) doesn’t just help you comply with healthcare regulatory authorities when it comes to securing data. It also provides hassle-free staffing services for workflow efficiency, increased staff productivity, improved customer relations, and more. Read on to understand the benefits of partnering with a reliable MSP.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  They guarantee response times

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to providing healthcare services, talking about fast response times is not the only thing that matters. You should always make sure that your provider guarantees response times, and that you’re able to contact them 24/7. Consider this: in a scenario where something breaks or you come across technical issues in the dead of the night, your best bet would be to contact your MSP, not to try fixing things on your own. Therefore, you need a provider who is able to give assistance whenever you need it most.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  They support a business continuity plan

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You risk putting your organization in jeopardy if your MSP can’t assist in your recovery from major outages or natural disasters. A business continuity plan is absolutely necessary in your healthcare organization — you simply can’t afford to lose all your valuable medical data in the event of a disaster. You need all the help you can get from your IT provider to maintain redundant systems, as well as help manage automatic failovers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  They provide proactive security

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In the world of healthcare data security, aligning your practice with HIPAA compliance mandates is essential. Failing to meet regulations may result in huge fines, serious penalties, and even the withdrawal of your license to operate. The ideal MSP should offer core security services that include identity-based security and encryption, authorized privileges and access control, and data accountability and integrity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  They offer staffing services

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Healthcare staffing shouldn’t be a hassle, but thanks to the changing dynamics of healthcare IT, that’s exactly what it can become. You need an MSP that assumes full responsibility for your clinical labor while providing you with a single point of contact for all your staffing operations, including account management, customer support, order placement, and more.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Choosing the right MSP can be tedious, but when you do make the switch, they can streamline your operations, reduce operational costs, and enhance workforce transparency.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to learn how great technology and support can benefit your healthcare practice, get in touch with us today. We provide the perfect set of healthcare IT solutions and outstanding support to drive your organization forward.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/03/managed-it-for-healthcare-why-its-vital/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/495920009.jpg" length="21797" type="image/jpeg" />
      <pubDate>Mon, 04 Mar 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/03/managed-it-for-healthcare-why-its-vital</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/495920009.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Troubleshoot your Wi-Fi with ease</title>
      <link>https://www.apogeemsp.com/2019/03/troubleshoot-your-wi-fi-with-ease</link>
      <description>You’ve invested in Wi-Fi routers so you can access emails, collaborate in real time, browse Facebook, and watch YouTube videos at blistering speeds. But when your Wi-Fi refuses to work the way it should, the frustration sets in and you begin to contemplate smashing your router into pieces. Avoid that temptation with these five easy […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You’ve invested in Wi-Fi routers so you can access emails, collaborate in real time, browse Facebook, and watch YouTube videos at blistering speeds. But when your Wi-Fi refuses to work the way it should, the frustration sets in and you begin to contemplate smashing your router into pieces. Avoid that temptation with these five easy ways to troubleshoot common Wi-Fi
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Range constraints

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Wi-Fi works via radio waves that are broadcast from a central hub, usually a piece of hardware known as a router. To avoid a weak signal in your office, make sure:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Note that Wi-Fi range constraints can also occur from interference, so if your office is situated in a highly populated area, try changing your router’s channel.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Slow speeds

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Despite a high-speed or fiber optic internet connection, slow load times can still occur for a number of reasons. To optimize speeds, try the following:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Connection issues

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We understand how frustrating it can be when the Wi-Fi network shows up on your device but still won’t connect. Before you give up, these solutions might help:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Unstable connections

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Random hiccups in your Wi-Fi connection are normal from time to time. However, if they become a constant nuisance in your office, try the following quick fixes:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Network not found

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Router glitches can result in your Wi-Fi network not appearing at all. Two solutions that can resolve this problem are:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you experience Wi-Fi issues, these tips will help you avoid serious downtime. But if you’d rather have a dedicated technology provider take care of your hardware needs, give us a call and we’ll be happy to help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/03/troubleshoot-your-wi-fi-with-ease/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3624835415.jpg" length="28154" type="image/jpeg" />
      <pubDate>Fri, 01 Mar 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/03/troubleshoot-your-wi-fi-with-ease</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3624835415.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Understanding HTTPS</title>
      <link>https://www.apogeemsp.com/2019/02/understanding-https</link>
      <description>Are you an avid online shopper? Have you noticed if each payment page has HTTPS in its URL lead-up? If you’re not absolutely sure, you might be a prime target for identity theft. Here's why you should make sure that the websites you browse for shopping have a little padlock icon on them in the […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Are you an avid online shopper? Have you noticed if each payment page has HTTPS in its URL lead-up? If you’re not absolutely sure, you might be a prime target for identity theft. Here's why you should make sure that the websites you browse for shopping have a little padlock icon on them in the URL bar.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  HTTPS Encryption

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you visit a website that doesn’t use HTTPS, which is common with older websites that have been left on its domain with minimal intervention, everything you type or click on that website is sent across the network in plain text. So, if your bank’s website doesn’t use the latest protocols, your login information can be decrypted by anyone with even the most basic tools.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  HTTPS Certificates

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The other thing outdated web browsing lacks is publisher certificates. When you enter a web address into your browser, your computer uses an online directory to translate that text into numerical addresses then saves that information on your computer so it doesn’t need to check the online directory every time you visit a known website.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The problem is that if your computer is hacked, it could be tricked into directing www.google.com to the address 8.8.8.255, for example, even if that’s a malicious website. Oftentimes, this strategy is implemented to send users to sites that look exactly like what they expected, but are actually false-front sites designed to trick you into providing your credentials.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    HTTPS creates a new ecosystem of certificates that are issued by the online directories mentioned earlier. These certificates make it impossible for you to be redirected to a fraudulent website.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What this means for daily browsing

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most people hop from site to site too quickly to check each one for padlocks and certificates. Unfortunately, HTTPS is way too important to ignore. Here are a few things to consider when browsing:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your browser marks a website as “unsafe”, it is always best to err on the side of caution; do not click “proceed anyway” unless you are absolutely certain nothing private will be transmitted.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
There are web browser extensions that create encrypted connections to unencrypted websites (
    
  
  
                    &#xD;
    &lt;a href="https://www.google.com/url?q=https://www.eff.org/https-everywhere&amp;amp;sa=D&amp;amp;ust=1551145474007000&amp;amp;usg=AFQjCNFwF7e6WCRaCTpqJLKdf9B56LpR0Q" target="_blank"&gt;&#xD;
      
                      
    
    
      HTTPS Everywhere
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     is a reliable Firefox, Chrome, and Opera extension that encrypts your communications with websites).
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
HTTPS certificates don’t mean anything if you don’t recognize the company’s name. For example, goog1e.com (with the “l” replaced with a one) could have a certificate, but that doesn’t mean it’s a trustworthy site. Many unscrupulous cybercriminals utilize similar spellings of legitimate websites to fool people into thinking that they are in a secure site. Always be vigilant.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Avoid sites that don’t use the HTTPS protocol — it can be as simple as that.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you’re ready for IT support that handles the finer points of cybersecurity like safe web browsing, give our office a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/02/understanding-https/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/348847826.jpg" length="13502" type="image/jpeg" />
      <pubDate>Thu, 28 Feb 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/02/understanding-https</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/348847826.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How good is your disaster recovery plan?</title>
      <link>https://www.apogeemsp.com/2019/02/how-good-is-your-disaster-recovery-plan</link>
      <description>You may think you know all about disaster recovery plans (DRP) from attending conferences or reading up on the subject. But one of the best ways to learn is by example, and the following real-life case offers valuable lessons. Learn about the DPR audit of a state government office and the knowledge gained from it. […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You may think you know all about disaster recovery plans (DRP) from attending conferences or reading up on the subject. But one of the best ways to learn is by example, and the following real-life case offers valuable lessons. Learn about the DPR audit of a state government office and the knowledge gained from it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Hosting certain types of data and managing a government network legally bind you to maintain DRPs. After an audit of the Michigan Department of Technology and Budget, several failures led to a trove of helpful tips for small- and medium-sized businesses attempting to create a bulletproof disaster recovery plan.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Update and test your plan frequently
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
What was one of the first and most obvious failures of the department’s DRP? It didn’t include plans to restore an essential piece of their infrastructure — the department’s intranet. Without it, the employees are unable to complete even the most basic of tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The reason for the oversight? The last time the plan was updated was in 2011, 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      leaving out more than six years of IT advancements
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    . If annual revisions sound like too much work, just consider all of the IT upgrades and improvements you’ve made in this year alone. If they’re not accounted for in your plan, you’re destined to fail.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Keep your DRP in an easy-to-find location
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
It may seem a bit ironic that the best way to store your top-of-the-line business continuity solution is in a binder, but the Michigan Department of Technology and Budget learned the hard way that the alternatives don’t work. Auditors found the DRP stored on the same network it was meant to restore. Which means if something had happened to the network, the plan would be totally inaccessible.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your company would do well to store electronic copies on more than one network in addition to physical copies around the office and off-site.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Always prepare for a doomsday scenario
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
The government office made suitable plans for restoring the local area network (LAN), but beyond that, there was no way for employees to get back to work within the 24-hour recovery time objective.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your organization needs to be prepared for the possibility that there may not be a LAN to go back to. Cloud backups and software are the best way to keep everything up and running when your office is flooded or crushed beneath a pile of rubble.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your DRP is more than just a pesky legal requirement. It’s the insurance plan that will keep you in business when disaster strikes. Our professionals know the importance of combining both academic and real-world resources to make your plan airtight when either auditors or blizzards strike. Message us today about bringing that expertise to your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/02/how-good-is-your-disaster-recovery-plan/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2671940492.jpg" length="46657" type="image/jpeg" />
      <pubDate>Wed, 27 Feb 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/02/how-good-is-your-disaster-recovery-plan</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2671940492.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Fileless malware: The guileful threat</title>
      <link>https://www.apogeemsp.com/2019/02/fileless-malware-the-guileful-threat</link>
      <description>Fileless malware isn’t new and are an increasingly prevalent threat against organizations. This type of malware is not as visible as traditional malware and employs a variety of techniques to stay persistent. Consequently, it can adversely affect your business process and the infrastructures that run them. Let’s take a closer look at how it works […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Fileless malware isn’t new and are an increasingly prevalent threat against organizations. This type of malware is not as visible as traditional malware and employs a variety of techniques to stay persistent. Consequently, it can adversely affect your business process and the infrastructures that run them. Let’s take a closer look at how it works and what can be done to defend against them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      What is fileless malware?
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Fileless malware is stored in random access memory (RAM) instead of on the hard drive. In a typical fileless infection, payloads can be injected into the memory of existing software or applications by running scripts within whitelisted or authenticated applications such as PowerShell, which is designed to automate system administration tasks such as view all USB devices, drives, and services installed in the system, schedule a series of demands, or terminate processes (i.e., Task Manager).
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Because there are no files to trace, fileless malware escapes detection from most antimalware programs, especially those that use databases of precedents. Furthermore, most automated sensors cannot recognize illicit scripts, and cybersecurity analysts who are trained to identify them usually have a difficult time establishing where to start looking. Fileless malware isn’t as visible compared to traditional malware. They employ a variety of techniques to stay persistent, and can adversely affect the integrity of a business’s process and the infrastructures that run them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Fileless malware by the numbers
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cybersecurity firm Kaspersky Lab 
    
  
  
                    &#xD;
    &lt;a href="https://www.kaspersky.com/about/press-releases/2014_stuxnet-patient-zero-first-victims-of-the-infamous-worm-revealed"&gt;&#xD;
      
                      
    
    
      first discovered
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     a type of fileless malware on its very own network a couple of years ago. The final verdict was that it originated from the Stuxnet strain of state-sponsored cyber warfare. The high level of sophistication and government funding meant fileless malware was virtually nonexistent until the beginning of 2017.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In November 2016, attacks using fileless malware saw an uptick of 13% according to a 
    
  
  
                    &#xD;
    &lt;a href="https://www.wired.com/2017/02/say-hello-super-stealthy-malware-thats-going-mainstream/"&gt;&#xD;
      
                      
    
    
      report
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    . In the same quarter, attacks surged 33% compared to the first quarter. During the first quarter of 2017, more PowerShell-related attacks were reported on more than 12,000 unique machines.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Kaspersky Lab uncovered over 140 infections across 40 different countries. Almost every instance of the fileless malware was found in financial institutions and worked towards obtaining login credentials. In the worst cases, infections had already gleaned enough information to allow cyberattackers to withdraw undisclosed sums of cash from ATMs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In 2018, cybersecurity firm Trend Micro detected a rising trend of fileless threats throughout the first half of the year.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Is your business at risk?
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It is unlikely your business would have been targeted in the earliest stages of this particular strain of malware, but it’s better to be safe than sorry. Businesses should practice defense in depth, where multilayered safeguards are implemented to reduce exposure and mitigate damage. But apart from cultivating a security-aware workforce, what actionable countermeasures can organizations do?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While your business might not be in immediate danger, you should employ solutions that analyze trends in behavior. It is also wise to invest in a managed service provider that offers 24/7 network monitoring, proper patches, and software updates. Call today to get started.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/02/fileless-malware-the-guileful-threat/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3649616112.jpg" length="37940" type="image/jpeg" />
      <pubDate>Tue, 19 Feb 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/02/fileless-malware-the-guileful-threat</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3649616112.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>PC makers struggle to meet demand</title>
      <link>https://www.apogeemsp.com/2019/02/pc-makers-struggle-to-meet-demand</link>
      <description>Top PC makers are becoming more concerned as Intel CPU shortages continue to persist. According to several reports, Intel has struggled to keep up with the rising demand for high-performance computer chips, which will affect millions of businesses. Here’s a quick rundown on the Intel PC shortage. Reasons for the shortage There are many contributors […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Top PC makers are becoming more concerned as Intel CPU shortages continue to persist. According to several reports, Intel has struggled to keep up with the rising demand for high-performance computer chips, which will affect millions of businesses. Here’s a quick rundown on the Intel PC shortage.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Reasons for the shortage
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
There are many contributors to Intel’s long-running chip production problems. For starters, demand for Intel computer chips has been higher than expected as more businesses depend on resource-intensive applications, cloud computing, and state-of-the-art machines to gain a competitive edge.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Additionally, there are major delays in the production of Intel’s next-gen 10-nanometer processors, largely because the company is short on capacity. This means businesses will not have access to PCs featuring these processors until much later in 2019.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Intel also appears to be prioritizing development of server CPUs, as they make up a huge portion of the company’s revenue. Focusing on server chips, however, has resulted in slower production rates of consumer-grade CPUs. Desktop CPU revenues, in particular, lagged significantly behind notebook and server CPUs, which resulted in the shortage of chips for desktop PCs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      What’s being done
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Experts predict that customers will have had enough server CPUs so production for these productions will slow down by the second half of 2019, freeing up enough capacity to meet the demands for desktop and notebook CPUs. In fact, according to Intel’s interim chief executive Bob Swan, “We are working closely with our customers to align demand with available supply while we add capacity and we expect supply-demand balance to improve by mid-year.”
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Intel also promises that PC shortage issues will be completely resolved by the third quarter of 2019. In the meantime, computer hardware manufacturers like Lenovo and Asus have their work cut out for them. To make up for the Intel chip shortage, PC manufacturers are strongly considering switching to AMD processors for desktops and laptops.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      What does the shortage mean for businesses?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Businesses who are unable to acquire the newest Core, Celeron, and Pentium series processors for desktops and laptops may have to look for alternatives compatible with non-Intel chips. But if your company is running on a tight budget, it may make more sense to wait until late 2019 to upgrade to computers equipped with next-gen Intel processors.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Sticking with older hardware does leave your business exposed to security and downtime risks, so it’s important to stay on top of the latest updates and regular maintenance. Fortunately, a top-notch managed services provider can proactively manage your hardware for a reasonable monthly fee.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to hear more about the latest hardware news and developments, stay tuned to our blog. We also provide services for all things IT, so contact us today!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/02/pc-makers-struggle-to-meet-demand/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/318236611.jpg" length="53210" type="image/jpeg" />
      <pubDate>Thu, 14 Feb 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/02/pc-makers-struggle-to-meet-demand</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/318236611.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Invaluable tips for online safety</title>
      <link>https://www.apogeemsp.com/2019/02/invaluable-tips-for-online-safety</link>
      <description>Let’s be honest, surfing the net in the comfort of your home or with the privacy of a small screen feels safe. However, certain sites could be snooping on your online activity by placing digital trackers called “cookies” on your devices. Here’s what happens to your personal details whenever you go online. With the headlines […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Let’s be honest, surfing the net in the comfort of your home or with the privacy of a small screen feels safe. However, certain sites could be snooping on your online activity by placing digital trackers called “cookies” on your devices. Here’s what happens to your personal details whenever you go online.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the headlines about data breaches and cyberattacks greeting you every time you go online, it seems impossible to have a surefire, foolproof way to keep your information secure. Sometimes cyber predators are relatively harmless, but oftentimes, their goal is to steal identities and financial information. Virus scanners and firewalls can definitely help, but here’s an added layer of protection when you go online.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is private browsing?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your web browser — whether it be Chrome, Edge, Firefox, Safari, or Opera — stores the addresses of the sites you visit, cookies that track your activity, passwords you’ve used, and temporary files you’ve downloaded.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This can be convenient if you frequently visit certain pages, can’t remember your login details, or if you’re trying to recall a website you visited a few days ago. But if someone else uses or gains access to your computer, your most private (and embarrassing) internet activities are exposed for anyone to see.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With private browsing — also called 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Incognito Mode
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     in Chrome and 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      InPrivate Browsing
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     in Edge — all the information listed above does not get recorded. In fact, all the websites and information you accessed during a private browsing session is discarded without a trace as soon as you close the browser. This can come in handy when you’re using a public computer because you’re instantly logged out of all the accounts after closing the window.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Private browsing also prevents cookies from being stored on your computer. In a normal browsing session, sites like Facebook will inundate you with highly targeted ads based on the sites and pages you’ve visited. But in private browsing mode, your internet activity won’t be used against you by marketing companies.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Another benefit of private browsing is you can use it to log in to several accounts on the same site, which is useful if you need to log in to two different Google accounts at the same time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Limitations of private browsing

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Although private browsing does prevent your web browser from storing your data, it doesn’t keep your online activities 100% private. If your computer is connected to the company network, system administrators can still keep track of what you’re browsing, even if you’re in Incognito Mode. Also, if spyware or keylogger malware is installed on your computer, hackers will still be able to see what you’re doing online.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A keylogger malware records every key you punched in and may send this information to a predefined email address without you knowing. This means passwords, answers to verification questions, account numbers, credit card details, or even the words you type in a chat can be emailed to someone spying on your online activities.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Even though private browsing has quite a few benefits, you shouldn’t solely depend on it for online privacy. Your computers and mobile devices must be equipped with Virtual Private Networks that encrypt your internet connection and prevent anyone from intercepting your data. And don’t forget to scan your computer for viruses with a strong anti-malware program to keep spyware and other malicious web monitoring software at bay.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you want to know where you can get these solutions or learn more about web browser security, call us today. We have the tools and expert advice you need to prevent anyone from snooping on your internet browsing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/02/invaluable-tips-for-online-safety/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1242725104.jpg" length="10549" type="image/jpeg" />
      <pubDate>Wed, 13 Feb 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/02/invaluable-tips-for-online-safety</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1242725104.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The pros and cons of EHRs</title>
      <link>https://www.apogeemsp.com/2019/02/the-pros-and-cons-of-ehrs</link>
      <description>The healthcare industry has been increasing its adoption of electronic health records (EHRs). The technology claims to improve on current paper-based methods. However, EHRs are not flawless. Learn more about the pros and cons of EHRs and decide for yourself. What is an electronic health record? An electronic health record (EHR) is an individual’s official […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The healthcare industry has been increasing its adoption of electronic health records (EHRs). The technology claims to improve on current paper-based methods. However, EHRs are not flawless. Learn more about the pros and cons of EHRs and decide for yourself.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is an electronic health record?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    An electronic health record (EHR) is an individual’s official health document accessible via mobile devices such as smartphones and tablets, and shareable between multiple facilities and agencies.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Typically, an EHR includes contact information, allergies, family history, list of medications, information regarding previous surgeries and procedures, and other relevant patient information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How EHRs improve patient care

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    EHRs improve patient care in significant ways. For one, they can aid in diagnosing patient illnesses based on past history and the patients’ complete health information. EHRs can also help reduce medical errors and false positives. Records can also be updated to provide last known information to the provider at the point of care.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Lastly, EHRs can also improve overall public health by providing a bird’s-eye view of the overall health of an entire patient population. This lets providers identify risk factors that most impact the patients and proactively prepare for potential outbreaks or illnesses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The big debate: EHR vs paper records

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The long-standing debate of digital versus traditional data storage has expanded to every industry, and healthcare isn’t spared from it either. While most agree that EHRs offer more benefits in comparison with paper records, EHRs themselves are not without drawbacks. Below are some of the major differences between paper and electronic records.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  EHRs in the future

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Experts on the subject seem to believe that EHRs need to 
    
  
  
                    &#xD;
    &lt;a href="https://www.cio.com/article/3011576/ehr/why-electronic-health-records-arent-more-usable.html"&gt;&#xD;
      
                      
    
    
      evolve a little more
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     before being fully accepted and integrated by all healthcare institutions. Some changes include:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Despite these, we can still expect EHRs in the future to eventually have more in-depth content and provide a more layered representation of a person’s history. Over time, this will lead to better diagnosis of patients and more accurate prescription of medicine.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Would you like advice on the best EHR systems in the market or on how to implement these EHR systems? Look no further and let our experts guide you. Call today.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/02/the-pros-and-cons-of-ehrs-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3407247231.jpg" length="25187" type="image/jpeg" />
      <pubDate>Mon, 04 Feb 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/02/the-pros-and-cons-of-ehrs</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3407247231.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Autocomplete password risks</title>
      <link>https://www.apogeemsp.com/2019/01/autocomplete-password-risks</link>
      <description>Advertisements and “helpful” suggestions based on your internet browsing habits can be troubling. But what’s even more alarming is that hackers have found another way of tracking you via seemingly harmless autocomplete passwords. Here’s what you need to know. Why auto-fill passwords are so dangerous As of December 2018, there are 4.1 billion internet users […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Advertisements and “helpful” suggestions based on your internet browsing habits can be troubling. But what’s even more alarming is that hackers have found another way of tracking you via seemingly harmless autocomplete passwords. Here’s what you need to know.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Why auto-fill passwords are so dangerous

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As of December 2018, there are 4.1 billion internet users in the world. This means users have to create dozens of passwords, either to protect their account or simply to meet the password-creation requirements of the platform they're using. Unfortunately, only 20% of US internet users have different passwords for their multiple online accounts.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Certain web browsers have integrated a mechanism that enables usernames and passwords to be automatically entered into a web form. On the other hand, password manager applications have made it easy to access login credentials. But these aren't completely safe.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Tricking a browser or password manager into giving up this saved information is incredibly simple. All a hacker needs to do is place an invisible form on a compromised webpage to collect users’ login information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Using auto-fill to track users

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For over a decade, there's been a password security tug-of-war between hackers and cybersecurity professionals. Little do many people know that shrewd digital marketers also use password auto-fill to track user activity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Digital marketing groups AdThink and OnAudience have been placing these invisible login forms on websites to track the sites that users visit. They've made no attempts to steal passwords, but security professionals said it wouldn’t have been hard for them to do. AdThink and OnAudience simply tracked people based on the usernames in hidden auto-fill forms and sold the information they gathered to advertisers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  One simple security tip for today

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A quick and effective way to improve your account security is to turn off auto-fill in your web browser. Here's how to do it:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This is just one small thing you can do to keep your accounts and the information they contain safe. For managed, 24×7 cybersecurity assistance that goes far beyond protecting your privacy, call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/autocomplete-password-risks/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3838992301.jpg" length="15961" type="image/jpeg" />
      <pubDate>Thu, 31 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/autocomplete-password-risks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3838992301.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Decrease printing costs in 5 easy ways</title>
      <link>https://www.apogeemsp.com/2019/01/decrease-printing-costs-in-5-easy-ways</link>
      <description>You may think that your printing infrastructure is only a minimal company expense. But if it is not managed well, you may end up with a bloated IT budget that mostly comprises of hardware and supplies purchases and equipment maintenance costs. Your business can save money and time by following these 5 tips. Replace outdated […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You may think that your printing infrastructure is only a minimal company expense. But if it is not managed well, you may end up with a bloated IT budget that mostly comprises of hardware and supplies purchases and equipment maintenance costs. Your business can save money and time by following these 5 tips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Replace outdated printers
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Outdated and cheap printers may be functional, but they are putting a huge dent in your IT budget.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Any piece of equipment that is seven years old (or older) requires frequent repairs and causes more trouble than it’s worth. Because old printers are no longer under warranty, fixing them is more costly and challenging. It’s also difficult to replace parts for old printers because manufacturers have stopped carrying them for models that have been phased out.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      When you replace outdated equipment with newer, multi-functional printers, you’re investing in hardware that will pay for itself with increases in productivity and efficiency.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Avoid purchasing unnecessary supplies
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      A poorly managed printer environment could result in a stockpile of cartridges, toners, and reams of paper. This happens when, for example, an employee uses a printer that’s about to run out of ink and makes an unnecessary request for new ink or toner. This is more common than you may think, and definitely more expensive.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      In the absence of a dedicated printer manager, you can avoid this situation by automating supply replacement. Assign a point person to proactively place orders when supplies are about to run out, so your company can avoid needless purchases.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Impose strict process workflows
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Submitting expense reports, filing reimbursements, and other administrative tasks require a proper document workflow. Without a guideline, employees and administrative staff tend to print an unnecessary amount of documents.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Automate your company’s document-driven processes to reduce or prevent redundant print jobs that result in stacks of abandoned documents. Not only 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      are these printouts
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       wasteful, 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      they're 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      also a security and privacy concern.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Go paperless
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Designing a document management solution that reduces paper consumption is the best way to save money. It may not be possible in every department, but those who can do their jobs without printing should be encouraged to do so by management. Printing lengthy email chains that can be discussed in a meeting is just one example of a wasteful practice that should be avoided.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Reduce IT support calls for printing issues
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Calling your company’s IT guys to assist with problems like paper jams, printer Wi-Fi issues, and other concerns reduces employee frustration. You and your IT personnel could avoid dealing with these productivity killers by identifying the problem areas of your print environment. Then, you can work on solutions specific to your office, such as drafting a printing workflow, or getting help from document management experts who can recommend time- and budget-saving solutions.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Having a group of experts manage your IT workflow can make your day-to-day operations more efficient and help you save on printing costs. Our experts will gladly recommend best practices and tips on document management. Call us today.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/decrease-printing-costs-in-5-easy-ways/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/764252476.jpg" length="22168" type="image/jpeg" />
      <pubDate>Tue, 29 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/decrease-printing-costs-in-5-easy-ways</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/764252476.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The cloud and virtualization explained</title>
      <link>https://www.apogeemsp.com/2019/01/the-cloud-and-virtualization-explained</link>
      <description>Cloud computing and virtualization are similar but that doesn’t mean that one can be substituted for the other. Each has its own benefits, so it pays to know how both work, so you can take advantage of them. Virtualization Imagine a company with five servers, each assigned a single task such as storage, email, etc. […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud computing and virtualization are similar but that doesn’t mean that one can be substituted for the other. Each has its own benefits, so it pays to know how both work, so you can take advantage of them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Virtualization
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Imagine a company with five servers, each assigned a single task such as storage, email, etc. If there were a spike in email traffic, it would overwhelm the email server, causing it to slow down. Adding another server would solve this problem, but it would be expensive and inefficient on days with less traffic.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      With virtualization software, you can combine the resources of all five servers in our example. So if the email server gets bogged down, it can borrow resources from any of the other servers with extra capacity. The process is not as simple as it sounds, and businesses often turn to an experienced IT service provider to set up a virtualized environment.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Because virtualization software can be installed on a server in your office, it is totally independent of cloud technology. Sometimes, people misunderstand the difference because the vast majority of cloud solutions use virtualization to improve their services.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Cloud computing
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      With cloud computing, users can edit documents, save files, and interact with apps that aren’t actually on their computer. Instead, they access these items by connecting to a server via a network or internet connection.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      To carry out its purpose, a cloud platform sometimes uses several virtualized servers to provide users with a simple system that appears to be on its own, even though it’s actually shared with several other users and servers. There’s no need to purchase additional servers, and you can also save valuable office space by not having to deploy bulky equipment.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Obviously, scalability is critical in today’s ever-changing business conditions. Cloud computing makes it easier to manage business tasks to maximize productivity. And it helps streamline operations, as more cloud services are integrated. Businesses don’t have to worry about infrastructure maintenance because it is covered by the cloud service provider.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Virtualization and cloud computing are both economical technologies that small businesses should take advantage of. If you want to see what they can do for you, call our experts today!
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/the-cloud-and-virtualization-explained/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2119939076.jpg" length="37888" type="image/jpeg" />
      <pubDate>Mon, 28 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/the-cloud-and-virtualization-explained</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2119939076.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>CRM optimization best practices</title>
      <link>https://www.apogeemsp.com/2019/01/crm-optimization-best-practices</link>
      <description>The effectiveness of your business's day-to-day operations is the best indicator of whether your customer relationship management (CRM) software is performing to expectations. CRM is revolutionizing the way businesses interact with customers, but are you integrating CRM into your business in the best possible way? Learn how you can transform your business with the following […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The effectiveness of your business's day-to-day operations is the best indicator of whether your customer relationship management (CRM) software is performing to expectations. CRM is revolutionizing the way businesses interact with customers, but are you integrating CRM into your business in the best possible way? Learn how you can transform your business with the following best practices:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Always update customer information

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A CRM system is only effective when the data it provides is current. If the customer’s address, company name, or preferred method of contact has changed, your staff should update the information immediately, so your sales and marketing teams are always equipped with the right information and will know how to respond accordingly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use purchasing history for upselling opportunities

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s easier to sell to existing customers than acquiring new ones. With your CRM, you can boost your sales performance by analyzing your existing clients’ purchasing history and designing promotions or events just for them. For example, if they recently purchased a razor from your online store, you can program your CRM to recommend related products like shaving cream or aftershave. Not only does this widen your profit margins, but it also makes your customers’ lives a lot easier and promotes repeat business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Automate your processes

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Since many of the tasks associated with data entry can be automated, take advantage of the workflow automation features in CRM apps to eliminate time-consuming and repetitive functions. For instance, when new leads are added to your CRM (via newsletter subscriptions or website visits), you can program your CRM to send follow-up emails, offer promotions, and push other marketing efforts to keep your business at the forefront of their attention and to help them remember your brand. This saves you from writing the same canned responses while also making sure that you’re engaging your clients throughout the entire sales process.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Learn from analytics

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    CRM can analyze customer trends and behavior. If you notice a spike in demand for certain products and services during the holidays, be more aggressive in pushing them out the next year. If certain email campaigns were more successful than others (e.g., higher open rates, click-through-rates, and potential customers), understand what elements were responsible for that success, and try to replicate them the next time you send a newsletter.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Customer data should also be used to shape sales and marketing tactics. A salesperson that already knows the client’s name, location, and preferences can deliver more targeted sales pitches and has a better chance of closing a deal. The point is this: If you’re not learning from your data, your business growth will be limited.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Integrate CRM with other business software

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Incorporating CRM software to other programs makes it even more powerful. Integration with accounting software combines customer and financial data, eliminating redundant manual data entries and providing more insightful reports. When used alongside a VoIP system, your staff will get relevant customer information from multiple databases displayed on one screen when they’re about to make a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Get some CRM support

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Work with a CRM provider that offers 24/7 support. Ideally, your provider should keep your data safe, update your software regularly, and advise you on how to use complex CRM features.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
This may seem like a lot but remember: like every technology investment, CRM requires active participation from executives, managers, and frontline staff. If you need more advice on keeping customers happy or want to know what technologies can add value to your business, call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/crm-optimization-best-practices/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1969450704.jpg" length="28760" type="image/jpeg" />
      <pubDate>Fri, 25 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/crm-optimization-best-practices</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1969450704.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Use Single Sign-On for login efficiency</title>
      <link>https://www.apogeemsp.com/2019/01/use-single-sign-on-for-login-efficiency</link>
      <description>No matter how valuable your cloud subscriptions are, each new set of login credentials users are forced to create and memorize adds another level of inefficiency. With Single Sign-On (SSO), you can create one user profile that logs you into all your online accounts. If you’re overwhelmed by the number of passwords linked to your […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    No matter how valuable your cloud subscriptions are, each new set of login credentials users are forced to create and memorize adds another level of inefficiency. With Single Sign-On (SSO), you can create one user profile that logs you into all your online accounts. If you’re overwhelmed by the number of passwords linked to your name, SSO is the solution for you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is SSO?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Single Sign-On solutions allow you to create one username and one password that thousands of websites will recognize. If you’ve ever clicked “Login with Google” on a non-Google website, you’ve already enjoyed the benefits of SSO. It’s faster, simpler, and more secure. Now, small businesses can accomplish the same level of efficiency between their employees and cloud platforms.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Instead of asking everyone in the office to track separate accounts for Office 365, Slack, Quickbooks, and whatever other cloud apps your company relies on, you can give them one set of credentials and manage what they have access to remotely. Employees come to work, enter their designated username and password, and they’re all set for the day.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Why is SSO more secure?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are a number of ways to set up a small business SSO solution, but most of them focus on removing login information from your servers. Usually, you’ll provide your employees’ logins to an SSO provider (sometimes referred to as an Identity-as-a-Service provider) and each employee will receive a single login paired with a secondary authentication — like a fingerprint or an SMS to a personal device.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every time one of your employees visits a cloud platform, such as Office 365 or Google Apps, the SSO provider will verify the user’s identity and the security of the connection. If anything goes out of place, your IT provider will be notified.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Should your network or any of its devices be compromised, hackers would find nothing but logins to your SSO accounts, which are meaningless without fingerprints or mobile devices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How to get started with SSO

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The first step when setting up a Single Sign-On solution is making sure you have a healthy and responsive IT support system in place. You need a team that is constantly available to review suspicious alerts and troubleshoot employee issues. If you don’t currently have that capacity, contact us today and we’ll help you out!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/use-single-sign-on-for-login-efficiency/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4220414228.jpg" length="15072" type="image/jpeg" />
      <pubDate>Thu, 17 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/use-single-sign-on-for-login-efficiency</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4220414228.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Make the most out of old PCs</title>
      <link>https://www.apogeemsp.com/2019/01/make-the-most-out-of-old-pcs</link>
      <description>If your PC has been struggling to perform all the tasks you have at hand, we completely understand why you would be itching for a new one, or even if you’ve already replaced it with the latest model. But even if it’s old, sluggish, and always crashing, your old desktop or laptop may still prove […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your PC has been struggling to perform all the tasks you have at hand, we completely understand why you would be itching for a new one, or even if you’ve already replaced it with the latest model. But even if it’s old, sluggish, and always crashing, your old desktop or laptop may still prove to be useful. Here’s how you can upgrade and repurpose your old computer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As mentioned, you have to make a few upgrades on your old PC. You may want to try a lighter OS, for example. Keep in mind that the latest version of Windows or MacOS won’t work optimally without a fast processor, so a Linux-based OS, which comes in a variety of options called “distros,” would be a better option. It will make your computer feel brand new without exhausting its hardware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Popular distros options such as Ubuntu, elementary OS, and PinguyOS can be easily installed. Plus, they have similar interfaces to Windows and come with a boatload of software packages. The best part is they require a minimum of 4GB of RAM, so you won’t have to invest much at all.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Once you’ve upgraded your old PC, you can start using it as a NAS server, a dedicated privacy computer, or a digital media hosting platform.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Make a NAS server

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Network-attached storage (NAS) is a server for your home or small business network that lets you store files that need to be shared with all the computers on the network. If your old PC has at least 8GB of RAM, you can use it as your own NAS.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Simply download 
    
  
  
                    &#xD;
    &lt;a href="http://www.freenas.org/for-home/" target="_blank"&gt;&#xD;
      
                      
    
    
      FreeNAS
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    , a software accessible on Windows, MacOS, or Linux, that enables you to create a shared backup of your computers. FreeNAS has access permissions and allows you to stream media to a mobile OS, like iOS and Android.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But if you’d rather convert your PC into a private cloud for remote access and data backup, 
    
  
  
                    &#xD;
    &lt;a href="http://www.tonido.com/tonidodesktop_downloads/" target="_blank"&gt;&#xD;
      
                      
    
    
      Tonido
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     is a great alternative. Compatible with Mac, Windows, and Linux, this free private cloud server turns your computer into a storage website, letting you access files from anywhere on any device.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Tonido offers up to 2GB of file syncing across computers, and there are even Tonido apps for iOS and Android.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Secure your online privacy

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Install 
    
  
  
                    &#xD;
    &lt;a href="https://tails.boum.org/about/index.en.html" target="_blank"&gt;&#xD;
      
                      
    
    
      The Amnesic Incognito Live System (TAILS)
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     on your old computer and enjoy your very own dedicated privacy PC.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    TAILS routes all your internet traffic and requests through TOR Project, a software that makes it difficult for anyone to track you online. All of this Linux-based software’s integrated applications like web browser, Office suite, and email software are pre-configured for robust security and privacy protection.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Kick your media up a notch

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Looking for a way to listen to music and podcasts or watch videos on other PCs or mobile devices? Server software like 
    
  
  
                    &#xD;
    &lt;a href="https://kodi.tv/" target="_blank"&gt;&#xD;
      
                      
    
    
      Kodi
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     can help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Kodi brings all your digital media together into one user-friendly package so you can use your old PC as an audio and video hosting platform. From there, you can play files on other devices via the internet. There are remote control apps for both iOS and Android, and even an app for Kodi playback on Amazon Fire TV.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Kodi works on any Windows, MacOS, and Linux computer, and even on even rooted Android and jailbroken iOS devices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We’re always on the lookout for ways to help our clients make the most out of their technology investments. Want to know more about how to utilize hardware to your business’s advantage? Give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/make-the-most-out-of-old-pcs/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/818179267.jpg" length="39689" type="image/jpeg" />
      <pubDate>Wed, 16 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/make-the-most-out-of-old-pcs</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/818179267.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Why UPS is important in network gear</title>
      <link>https://www.apogeemsp.com/2019/01/why-ups-is-important-in-network-gear</link>
      <description>Storms, floods, fire, and other emergencies can cause productivity loss due to power failure. Utilizing an uninterruptible power supply (UPS) for your workstations will ensure that you never lose unsaved work. But what about your online connection? To avoid being crippled by loss of internet connection, it’s a good idea to plug routers, wireless access […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Storms, floods, fire, and other emergencies can cause productivity loss due to power failure. Utilizing an uninterruptible power supply (UPS) for your workstations will ensure that you never lose unsaved work. But what about your online connection? To avoid being crippled by loss of internet connection, it’s a good idea to plug routers, wireless access points, and cable modems into a UPS.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      UPS for network equipment
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      UPS systems provide backup power in case of outages and protection against power surges, which don’t just damage computers but also make you lose unsaved work. Deploying them for Wi-Fi routers and modems allows you to stay connected to the internet during these  typically chaotic instances.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Moreover, it makes sense to not just keep your PCs powered up, but to also have internet access during a disaster. This strategy works relatively well if your staff are predominantly laptop users, as that means you only need to juice up your Wi-Fi gear.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Better than generators
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Although generators are indispensable for certain businesses, they also require greater upkeep. Small- and mid-sized businesses may not have enough capacity to maintain them because they typically require a utility crew who can manage high-maintenance equipment.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      What’s more, 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      misusing or mishandling generators 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      could result in 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.consumerreports.org/generators/generator-safety-tips-to-get-you-through-a-storm/"&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        generator-related fatalities
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      . On the other hand, misusing a UPS unit could result in the loss of a day’s work, but it’s unlikely to lead to anything as extreme.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Why internet access is important during a disaster
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      UPS-supported modems or routers help you stay online for as much as 90 minutes, which should be enough time to get your bearings before power finally runs out. Internet service providers are usually prepared for catastrophes and would normally have an emergency power source to stay operational. And if you can stay online via Wi-Fi during an emergency, you get the following benefits:
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Plug in your network gear now
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Businesses that aren’t located in disaster-prone areas probably don’t give much thought to installing UPSs for their computers, let alone their modems. But accidents and emergencies are inevitable. And when they happen, you’ll find that having internet access is one of the most important things you need to ensure business continuity.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Think of an emergency power supply source like a UPS as an investment that not only protects your systems from data loss but also keeps your Wi-Fi equipment functioning in emergency scenarios. Call us today for productivity-saving tips and other hardware hacks for your business.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/why-ups-is-important-in-network-gear/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1972359285.jpg" length="23558" type="image/jpeg" />
      <pubDate>Fri, 11 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/why-ups-is-important-in-network-gear</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1972359285.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Why you need a VPN and how to choose one</title>
      <link>https://www.apogeemsp.com/2019/01/why-you-need-a-vpn-and-how-to-choose-one</link>
      <description>Back in the day, simple antivirus software was all you needed to stay safe from security threats. Nowadays, it takes more than that to protect your online privacy. Whether you’re sending emails or chatting up a friend online, chances are your Wi-Fi connection can be intercepted. This is why you need a virtual private network […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Back in the day, simple antivirus software was all you needed to stay safe from security threats. Nowadays, it takes more than that to protect your online privacy. Whether you’re sending emails or chatting up a friend online, chances are your Wi-Fi connection can be intercepted. This is why you need a virtual private network (VPN). Here’s how to choose one wisely.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is a VPN?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The best way to describe a VPN is as a secure tunnel between your device and destinations you visit on the internet. Once you’ve established your PC’s connection to a VPN server, your computer acts as if it’s on the same local connection as the VPN making it seem you moved to a different location. As far as websites are concerned, you’re browsing from that server’s geographical location, not your computer’s actual location.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you surf the web through a VPN, all the data transmitted and received is also encrypted, preventing anyone — from hackers to government agencies — from monitoring your online activities.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Why should you have one?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Of course, security and privacy are major reasons why you would want a VPN. For example, if you’re connected to a public Wi-Fi network — like the ones you typically encounter at local cafes and airports — using a VPN encrypts the information you’re sending or accessing online. This means your credit card details, login credentials, private conversations, or other sensitive documents can’t be intercepted by a third party.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    VPNs are also useful for accessing geo-restricted websites. If you’re traveling abroad and certain US websites are blocked in that region, you can connect to a VPN located in the US to access the sites you need.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Which VPN should you choose?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Given the increasing demand for secure online privacy, VPNs are surging in popularity. The following considerations can help you find the right one.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      1. Cost
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
While free VPNs are available, we strongly suggest you avoid them as they could keep logs of your internet activity, and in some cases sell them to data brokers or worse, cybercriminals.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Maintaining a VPN service is also expensive, which means the free ones will likely plaster ads on your browser to make a quick buck.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Paid VPNs like SurfEasy and StrongVPN often come with more robust features and configurations that keep you secure. Prices differ depending on a VPN’s features and subscription length, and remember that how you pay is also important. Some VPNs offer anonymous payment systems like bitcoin while others allow you to use gift cards to avoid giving out your personal information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      2. Location
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
The physical location of VPN servers is important if you want to access region-blocked websites. So if you’re planning on accessing a UK-based service, your VPN provider must at least have servers installed in London.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      3. Capacity
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Read through a VPN provider’s terms of service to determine how much data you’re allowed to use. If possible, find out how many servers a VPN provider has. If they have plenty of servers online, you can rest assured that they have the capacity to support your internet browsing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      4. Device compatibility
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Another important factor to consider is whether the VPN can be used across multiple devices. Nowadays, employees work on laptops, tablets, and smartphones, so you’ll want a VPN that’s compatible with all these.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      5. IP leaking
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Beyond the fundamental nuts and bolts of the VPN protocol, there are other challenges like dealing with leaky tunnels, which means your IP address could be tracked. A great way to evaluate a VPN service is to sign up for their free trial service and visit 
    
  
  
                    &#xD;
    &lt;a href="https://ipleak.net"&gt;&#xD;
      
                      
    
    
      https://ipleak.net
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    . This will allow you to check whether your real IP address is actually being leaked. If it tracks your physical location, you should opt for a more reliable VPN service.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    VPNs are now a vital component of cybersecurity, and if you need help selecting the right one for your business, consult with our security experts today. We also offer comprehensive cybersecurity services so no hacker or third party can get their hands on your data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/why-you-need-a-vpn-and-how-to-choose-one/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1745632884.jpg" length="21963" type="image/jpeg" />
      <pubDate>Tue, 08 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/why-you-need-a-vpn-and-how-to-choose-one</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1745632884.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The best way to secure PHI</title>
      <link>https://www.apogeemsp.com/2019/01/the-best-way-to-secure-phi</link>
      <description>Healthcare organizations must be vigilant about avoiding data breaches, especially since they’ve been prime targets for cybercriminals for several years. Medical records are extremely valuable to hackers, which is why healthcare sectors must implement the most advanced security solutions. Strict access policies To control access to protected health information (PHI), your IT department must introduce […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Healthcare organizations must be vigilant about avoiding data breaches, especially since they’ve been prime targets for cybercriminals for several years. Medical records are extremely valuable to hackers, which is why healthcare sectors must implement the most advanced security solutions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Strict access policies
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
To control access to protected health information (PHI), your IT department must introduce access restriction policies. For example, accountants should not have access to the same data as physicians. This guarantees that none of your employees are viewing off-limits records or increasing the chances of a breach.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Healthcare executives must also enforce policies that reprimand staff for accessing patient data without a valid business-related reason. This coupled with strict training for IT security best practices will significantly reduce the chances of a data breach.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Full-disk encryption
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Full-disk encryption is an inexpensive and quick method to secure private information. It renders stolen data indecipherable to anyone without the matching decryption key.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Even though this recommendation is old news in the healthcare sector, the recent shift to greater mobility makes encryption a top priority more than ever, particularly because stolen or lost devices pose a massive security risk.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Let’s say a healthcare provider’s laptop got stolen. The thief could sell PHI for over $350 per record. By comparison, encrypted devices would never be subjected to such a scenario.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Resilient infrastructure
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Your primary goal is to reduce potential entryways into your network. Since email and unsecured websites are the most common malware distribution systems, you need to set up proper safeguards, such as advanced firewalls, intrusion prevention systems, and email filtering software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If malware does manage to infiltrate your network, you must stop it from spreading. This means you’ll need next-gen anti-malware software that can detect and quarantine any signs of a breach. If such systems fail, you’d also need a data backup and recovery plan so you can continue caring for your patients during a major incident.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your patients trust you with their lives and their privacy. If the strategies in this article sound too technical for you, just give us a call and we’ll make sure these cybersecurity measures have your back.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/the-best-way-to-secure-phi/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3277353143.jpg" length="37798" type="image/jpeg" />
      <pubDate>Mon, 07 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/the-best-way-to-secure-phi</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3277353143.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Workplace Analytics evaluates employees’ productivity</title>
      <link>https://www.apogeemsp.com/2019/01/workplace-analytics-evaluates-employees-productivity</link>
      <description>Measuring productivity is an important process in an employee’s performance evaluation. Previously, Microsoft’s Office 365 had MyAnalytics, a tool for employees to monitor their own performance. But Microsoft improved on it with Workplace Analytics, which now allows managers to also view and evaluate their staff’s productivity. Managers can use this data to create strategies for […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Measuring productivity is an important process in an employee’s performance evaluation. Previously, Microsoft’s Office 365 had MyAnalytics, a tool for employees to monitor their own performance. But Microsoft improved on it with Workplace Analytics, which now allows managers to also view and evaluate their staff’s productivity. Managers can use this data to create strategies for improving employee engagement and output.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  How it works

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A paid add-on to Office 365 enterprise plans, Workplace Analytics extracts behavioral insights from data gathered from Office 365 email, calendar, documents, and Skype. This means any data an employee types into their email and calendar — whether on the subject line or in the body itself — can be used to indicate their productivity status.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The program has an overview dashboard that provides specific information:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What does it aim to do?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    According to Microsoft, Workplace Analytics addresses businesses’ most common challenges: complexity, productivity, and engagement.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Using Workplace Analytics data, managers and human resources departments can form productivity strategies for the entire company. If most of your employees spend 60% of their time attending meetings and not enough time doing creative work, managers can come up with a strategy to reduce meeting times and focus more on productive tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It also identifies how employees collaborate with internal and external parties. Suppose one of your sales staff frequently communicates with certain contacts. By using Workplace Analytics data, the employee’s manager would be able to determine whether this particular collaboration pattern is helping the employee hit sales targets or whether he or she is missing out on other more critical contacts. Based on this info, managers would also be able to determine which employees are most likely to meet or exceed their targets and set company-wide standards accordingly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Workplace Analytics also allows managers to determine an employee’s level of engagement (i.e., whether the organization’s collaboration patterns are good for the company), and whether workloads are fairly distributed among workers and/or departments.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Is it useful for small businesses?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Large corporations have been using Workplace Analytics, but 
    
  
  
                    &#xD;
    &lt;a href="https://www.acaciahrsolutions.com/microsofts-workforce-analytics-and-what-small-businesses-can-learn/"&gt;&#xD;
      
                      
    
    
      small businesses can also benefit from it
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    . The data used to provide insights are what employees generate themselves — how much time they spend on meetings, whom they frequently communicate with, and how much time they spend on productive tasks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Aside from letting managers examine their staff’s work behavior, Workplace Analytics also provides an overall look at an organizational level. If you want your organization to further harness the capabilities of Workplace Analytics and other Office 365 tools, give us a call today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2019/01/workplace-analytics-evaluates-employees-productivity/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/885496386.jpg" length="34092" type="image/jpeg" />
      <pubDate>Thu, 03 Jan 2019 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2019/01/workplace-analytics-evaluates-employees-productivity</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/885496386.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Save money with thin and zero clients</title>
      <link>https://www.apogeemsp.com/2018/12/save-money-with-thin-and-zero-clients</link>
      <description>Businesses are always looking for ways to save a bundle without sacrificing growth. For a while, they believed that they had to buy workstations with their own processing power, RAM, and hard drive. But thanks to virtualization, companies can increase their revenue and get the computing processes they need with thin and zero clients. What […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Businesses are always looking for ways to save a bundle without sacrificing growth. For a while, they believed that they had to buy workstations with their own processing power, RAM, and hard drive. But thanks to virtualization, companies can increase their revenue and get the computing processes they need with thin and zero clients.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      What are thin and zero clients?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Thin clients are stripped-down computers with minimum processing power and memory. They rely on a basic operating system and a network connection to access a more powerful system where almost all computing processes take place.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Zero clients work the same way. The only difference is that there’s no local storage or operating system installed on the device; all the software, storage, and processing power sits on a server until you need it. This setup makes it ideal for cutting costs
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      .
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Reduced hardware costs
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      When it comes to upfront costs, thin and zero clients are the obvious choice. Conventional desktops start at $300 per user, while thin clients can go as low as $90 per user. And since they have no hard drive or other moving parts, lean devices tend to be more durable and have a longer lifespan than their traditional counterparts.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Simplified IT management
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Another benefit of thin clients is that they can be managed from a server. Suppose a new software update was released. Instead of manually downloading the patch on each computer, you can simply install the update on your server and roll it out to all thin clients. Apart from upgrades, you can make backups, security configurations, and application deployments in the data center. This quickens setup, reduces downtime, and increases employee productivity.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Minimized security risks
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Thin clients also help you prevent costly malware attacks and data breach incidents. Your employees and poorly managed endpoints are the biggest vulnerabilities with traditional desktops. Thin and zero clients reduce these problems by limiting direct access to the operating system. This keeps employees from copying sensitive data to removable media and installing software, malicious or otherwise.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If your thin client is damaged or corrupted, you don’t have to worry about your data, as it’s originally stored in an impenetrable server.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Decreased energy consumption
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Because processing is done locally, traditional desktops generate a lot of heat and require more power, which results in huge power and cooling bills at the end of the month. By contrast, thin and zero clients consume only 4 to 6.5 watts of power, almost 1/50th of thick client requirements. What’s more, they require little to no cooling, allowing you to enjoy significant cost savings.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      When looking for cost-cutting solutions, thin and zero clients should never be overlooked. The reduced hardware costs, power bills, and security risks are just too good to pass up. But if you’re still unsure about this technology, give us a call. We’ll assess your tech needs and determine whether or not thin or zero clients can help you succeed.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/save-money-with-thin-and-zero-clients/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2699969914.jpg" length="35891" type="image/jpeg" />
      <pubDate>Thu, 27 Dec 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/save-money-with-thin-and-zero-clients</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2699969914.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Here’s how to make Google Chrome super fast</title>
      <link>https://www.apogeemsp.com/2018/12/heres-how-to-make-google-chrome-super-fast</link>
      <description>Google Chrome is the most popular web browser in the world with over 2 billion installs, 1 billion users, and 53% share of the market. Its speed is one of its most notable advantages over other existing browsers, as well as one of the reasons why it’s preferred by most netizens. But even the fastest […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Google Chrome is the most popular web browser in the world with over 2 billion installs, 1 billion users, and 53% share of the market. Its speed is one of its most notable advantages over other existing browsers, as well as one of the reasons why it’s preferred by most netizens. But even the fastest browser experiences some performance drops from time to time. If your Chrome has slowed down, here are simple hacks to get it back into tip-top shape in no time.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Clear your browsing data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Chrome stores a cached copy of a website you visit, so it can load the page faster when you visit it again. It also keeps a database of your browsing history and cookies for the same purpose. As you visit more and more websites, these pieces of data accumulate in Chrome and can slow the browser down.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Thankfully, the solution to this is easy: clear your cache. To do this, simply access your browsing history by entering 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      chrome://history
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     on your address bar. From the left panel, select 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Clear browsing data
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
    . Choose which data will be deleted by clicking on the checkboxes of all items you want to delete, like cached images or cookies. You can also select the time range that will be affected by the deletion. You can delete your history for the past hour, the last 24 hours, the last 7 days, the last 4 weeks, or from the beginning of time. Once you’ve selected the files you want to delete and their corresponding time range, click 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Clear data
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
    .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Disable extensions

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Extensions are downloadable programs from the Chrome Web Store that you can add to your browser to give it more functionality and a personalized touch. For example, you can add an extension that blocks ads, one that shortens URLs, or one that shows you your most important tasks of the day. While these extensions are useful, they can slow Chrome down when there are too many installed at once.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most extensions will show on Chrome’s address bar, and you can quickly uninstall them by right-clicking on their icons and selecting 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Remove from Chrome
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
    . You can also manage all extensions by typing 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      chrome://extensions
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     on your browser and hitting 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Enter
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
    . From there, you’ll find a list of all the extensions you have (even those you don’t remember installing). Simply scroll through the list and click 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Remove
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     to delete the extensions you don’t need.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Remove ads and malware

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Sometimes, Chrome slows down because of malware or adware extensions. Extra toolbars, recurring pop-up ads, and web pages redirecting to other addresses are clear indications of these. Google once had a downloadable app developed for Chrome that scans and removes unwanted programs called the Clean Up Tool. In 2018, Google discontinued that app and made malware scanning even easier. Just go to 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      chrome://settings/cleanup
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     on your browser, and click on 
    
  
  
                    &#xD;
    &lt;i&gt;&#xD;
      
                      
    
    
      Find
    
  
  
                    &#xD;
    &lt;/i&gt;&#xD;
    
                    
  
  
     to find and remove harmful software on your computer.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A top-performing web browser benefits your business in many ways, including upping employees’ productivity and speeding up communication processes. It’s therefore critical that yours is fast and reliable. If your web browser is performing poorly or takes forever to load a page, don’t hesitate to get in touch with us so we can identify and fix the problem right away.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/heres-how-to-make-google-chrome-super-fast/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1917310022.jpg" length="75286" type="image/jpeg" />
      <pubDate>Wed, 26 Dec 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/heres-how-to-make-google-chrome-super-fast</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1917310022.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Simple tricks to improve your productivity</title>
      <link>https://www.apogeemsp.com/2018/12/simple-tricks-to-improve-your-productivity</link>
      <description>When you spend more than eight hours a day staring at a computer screen, it can be easy to lose focus on important tasks. While you can access some of the most useful applications through your computer, an ever-growing number of distractions are vying for your attention. Here are a few tricks to avoid getting […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you spend more than eight hours a day staring at a computer screen, it can be easy to lose focus on important tasks. While you can access some of the most useful applications through your computer, an ever-growing number of distractions are vying for your attention. Here are a few tricks to avoid getting distracted at work and boost your productivity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Monitor productivity levels

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Start by tracking how much work you complete on an average day. There are useful apps for this such as Google Chrome Extensions like RescueTime, which record your most frequently visited sites and track how much time you spend away from your computer. Running the app will provide you with a productivity rating and a detailed log of how you spend your time at work.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you discover you’re wasting a huge portion of your time on social networking and other productivity killers, you’re more likely to make conscious adjustments on how you manage your time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Get rid of clutter

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also decrease distractions and increasing output by deleting old files, uninstalling unused programs, and organizing documents into appropriately labeled folders. This makes files easier to find and improves your computer’s performance.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As for the clutter in your email inbox, Gmail and Outlook both have features that filter out unimportant messages. Simply enable Priority Inbox on Gmail or Clutter on Outlook to get a clean, spam-free inbox.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Block time-wasting sites

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Visiting non-work-related websites hinders productivity. A quick five-minute break to check your Facebook feed may not seem like much, but a few of those per day add up to a lot of time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you and your employees have trouble staying away from social media sites like Facebook, Instagram, and Twitter, it’s a good idea to block access to them using URL filters.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Alternatively, you can use apps like StayFocusd or Strict Workflow. These allow you to set a limit on how long and how many times users can visit non-work-related sites.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Stay on track with to-do lists

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To-do lists help you break down large projects into manageable, bite-sized tasks. Crossing things off the list is surprisingly satisfying since it gives you and your employees a sense of accomplishment and total visibility of your progress.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can choose from a wide variety of digital to-do lists like Google Tasks or Trello. These platforms allow you to set deadlines for small tasks and write clear instructions for each. What’s more, they’re incredibly easy to use and are great for keeping track of your workflow.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use keyboard shortcuts

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Mastering keyboard shortcuts will make it easier to perform simple functions. There are more than a hundred useful shortcuts, but some that you should always keep in mind are:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For many more like these, take a look at this list of 
    
  
  
                    &#xD;
    &lt;a href="https://www.windowscentral.com/best-windows-10-keyboard-shortcuts" target="_blank"&gt;&#xD;
      
                      
    
    
      advanced shortcuts
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     for Windows.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In this digital age of short attention spans, focus is key to achieving business success. Drop us a line today if you’d like to know more about how tech can induce focus and improve overall productivity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/simple-tricks-to-improve-your-productivity/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1206188479.jpg" length="24004" type="image/jpeg" />
      <pubDate>Wed, 26 Dec 2018 09:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/simple-tricks-to-improve-your-productivity</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1206188479.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The latest and greatest Office 365 updates</title>
      <link>https://www.apogeemsp.com/2018/12/the-latest-and-greatest-office-365-updates</link>
      <description>Office 365 just keeps getting better and better. Check out how these new and upcoming enhancements can improve productivity. Office Write and draw with digital ink Typing is easy on desktops and laptops, but when you’re on touch-enabled devices, keyboards are cumbersome to use, whether they are extra hardware or as space invaders on your […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Office 365 just keeps getting better and better. Check out how these new and upcoming enhancements can improve productivity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Office

                &#xD;
&lt;/h3&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  Write and draw with digital ink

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Typing is easy on desktops and laptops, but when you’re on touch-enabled devices, keyboards are cumbersome to use, whether they are extra hardware or as space invaders on your screen. Now, the 
    
  
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Draw
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     tab is available on your favorite Office programs so you can use your finger, a stylus, or a mouse to doodle and write. You can automatically convert your handwriting to text in Word or OneNote by implementing the handwriting input function of your Windows 10 touch keyboard.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  Chat with colleagues right inside the app

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Now available exclusively to Office 365 subscribers, the chat function lets team members message one another within a Word document, PowerPoint presentation, or Excel spreadsheet as they work on it together.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Word

                &#xD;
&lt;/h3&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  Write with your voice

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Ever wished you had a personal secretary who could type dictation for you? As an Office 365 subscriber, you won’t need one. Sign into your account, turn on your microphone, then go to 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Home &amp;gt; Dictate
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     (in Outlook, go to 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Message &amp;gt; Dictate
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     instead). Once the 
    
  
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Dictate
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     icon turns red, you can start writing your document just by speaking. It’s that easy! 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Now available in Word for Office 365, Outlook for Office 365, PowerPoint for Office 365, and OneNote for Windows 10.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  Edit documents with natural gestures

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With your handwriting and voice digitized into standard text, editing your document is easy, thanks to natural gestures. It’s like using a pen to insert or cross out words on printouts, but immediately seeing your edits afterward! Other magical things you can do include inserting spaces and paragraph breaks, stringing broken-up words together, and circling text to select it. 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Now available in Word for Office 365 and Word Mobile.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  PowerPoint

                &#xD;
&lt;/h3&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  Transform your scribbles

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Sometimes you need to draw or write by hand to get stuff down quickly. Using digital ink can be the quickest way to communicate, but turning scribbles into editable text or easy-to-manipulate shapes for a slideshow presentation later on is time-consuming.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Or rather, that 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      was
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     the case, because now 
    
  
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Ink to Text
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     and 
    
  
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Ink to Shape
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     can convert your handwriting and hand drawings into standard text or shapes, respectively. 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Now available for PowerPoint for Office 365, PowerPoint for iPad, and PowerPoint for iPhone. Ink to Shape is also available exclusively to Office 365 subscribers on Excel for Office 365, Word for Office 365, Excel 2016, Word 2016, and Visio Online Plan 2.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Excel

                &#xD;
&lt;/h3&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  “Ideas” literally let you work smarter

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Pie charts, bar graphs, scatter diagrams — with so many ways to visualize data, it can become troublesome to implement the right graph. Thankfully, the upcoming 
    
  
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Ideas
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     will let AI come up with the most apt graphs for you. Just click on a cell in a data table, click the 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Ideas
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     button on the Home tab, then voila! Excel comes up with charts for you to choose from. It can even set trend lines, recognize outliers, and create summaries for you — all without having to write an unwieldy formula! 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Coming soon to Excel for Office 365, Excel for Office 365 for Mac, and Excel Online.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  A picture is worth a thousand data points

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Since optical character recognition software is already a couple of decades old, it’s about time we’re able to extract data tables from pictures. Soon, the 
    
  
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Insert data from picture
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
     function will let us encode ingredients lists from recipes and digitize printed receipts by taking their photos. 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Coming soon to Excel for Android tablets and Excel for Android phones.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  One formula, many values

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For so long, Excel users had to enter a formula and copy it to get multiple values (known as an array) from their data tables. With 
    
  
  
                    &#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      dynamic arrays
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    
                    
  
  
    , however, all you have to do is write a formula once, press 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Enter
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    , and you’ll instantly get values for entire columns or tables instantly, which means faster processing with fewer errors. To illustrate, you can use a dynamic array to fill up entire multiplication tables, and when you change or add more factors, the array will recalculate and resize automatically. 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Coming soon to Excel for Office 365 and Excel for Office 365 for Mac.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Outlook

                &#xD;
&lt;/h3&gt;&#xD;
&lt;h4&gt;&#xD;
  
                  
  Quickly create tasks

                &#xD;
&lt;/h4&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Outlook now lets you create tasks and to-do lists the way you write emails. Just click 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Tasks &amp;gt; New Tasks
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    , type the name of the task in the Subject box, and add task details in the body. You can also set its priority, start and due dates, and even a reminder for it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Additionally, you can create tasks out of emails by dragging an email to 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Tasks
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     on the navigation bar. This is way faster than copy-pasting email contents onto the body of a task, though keep in mind that email attachments aren’t carried over to the newly made task.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Make the most out of Office 365! If you’re already a subscriber or are currently looking into it, let us help you configure and implement it for maximum productivity.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/the-latest-and-greatest-office-365-updates/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/858355596.jpg" length="46511" type="image/jpeg" />
      <pubDate>Wed, 19 Dec 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/the-latest-and-greatest-office-365-updates</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/858355596.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Your password may be poor — update it now</title>
      <link>https://www.apogeemsp.com/2018/12/your-password-may-be-poor-update-it-now</link>
      <description>For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why not and how it involves you. The problem The issue isn’t necessarily that […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For years, we’ve been told that strong passwords include three things: upper- and lowercase letters, numbers, and symbols. And why wouldn’t we when the National Institute of Standards and Technology (NIST) told us they were the minimum for robust passwords? Here’s why not and how it involves you.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The problem

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The issue isn’t necessarily that the NIST advised people to create passwords that are easy to crack, but it steered people into creating lazy passwords, using capitalization, special characters, and numbers that are easy to predict, like “P@ssW0rd1.”
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This may seem secure, but in reality, these strings of characters and numbers could easily be compromised by hackers using common algorithms.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To make matters worse, NIST also recommended that people change their passwords regularly, but did not define what it actually means to “change” them. Since people thought their passwords were already secure with special characters, most only added one number or symbol.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    NIST essentially forced everyone to use passwords that are hard for humans to remember but easy for computers to guess.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Recently, the institution admitted that this scheme can cause more problems than solutions. It has reversed its stance on organizational password management requirements, and is now recommending banishing forced periodic password changes and getting rid of complexity requirements.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  The solution

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Security consultant Frank Abagnale and Chief hacking officer for KnowBe4 Kevin Mitnick both see a future without passwords. Both security experts advise enterprises to utilize multifactor authentication (MFA) in login policies.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This requires users to present two valid credentials to gain access to their data. For instance, a code texted to an employee’s smartphone can serve as an added security measure to thwart hackers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Moreover, Mitnick recommended implementing long passphrases of 25 characters or more, such as “correcthorsebatterystaple” or “iknewweretroublewhenwalkedin5623”. These are much more difficult to guess and less prone to hacking. As for the frequency of changing passphrases, it will depend on a company’s risk tolerance.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Simply put, passwords should be longer and include nonsensical phrases and English words that make it almost impossible for an automated system to make sense of.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Even better, you should enforce the following security solutions within your company:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to security, ignorance is the biggest threat. If you’d like to learn about what else you can do, just give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/your-password-may-be-poor-update-it-now/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4114643718.jpg" length="18322" type="image/jpeg" />
      <pubDate>Fri, 14 Dec 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/your-password-may-be-poor-update-it-now</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4114643718.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How to protect your company mobile devices</title>
      <link>https://www.apogeemsp.com/2018/12/how-to-protect-your-company-mobile-devices</link>
      <description>While mobile devices cannot equal what desktops and laptops can do, they’re inching pretty close to matching them. That’s why businesses are allowing their employees to use their smartphones and tablets, which help increase productivity and enhance collaboration. But mobile devices have also become the new targets of cybercriminals. Protect your devices with the following […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While mobile devices cannot equal what desktops and laptops can do, they’re inching pretty close to matching them. That’s why businesses are allowing their employees to use their smartphones and tablets, which help increase productivity and enhance collaboration. But mobile devices have also become the new targets of cybercriminals. Protect your devices with the following tips.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ensure mobile OS is up-to-date

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The updates on Apple and Android operating systems (OSs) improve overall user experience, but their most important function is to fix security vulnerabilities. Reduce your business’s exposure to threats by installing updates for 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      all
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     devices as soon as they become available. Don't wait for a few weeks or months to update, as this give hackers ample time to exploit vulnerabilities on devices that run on an outdated OS.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Install business applications only

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Downloading apps seems harmless. But lenient policies on what should and shouldn’t be downloaded on company mobile devices could lead to staff downloading and installing non-business-related apps from third-party stores, most of which are notorious for malicious advertising codes and other threats.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Be careful when connecting to public Wi-Fi networks

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Emergency situations may compel you to use password-free Wi-Fi networks in hotels, airports, cafes, and other public places. Connecting to an open network can expose your confidential information and sensitive company data to hackers connected to the same network.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can avoid this by providing a practical internet data plan, preferably one that includes roaming services, for remote workers. And if you really have to connect to an open Wi-Fi, don’t use the connection for transferring sensitive data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Enable phone tracking tools

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s sad but inevitable — losing a company-issued mobile device happens. Devices can be misplaced or stolen, and enabling Find My iPhone for iOS devices, GPS Phone Tracker for Android, or any device-tracking app helps users locate lost phones. Some also have the option to delete data in stolen devices. Downloading and setting up such an app only takes a few minutes, and it will give you peace of mind knowing that even if your phone is lost or stolen, its contents will not be compromised.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Screen SMS carefully

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    SMS phishing can be used to trick you into clicking malicious links. Hackers send messages purporting to be from someone you know, asking you to urgently send confidential data. Should you encounter such an SMS, you can either delete it or alert your IT department. You can also block unknown senders without even opening their message.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Mobile devices are becoming more critical to operations. And with more devices open to attack, businesses must bolster their cybersecurity efforts. Hackers will exploit every possible vulnerability, and that includes those in unsecured smartphones and tablets. Get in touch with us if you need comprehensive security solutions for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/how-to-protect-your-company-mobile-devices/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2410888099.jpg" length="22582" type="image/jpeg" />
      <pubDate>Wed, 12 Dec 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/how-to-protect-your-company-mobile-devices</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2410888099.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>It’s time for your business to get SaaS-y</title>
      <link>https://www.apogeemsp.com/2018/12/its-time-for-your-business-to-get-saas-y</link>
      <description>As technology grows, more solutions are available to help businesses cut costs and improve efficiency. One such solution is software as a service, aka SaaS. To know if this can benefit your business, it’s best to learn what SaaS actually is. Read on for the answers. What is SaaS and what makes it appealing? SaaS […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      As technology grows, more solutions are available to help businesses cut costs and improve efficiency. One such solution is software as a service, aka SaaS. To know if this can benefit your business, it’s best to learn what SaaS actually is. Read on for the answers.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      What is SaaS and what makes it appealing?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      SaaS is a software delivery model that allows the user to access software from any device via the internet. This gives you more flexibility since you don’t have to come to the office to use the software. You can work from anywhere as long as you can go online. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      As opposed to a traditional on-premises setup where software is stored locally, SaaS is hosted in the cloud. By transferring software hosting to a third party, you’re outsourcing all the responsibilities that come with maintenance, such as upgrades and troubleshooting. In a way, getting SaaS is like renting a car: Somebody else owns the vehicle, but you get to drive it. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Shifting software ownership away from your business also changes how much you pay for it. With on-premises software, you purchase a license and pay yearly support fees, which can amount to 22 percent of the price of license fees (ouch!). With SaaS, you pay a monthly or annual subscription fee that covers licenses, support, and other fees. This is better since it allows you to spread out costs on a monthly basis, instead of purchasing expensive licenses outright and ending up with a huge maintenance bill every year. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Will my data be safe?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      One of the issues that make companies reluctant to switch to SaaS is data security. Who will own my data? Will my data be safe? What if the vendor goes out of business?
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      For your peace of mind and safety, when you’re outsourcing your software to a SaaS vendor, you have to sign a service level agreement (SLA). This should specify that you own the data and that the vendor is obliged to provide access to your data even if it goes bankrupt.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Data hosted by your SaaS vendor will be more secure than when it’s stored on your average SMB’s network. That’s because SaaS vendors have to undergo strict security audits, forcing them to invest more in security, backup technology, and maintenance than a typical SMB.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Should I switch to SaaS or stick to on-premises?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      SaaS is an ideal solution for small and medium-sized businesses that are looking for a way to reduce upfront costs. But if your business is large or has complex processes, a traditional on-premises solution might be better since it offers more functionality and allows for full customization.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Still unsure about whether SaaS is the right answer for your organization? Want to know more about SaaS before making the transition? Call us today! Our experts are ready to answer any questions you may have about SaaS.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/its-time-for-your-business-to-get-saas-y/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/405261324.jpg" length="20478" type="image/jpeg" />
      <pubDate>Tue, 11 Dec 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/its-time-for-your-business-to-get-saas-y</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/405261324.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Do ugly websites really cost you money?</title>
      <link>https://www.apogeemsp.com/2018/12/do-ugly-websites-really-cost-you-money</link>
      <description>No business owner should ever be embarrassed by their website. It’s worth the effort to run through everything with a fine-toothed comb and ensure your online customers are getting the best possible experience. We’ve rounded up the top six website elements you need to invest in. A variety of professional photos From pictures of your […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    No business owner should ever be embarrassed by their website. It’s worth the effort to run through everything with a fine-toothed comb and ensure your online customers are getting the best possible experience. We’ve rounded up the top six website elements you need to invest in.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  A variety of professional photos

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    From pictures of your products to team photos, high-quality images are arguably the most important thing on your website. Blurry, outdated, or irrelevant pictures tell your site visitors that you don’t care about their browsing experience. In-house photos are the best option, but stock images shouldn’t cause any problems as long as they are optimized for mobile viewing and relevant to your content.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Navigation

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Aside from one subpar imagery, linking to nonexistent pages is one of the best ways to turn site visitors away. Make sure it’s easy to navigate your site and remove outdated or irrelevant pages. You can’t sell 404 pages to customers, and if that’s all visitors can find, it’s game over.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Clear copywriting

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The last thing you want to do is to confuse your customers, so it’s important to keep all of your product or service descriptions as straightforward and simple as possible. If what you’re selling has detailed information, such as dimensions or technical requirements, make sure it’s easy to find but not obtrusive.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Promises to site visitors

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Any website that ships products should make its returns policy as visible as possible. This establishes trust early and some online shoppers make purchase decisions based solely on the clarity of a return policy.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you don’t run an eCommerce site, you also need to prominently display privacy commitments, such as those mandated by the European Union’s General Data Protection Regulation (GDPR).
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  About page

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your brand needs a story behind it that customers can relate to. Every company website should have an About Us page that describes your team, its culture, and what sets you apart from the competition. Whatever your story is, make sure it’s accessible from any page on your site.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Design

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not everyone is a web design expert, but in today’s gig economy one is never too far away. If your budget is tight, there are DIY site builders specifically geared toward small businesses. Or with a relatively low monthly expenditure, you can hire a managed website provider.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With more revenue originating online, small- and medium-sized business owners can’t afford to overlook the importance of creating a fully functional website. For more information on building a modern website, call us today!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/do-ugly-websites-really-cost-you-money-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/375953887.jpg" length="27894" type="image/jpeg" />
      <pubDate>Fri, 07 Dec 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/do-ugly-websites-really-cost-you-money</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/375953887.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Healthcare IoT: Security risks involved</title>
      <link>https://www.apogeemsp.com/2018/12/healthcare-iot-security-risks-involved</link>
      <description>From mobile apps that assist with taking medicine on time to smart appliances that monitor vitals, the Internet of Things (IoT) is becoming ubiquitous in healthcare. However, IoT’s expansion brings new risks, vulnerabilities, and security challenges for healthcare practitioners and their patients. Devices that contain a treasure trove of patient data are attractive targets for […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    From mobile apps that assist with taking medicine on time to smart appliances that monitor vitals, the Internet of Things (IoT) is becoming ubiquitous in healthcare. However, IoT’s expansion brings new risks, vulnerabilities, and security challenges for healthcare practitioners and their patients.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Devices that contain a treasure trove of patient data are attractive targets for cybercriminals. Healthcare apps, for instance, contain plenty of sensitive information, such as social security numbers, prescriptions, and medical histories. Should hackers ever get a hold of this information, they’ll be able to steal their victim’s identity or resell the information on the dark web.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In certain cases, an attacker could have direct control over IoT equipment, causing potentially lethal results.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In August 2018, cardiovascular imaging device manufacturer Philips found that its devices could be exploited with a high-severity code execution flaw that could be sent over the Internet, and in an even more terrifying twist, McAfee researchers at the 2018 Defcon demonstrated that vital signs monitors could be remotely altered to simulate a flatline on a patient’s heartbeat.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Vulnerable medical devices are also gateways to a secured network. Hackers can use compromised IoT devices to sneak ransomware and other types of malware onto a network, causing service disruptions and preventing practitioners from providing responsive treatment.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are several things you can do to defend against these attacks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use multi-factor authentication

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Multi-factor authentication forces users to provide more information than just their username and password (e.g., SMS code, fingerprint, or retinal scan). By enabling this on your networks and devices, hackers will have a more difficult time accessing mission-critical data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Encrypt your data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Another way to protect your business and your patients from a massive data breach is with encryption. Encoding electronic health records while they’re being transmitted or left in storage prevents hackers from reading and stealing sensitive information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If possible, everything that is transmitted across your network should be encrypted automatically to secure the communication between IoT devices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Install intrusion prevention systems

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Since most IoT attacks are delivered via the internet, intrusion prevention systems are crucial to identify and block unauthorized connections to your network. This means hackers who try to remotely access or shut down your IoT equipment will be stopped before they damage your systems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Security updates

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Last but not least, IoT manufacturers occasionally release security patches for their gadgets. Get in the habit of downloading these updates as soon they’re rolled out, or allow your devices to automatically download and update themselves to ensure their safety from the latest threats.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to security, healthcare institutions have their work cut out for them. But whether you’re dealing with hardware security, data privacy, or regulatory compliance, it’s a good idea to partner with a managed services provider that specializes in helping the medical industry.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Call us today to see what we can do to protect you and your patients.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/12/healthcare-iot-security-risks-involved/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1836369013.jpg" length="37562" type="image/jpeg" />
      <pubDate>Mon, 03 Dec 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/12/healthcare-iot-security-risks-involved</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1836369013.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Make your life easier with these Office 365 tips</title>
      <link>https://www.apogeemsp.com/2018/11/make-your-life-easier-with-these-office-365-tips</link>
      <description>Your company may be done migrating to Office 365, but there’s still a lot you must do. Now that your productivity tools are online via the cloud, there are a few optimizations that will provide your users with a better experience. Declutter your inbox If you’re having trouble managing the overwhelming amount of emails in […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your company may be done migrating to Office 365, but there’s still a lot you must do. Now that your productivity tools are online via the cloud, there are a few optimizations that will provide your users with a better experience.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Declutter your inbox
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you’re having trouble managing the overwhelming amount of emails in your inbox, then using Office 365’s “Clutter” feature can clear up some space. To enable this feature, go to 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Settings &amp;gt; Options &amp;gt; Mail &amp;gt; Automatic processing &amp;gt; Clutter
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       then select 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Separate items identified as Clutter
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      . Once activated, mark any unwanted messages as “clutter.” After learning your email preferences, Office 365 will automatically move low-priority messages into your “Clutter” folder, helping you focus on more important emails.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Ignore group emails
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Want to keep messages from an email thread you don't want to be part of out of your inbox?
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       If so, simply go to the message and find the 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Ignore
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       setting. Doing this will automatically move future reply-alls to the trash so they never bother you again. Of course, if you ever change your mind, you could un-ignore the message; just find the email in your trash folder and click 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Stop ignoring
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      .
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Unsend emails
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      In case you sent a message to the wrong recipient or attached the wrong file, use Office 365’s  message recall function. Simply open your sent message, click 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Actions
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      , and select 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Recall this message
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      . From here, you can either “Delete unread copies of this message” or “Delete unread copies and replace with a new message.” Bear in mind that this applies only to unread messages and for Outlook users within the same company domain.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Work offline
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Whenever you’re working outside the office or in an area with unstable internet, it’s a good idea to enable Offline Access. Found under the 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Settings 
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      menu, this feature allows you to continue working on documents offline and syncs any changes made when you have an internet connection. Offline access is also available in your SharePoint Online document libraries.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Use Outlook plugins
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Aside from sending and receiving emails, Outlook also has some awesome third-party plugins. Some of our favorite integrations include PayPal, which allows you to send money securely via email; and Uber, which lets you set up an Uber ride reminder for any calendar event. Find more productivity-boosting plugins in the
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://store.office.com/en-us/appshome.aspx?productgroup=Outlook&amp;amp;ui=en-US&amp;amp;rs=en-US&amp;amp;ad=US"&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Office Store
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      .
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Tell Office applications what to do
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      If you’re not a fan of sifting through menus and options, you can always take advantage of the Tell Me function in your Office apps. When you press 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Alt + Q
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      , you bring up a search bar that allows you to look for the functions you need. Suppose you need to put a wall of text into columns on Word but can’t find where it is specifically, just type “column” in the search bar and Microsoft will help you with the rest.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      These tricks and features will definitely increase productivity. And fortunately, there’s more coming. Microsoft is continuously  expanding Office 365’s capabilities, and if you truly want to make the most out of the software, don’t be afraid to explore its newly released features.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      For more Office 365 tips and updates, get in touch with us today.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/make-your-life-easier-with-these-office-365-tips/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3134308236.jpg" length="17097" type="image/jpeg" />
      <pubDate>Fri, 30 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/make-your-life-easier-with-these-office-365-tips</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3134308236.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>3 Types of hackers you should know about</title>
      <link>https://www.apogeemsp.com/2018/11/3-types-of-hackers-you-should-know-about</link>
      <description>What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important. A complicated history In the […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What do you call someone who hunts for security gaps in computer hardware and software? A hacker, right? What about someone who presents their findings to vendors to help them improve the quality of their products? There is more than one type of hacker, and understanding the difference is important.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      A complicated history
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
In the 1950s, the term 'hacker' was vaguely defined. As computers and the people who worked with them became more accessible, the word was used to describe someone who explored the details and limits of technology by testing them from a variety of angles.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    But by the 1980s, hackers became associated with teenagers who were being caught breaking into government computer systems — partially because that is what they called themselves, and partially because the word hacker has an inherently aggressive ring to it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Today, several of those pioneering hackers run multimillion-dollar cybersecurity consulting businesses. So what should you call someone who uses their knowledge for good?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      “White hat” hackers
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Sometimes referred to as ethical hackers, or plain old network security specialists, these are the good guys. Whether it’s selling what they find to hardware and software vendors in “bug bounty” programs or working as full-time technicians, white hat hackers are just interested in making an honest buck.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Linus Torvalds is a great example of a white hat hacker. After years of experimenting with the operating system on his computer, he finally released Linux, a secure open-source operating system.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      “Black hat” hackers
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Closer to the definition that most people outside the IT world know and use, black hat hackers create programs and campaigns solely for causing damage. This may be anything from stealing information using malware to forcefully shutting down networks using denial-of-service attacks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Kevin Mitnick was the most infamous black hat hacker in the world. During the 1990s, Mitnick went on a two and half year hacking spree where he committed wire fraud and stole millions of dollars of data from telecom companies and the National Defense warning system.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      “Gray hat” hackers
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Whether someone is a security specialist or a cybercriminal, the majority of their work is usually conducted over the internet. This anonymity affords them opportunities to try their hand at both white hat and black hat hacking.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For example, Marcus Hutchins is a known gray hat hacker. He’s most famous for testing the WannaCry ransomware until he found a way to stop it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    During the day, Hutchins works for the Kryptos Logic cybersecurity firm, but the US government believes he spent his free time creating the Kronos banking malware. He has been arrested and branded a “gray hat” hacker.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The world of cybersecurity is far more complicated than the stylized hacking in Hollywood movies. Internet-based warfare is not as simple as good guys vs. bad guys, and it certainly doesn’t give small businesses a pass. If you need a team of experienced professionals to help you tackle the complexities of modern cybersecurity, call us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/3-types-of-hackers-you-should-know-about/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3826057344.jpg" length="27330" type="image/jpeg" />
      <pubDate>Wed, 28 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/3-types-of-hackers-you-should-know-about</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3826057344.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Ways to safeguard your IoT devices</title>
      <link>https://www.apogeemsp.com/2018/11/ways-to-safeguard-your-iot-devices</link>
      <description>Your Internet of Things (IoT) devices — smart TVs, security cameras, smart locks — add a level of convenience to your workplace, but they also make your systems more vulnerable to cyberattacks. That’s because they’re essentially potential entry points for hackers. Here are some ways to secure your IoT devices from a possible cyberattack. Set […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your Internet of Things (IoT) devices — smart TVs, security cameras, smart locks — add a level of convenience to your workplace, but they also make your systems more vulnerable to cyberattacks. That’s because they’re essentially potential entry points for hackers. Here are some ways to secure your IoT devices from a possible cyberattack.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Set passwords

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Not many people know they can set passwords for IoT devices, making their gadgets easy to hack. You have to make sure to set new and strong passwords — preferably with a combination of upper- and lowercase letters, numbers, and symbols. Then, use a password manager to keep track of all your passwords.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Disable Universal Plug and Play (UPnP)

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    UPnP helps IoT gadgets discover and connect to other network devices. But this feature also serves as a gateway for hackers to infiltrate your devices and network. To prevent this, disable this feature.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Create a separate network

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    It’s a good idea to keep your IoT devices connected to their own network that’s separate from your main office network. This way, gadgets can connect to the internet but won’t have access to mission-critical files.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also invest in device access management tools. These allow you to control which devices can access what data, and prevent unauthorized access.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Update your firmware

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You need to keep your software up to date if you want to secure your devices against cyberattacks. Manufacturers are always releasing new patches for the latest vulnerabilities, so make it a habit to check and install IoT firmware updates regularly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you have several devices, use patch management software to automate patch distribution and schedule regular updates.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Unplug it

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Simply disconnecting your devices or turning them off when not in use can significantly reduce your vulnerability to cyberattacks. It removes potential entry points into your network and minimizes the chances of unauthorized access to your network.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With the advent of IoT devices in homes and offices, hackers also developed more cunning ways to exploit them. Adopting the abovementioned security habits can prevent a variety of IoT attacks, but if you need to beef up your security, contact us today. We have robust security solutions to keep your hardware and systems safe.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/ways-to-safeguard-your-iot-devices/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3059053337.jpg" length="81549" type="image/jpeg" />
      <pubDate>Mon, 26 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/ways-to-safeguard-your-iot-devices</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3059053337.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Six handy Gmail tips for your business</title>
      <link>https://www.apogeemsp.com/2018/11/six-handy-gmail-tips-for-your-business</link>
      <description>Time is of the essence, especially for small- or medium-sized businesses. To keep up with your competitors, spending most of your day rummaging through your inbox won’t help. Use these Gmail tips and tricks and spend less time in front of the monitor and more time enhancing your bottom line. Undo Send We’ve all had […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Time is of the essence, especially for small- or medium-sized businesses. To keep up with your competitors, spending most of your day rummaging through your inbox won’t help. Use these Gmail tips and tricks and spend less time in front of the monitor and more time enhancing your bottom line.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Undo Send

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    We’ve all had an email or two we wish we could take back. Gmail has a neat feature that gives you a short period of time to recall a mistakenly sent message. Simply click the Undo link that appears to the right of the "Your message has been sent" notification.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Canned Responses

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Dubbed as “email for the truly lazy,” Canned Responses is a new feature that allows you to save time and reuse an email that you designate as a Canned Response. Similar to an email template, it saves copious amounts of time since you won’t have to retype the same responses over and over again. It comes in handy for businesses that send plenty of routine emails. To do this, go to 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Settings
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    , open the 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Advanced
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     tab, and enable 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Canned Responses (Templates)
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Send large attachments with Google Drive

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With Gmail, users can easily send attachments up to 25 MB. But say you have a huge zip file for a photo shoot that a client wants to review — you’re going to need more space. If you use Google Drive with your Google account, you can send larger files in Gmail.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Copy the large file to your Google Drive, then click 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Compose
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     in Gmail and type your message. When you’re ready to attach the large file, click the Google Drive icon (next to the emoji icon that looks like a smiling face). Insert the files you want to attach and send your message.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Turn on Priority Inbox

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Priority Inbox organizes your messages by their importance using machine learning. You’ll be able to divide your inbox into five sections, where the messages will be displayed in the following order:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To enable Priority Inbox, hover your mouse over the Inbox button in the upper left corner of the screen until a dropdown arrow appears. Click on it, and choose 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Priority Inbox
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
    .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Back up your messages

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you ever need to back up or migrate your Gmail messages, 
    
  
  
                    &#xD;
    &lt;a href="http://gmvault.org/"&gt;&#xD;
      
                      
    
    
      Gmvault
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     can help. It’s an open source solution that can back up your entire Gmail directory or just a handful of messages. The email data is then available whenever you need to restore or recreate your Gmail folders. You can also use it to migrate messages from one account to another.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Enable advanced settings

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Configuring Gmail's Advanced Settings is an excellent way to increase email efficiency. Some of these features include Multiple Inboxes, Preview Pane, and custom keyboard shortcuts. Access them by going to 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Settings
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     and clicking on the 
    
  
  
                    &#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Advanced
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
    
                    
  
  
     tab.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Spending the right amount of time with emails while managing other crucial business areas is a balancing act many business owners find difficult. If you have questions or need further assistance regarding Gmail or IT in general, feel free to contact us.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/six-handy-gmail-tips-for-your-business/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2544745520.jpg" length="25625" type="image/jpeg" />
      <pubDate>Fri, 23 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/six-handy-gmail-tips-for-your-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2544745520.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Back up your mobile devices now</title>
      <link>https://www.apogeemsp.com/2018/11/back-up-your-mobile-devices-now</link>
      <description>Smartphones have become so advanced that there's virtually no business task they can't handle. Now everyone uses mobile devices to access work documents and, naturally, hackers got the memo. There are thousands of threats targeted towards mobile devices, so you’d be well served backing up the files in your mobile device, now. Malware on mobile […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Smartphones have become so advanced that there's virtually no business task they can't handle. Now everyone uses mobile devices to access work documents and, naturally, hackers got the memo. There are thousands of threats targeted towards mobile devices, so you’d be well served backing up the files in your mobile device, now.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Malware on mobile

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://wearesocial.com/blog/2018/01/global-digital-report-2018"&gt;&#xD;
      
                      
    
    
      More than two-thirds of the world’s population use a mobile phone
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     with internet connection, so dangers in these handy devices are to be expected. Scarier than the thought of being offline is being online and exposed to malware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you use your mobile devices as extensions of your work computers, backing them up is a must. Mobile phones have become as vulnerable to malware as laptops and desktops are, especially if you consider the fact that many professionals and business owners use them for emailing confidential documents and storing business-critical files.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Device disasters

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Malware isn't the only disaster that can hurt your smartphone. Because you carry it wherever you go, your device can easily be stolen, misplaced, or damaged. They may be easily replaceable, but the data they contain is not. Here are some security threats to look out for:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Backup options

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Performing backups on iOS and Android devices is a quick and painless process. For example, companies that use Office 365 or Google's G Suite enable company-wide backup settings from a single dashboard. Apple's backup settings usually need to be configured on each device, but it's a pretty simple process.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    There are also robust third-party options to back up all your organization’s mobile devices. The best of these are cloud backup services that sync devices and back up contacts, photos, videos, and other critical files in one neat system. These mobile backup tools are offered on monthly or lifetime subscription schemes, which provides small businesses with enough flexibility to ensure long-term protection.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;em&gt;&#xD;
      
                      
    
    
      Our experts can provide practical advice on security for your business’s computers and mobile devices. Call us to ask about mobile backup and other security solutions today.
    
  
  
                    &#xD;
    &lt;/em&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/back-up-your-mobile-devices-now-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3008196517.jpg" length="32021" type="image/jpeg" />
      <pubDate>Thu, 22 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/back-up-your-mobile-devices-now</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3008196517.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>7 easy ways to prevent data loss in Office 365</title>
      <link>https://www.apogeemsp.com/2018/11/7-easy-ways-to-prevent-data-loss-in-office-365</link>
      <description>For businesses, data security is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. While Microsoft Office 365 comes with some security and compliance tools, it still needs the support of data protection best practices. Here are seven you should […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For businesses, data security is critical. If this information is lost or stolen, it could lead to crippling financial losses, legal disputes, and more importantly, loss of customer trust. While Microsoft Office 365 comes with some security and compliance tools, it still needs the support of data protection best practices. Here are seven you should consider.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Take advantage of policy alerts
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Establishing policy notifications in Office 365’s Compliance Center can help you meet your company’s data security obligations. For instance, policy tips can warn employees about sending confidential information anytime they’re about to send messages to contacts who aren’t listed in the company network. These preemptive warnings can prevent data leaks and also educate users on safer data sharing practices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Secure mobile devices
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Since personal smartphones and tablets are often used to access work email, calendar, contacts, and documents, securing them should be a critical part of protecting your organization’s data. Installing mobile device management features for Office 365 enables you to manage security policies and access permissions/restrictions, and remotely wipe sensitive data from mobile devices if they’re lost or stolen.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Use multi-factor authentication
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Don’t rely on a single password to safeguard your Office 365 accounts. To reduce the risk of account hijacking, you must enable multi-factor authentication. This feature makes it difficult for hackers to access your account since they not only have to guess user passwords, but also provide a second authentication factor like a temporary SMS code.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Apply session timeouts
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Many employees usually forget to log out of their Office 365 accounts and keep their computers or mobile devices unlocked. This could give unauthorized users unfettered access to company accounts, allowing them to steal sensitive data. By applying session timeouts to Office 365, email accounts, and internal networks, the system will automatically log users out after 10 minutes, preventing hackers from opening company workstations and accessing private information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Avoid public calendar sharing
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Office 365’s calendar sharing features allow employees to share and sync their schedules with their colleagues. However, publicly sharing this information is a bad idea because it helps attackers understand how your company works, determine who’s away, and identify vulnerable users. For instance, if security administrators are publicly listed as “Away on vacation,” an attacker may see this as an opportunity to unleash malware on unattended computers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Employ role-based access controls
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Another Office 365 feature that will limit the flow of sensitive data across your company is access management. This lets you determine which user (or users) have access to specific files in your company. For example, front-of-house staff won’t be able to read or edit executive-level documents, minimizing data leaks.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Encrypt emails
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Encrypting classified information is your last line of defense to secure your data. If hackers intercept your emails, encryption tools will make files unreadable to unauthorized recipients. This is a must-have for Office 365, where files and emails are shared on a regular basis.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While Office 365 offers users the ability to share data and collaborate, you must be aware of potential data security risks at all times. When you work with us, we will make sure your business keeps up with ever-changing data security and compliance obligations. If you need help securing Office 365, we can assist you, too! Contact us today for details.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/7-easy-ways-to-prevent-data-loss-in-office-365/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3875416859.jpg" length="20596" type="image/jpeg" />
      <pubDate>Thu, 15 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/7-easy-ways-to-prevent-data-loss-in-office-365</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3875416859.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cloud migration made safe and secure</title>
      <link>https://www.apogeemsp.com/2018/11/cloud-migration-made-safe-and-secure</link>
      <description>While many IT providers tout the revolutionary benefits of the cloud, very few address the security aspect of it. The fact is, when you’re using a cloud service, you’re moving information out of your hands and into a third party. So doesn’t it make sense to take precautions? Dropbox alone has had the accounts of […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While many IT providers tout the revolutionary benefits of the cloud, very few address the security aspect of it. The fact is, when you’re using a cloud service, you’re moving information out of your hands and into a third party. So doesn’t it make sense to take precautions? Dropbox alone has had the accounts of nearly seven million users hacked. That being said, it’s wise to take precautions and ask the right questions to a cloud computing provider. That’s why we’ve compiled a to-do list to ensure cloud security.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ask your IT provider what cloud security policies they have in place

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This is probably the single most important security measure you can take. Find a trusted IT provider and have a candid conversation with them about their cloud security policies.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Ask where the physical cloud servers are located

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When you have “the conversation,” don’t forget to ask about this. Believe it or not, some cloud servers may not even be located in your own country. Wherever they are, it’s wise to make sure they’re located in a safe data center with proper security afforded to them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Create unique usernames and passwords

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your login credentials represent one of the cloud’s main security vulnerabilities. Think of a better password than “12345” or “football.”
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Use industry standard encryption and authentication protocols

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    IPsec (Internet Protocol Security) is a reliable technology choice.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Encrypt data before it’s uploaded to the cloud

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Encryption is a must, and can be done by you or your cloud service provider. Should hackers manage to access your data, they’ll find it useless because they can’t make heads or tails of it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to trusting the security protocol of a cloud service provider, transparency is key. They should take security seriously, be able to explain their security policies clearly, and be willing to answer any questions. If they can’t do one of these, that’s a red flag telling you to find another vendor.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Are you ready to talk cloud security and transition your business into the cloud? Call us today. We’re happy to answer all your questions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/cloud-migration-made-safe-and-secure/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/4103645413.jpeg" length="17981" type="image/jpeg" />
      <pubDate>Tue, 13 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/cloud-migration-made-safe-and-secure</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/4103645413.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The perfect social media match for your SMB</title>
      <link>https://www.apogeemsp.com/2018/11/the-perfect-social-media-match-for-your-smb</link>
      <description>Social media marketing can be tricky simply because there are so many platforms to choose from. Your first instinct might be to choose Facebook because it is the biggest name in the industry and has the widest reach, but just because it’s effective for other businesses doesn’t mean it will also match your business goals. […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Social media marketing can be tricky simply because there are so many platforms to choose from. Your first instinct might be to choose Facebook because it is the biggest name in the industry and has the widest reach, but just because it’s effective for other businesses doesn’t mean it will also match your business goals. Every business is different, so decision makers should familiarize themselves with all the available platforms before choosing one to invest in.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Facebook

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Research shows that 77% of consumers in the US have social media profiles and that 
    
  
  
                    &#xD;
    &lt;a href="https://www.fundera.com/blog/small-business-social-media-statistics"&gt;&#xD;
      
                      
    
    
      Facebook is the most utilized social media platform
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     by users younger than 50 years old. With over two billion users, Facebook offers the biggest audience and is the perfect place for companies that are looking to increase their brand awareness.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Apart from the huge user base, 
    
  
  
                    &#xD;
    &lt;a href="https://www.thebalancesmb.com/facebook-pages-for-business-2951737"&gt;&#xD;
      
                      
    
    
      Facebook also increases customers’ trust
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     by lending otherwise stiff businesses a human touch. Although you don't have to invest heavily in this platform, you should at least create a basic page. Setting up your company’s page takes only a few minutes and not having one could affect your reputation.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  YouTube

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    YouTube is the second largest search engine in the world with over 1.9 billion registered users. When properly utilized, it can bring in new customers and help you retain old ones. To increase your brand visibility and help viewers to get to know your company better, create a channel with videos about the products or services that you’re offering.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    You can also encourage viewers to subscribe to your channel so they’ll be in the loop every time you upload a new video. Another huge advantage of using YouTube is that Google owns it, and videos from the site are more likely to appear on the first page of search results than other organic content.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Instagram

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Launched in 2010, Instagram is one of the fastest growing social media platforms today. It boasts one billion registered users, mostly on the younger end of the scale (18-24 years old). Instagram is primarily for sharing photos and short videos, but it 
    
  
  
                    &#xD;
    &lt;a href="https://instagram-press.com/blog/2018/06/20/welcome-to-igtv/"&gt;&#xD;
      
                      
    
    
      recently launched IGTV
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    , an in-app tool for users and businesses to upload long-form videos.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Keep in mind that most users prefer to use Instagram for fun and creative content. The platform is known for beautiful photos, so choose aesthetic content over standoffish or corporate content.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To hit two birds with one stone, integrate your Instagram account with your Facebook page so every new picture or video on your profile will automatically post to your Facebook page.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Snapchat

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Another trendy social media platform is Snapchat, which allows its 300+ million monthly users to share photos and videos that disappear within 24 hours. Businesses can use this platform to reach younger audiences through Snap ads, sponsored geofilters, and sponsored lenses.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Snap ads are 10-second full-screen videos with embedded links and calls to action that will appear on the timelines of targeted viewers. Sponsored geofilters and sponsored lenses, meanwhile, are custom filters that may contain elements relating to one’s brand. All these marketing options are 
    
  
  
                    &#xD;
    &lt;a href="https://ads.snapchat.com/"&gt;&#xD;
      
                      
    
    
      available through AdManager
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    , the app’s advertising platform.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Twitter

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Twitter has 328 million active daily users. This number may be small compared to the other social media platforms on this list, but that’s precisely its charm: it gives users the feeling of security and coziness that comes from chatting with businesses directly and publicly. In fact, a whopping 
    
  
  
                    &#xD;
    &lt;a href="https://business.twitter.com/en/basics/intro-twitter-for-business.html"&gt;&#xD;
      
                      
    
    
      85% of SMBs have Twitter accounts
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     that they use to engage with current and potential customers. And because Twitter only allows up to 280 characters per tweet (excluding links), conversations between parties are straight to the point and results-oriented.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you have more questions about social media platforms and how to use them strategically, contact us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/the-perfect-social-media-match-for-your-smb/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2127417850.jpg" length="45044" type="image/jpeg" />
      <pubDate>Mon, 12 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/the-perfect-social-media-match-for-your-smb</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2127417850.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Obsolete firmware poses security risks</title>
      <link>https://www.apogeemsp.com/2018/11/obsolete-firmware-poses-security-risks</link>
      <description>Are you still using that old computer that is not-so gracefully aging and devaluing? Maybe you are running important programs on older machines with old operating systems since they “still work fine.” While it might still help you get the job done, there may be hidden security risks that can lead to major problems later […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Are you still using that old computer that is not-so gracefully aging and devaluing? Maybe you are running important programs on older machines with old operating systems since they “still work fine.” While it might still help you get the job done, there may be hidden security risks that can lead to major problems later on.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      What is firmware?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Firmware is a basic type of software that is embedded into every piece of hardware. It cannot be uninstalled or removed, and is only compatible with the make and model of the hardware it is installed on. Think of it like a translator between your stiff and unchanging hardware and your fluid and evolving software.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      For example, Windows can be installed on almost any computer, and it helps users surf the internet and watch YouTube videos. But how does Windows know how to communicate and connect with your hardware router to do all that? Firmware on your router allows you to update and modify settings so other, 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      higher-level
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
       pieces of software can interact with it.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Why is firmware security important?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Firmware installed on a router is a great example of why addressing this issue is so critical. When you buy a router and plug it in, it should be able to connect devices to your wireless network with almost zero input from you. However, leaving default settings such as the username and password for web browser access will leave you woefully exposed.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      And the username and password example is just one of 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      hundreds
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      . More experienced hackers can exploit holes that even experienced users have no way of fixing. The only way to secure these hardware security gaps is with firmware updates from the device’s manufacturer.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      How do I protect myself?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Firmware exploits are not rare occurrences. Not too long ago, a cybersecurity professional discovered that
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.bleepingcomputer.com/news/security/epic-fail-tp-link-3g-router-spews-admin-password-via-sms/"&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        sending a 33-character text message to a router generated an SMS response that included the administrator username and password
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      .
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Unfortunately, every manufacturer has different procedures for checking and updating firmware. The best place to start is Googling “[manufacturer name] router firmware update.” For instance, if you have a DLink of Netgear router, typing “192.168.0.1” into a web browser will allow you to access its firmware and update process, assuming you have the username and password.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Remember that routers are just one example of how firmware affects your cybersecurity posture. Hard drives, motherboards, and
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;a href="https://www.wired.com/2016/02/flaws-in-wireless-mice-and-keyboards-let-hackers-type-on-your-pc/"&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        even mice and keyboards need to be checked
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/a&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      . Routinely checking all your devices for firmware updates should be combined with the same process you use to check for software updates.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      It can be a tedious process, and we highly recommend hiring an IT provider to take care of it for you. If you’re curious about what else we can do to help, give us a call today!
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/obsolete-firmware-poses-security-risks/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/106388004.jpg" length="60901" type="image/jpeg" />
      <pubDate>Thu, 08 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/obsolete-firmware-poses-security-risks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/106388004.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Protect your browser, protect your business</title>
      <link>https://www.apogeemsp.com/2018/11/protect-your-browser-protect-your-business</link>
      <description>Any successful small- or medium-sized business today must do two things to thrive: digital marketing and network security to keep its data safe from cyber attacks and other forms of data loss. When it comes to security, browsers are no exception. In small- and medium-sized businesses, some 50 to 150 workers access the net daily […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Any successful small- or medium-sized business today must do two things to thrive: digital marketing and network security to keep its data safe from cyber attacks and other forms of data loss. When it comes to security, browsers are no exception. In small- and medium-sized businesses, some 50 to 150 workers access the net daily through the company network via browsers on your devices. Each one of these access points needs to be protected, and it’s easy to do.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Data stored on desktops, servers and in the cloud, doesn’t make it safe. If anything, it makes it available to anyone who has the desire and capabilities to hack into your system and cause mayhem for your business operations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One thing you should be doing to protect your data – and your company – is to make use of privacy-protecting browser extensions. Depending on the nature of your business, both you and your employees are likely to be online at least some, if not all, of the working day. What are some of the browser extensions that can make the experience more secure?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Prevent browser tracking

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you don’t like the idea of a third party (reputable or otherwise) being able to track your browsing habits, try installing a tool for private browsing. These programs offer protection against tracking by blocking third-party cookies as well as malware. Some extensions also boast secure Wi-Fi and bandwidth optimization and can guard against tracking and data collection from social networking sites such as Twitter, Facebook or Google+.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Blocking adverts

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    While online ads may seem harmless, the truth is they can contain scripts and widgets that send your data back to a third party. A decent ad blocking program will block banner, rollover and pop-up ads, and also prevent you from inadvertently visiting a site that may contain malware.
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Many blockers contain additional features such as the ability to disable cookies and scripts used by third-parties on a site, the option to block specific items, and even options to ‘clean up’ Facebook, and hide YouTube comments. The major blockers work with Google Chrome, Safari, and Firefox and you’ll be able to find everything from user-friendly solutions to more advanced tools that are customizable down to the tiniest degree.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Consider installing a VPN

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Unfortunately, browser tracking, malware, and adware are not the only internet nasties that you need to be concerned about. but the good news is that there a number of other extensions that you can download to really get a grip on your online safety. A VPN (Virtual Private Network) is something else to consider. VPNs encrypt your internet traffic, effectively shutting out anyone who may be trying to see what you’re doing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Commonly used in countries where the internet is heavily censored by the powers that be, a VPN allows for private browsing as well as enabling users to access blocked sites – in China’s case that’s anything from blogs criticizing the government to Facebook and Instagram. There are hundreds of VPNs on the market so do a little research and find one that suits you best.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Finally, it goes without saying that having anti-virus and anti-malware software installed on your PC, tablet, and even your smartphone is crucial if you want to ensure your online safety.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Is browsing at your workplace secure? Would you like a more comprehensive security system for your business? We can tell you all about it and help your business protect itself from online threats. Get in touch with us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/protect-your-browser-protect-your-business/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3551566770.jpg" length="52209" type="image/jpeg" />
      <pubDate>Wed, 07 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/protect-your-browser-protect-your-business</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3551566770.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Top reasons for technology business reviews</title>
      <link>https://www.apogeemsp.com/2018/11/top-reasons-for-technology-business-reviews</link>
      <description>Businesses need technology to be profitable and productive. But not all technologies are capable of delivering on their perceived benefits. To make sure your investments are still worth keeping, you need to perform technology business reviews. What is a technology business review? A technology business review reveals the strengths and weaknesses of your company’s IT […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Businesses need technology to be profitable and productive. But not all technologies are capable of delivering on their perceived benefits. To make sure your investments are still worth keeping, you need to perform technology business reviews.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      What is a technology business review?
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
A technology business review reveals the strengths and weaknesses of your company’s IT framework. It’s often performed by a third-party IT consultant who will give an objective assessment of your technology and provide recommendations to help meet your goals. If done properly, technology business reviews allow you to:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Save money
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Every review starts with a cost-benefit analysis to determine whether a solution you’ve implemented is worth the continued investment. If there are technologies costing you a fortune in management and maintenance fees, consultants will advise you to cut them from your budget. The best ones will even recommend cost-effective alternatives so you can do more with less.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Increase productivity
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
System-wide reviews of your IT infrastructure show you what processes are hindering operations and propose solutions that let you work faster and smarter. For example, if employees are mainly sharing files via email, consultants might suggest cloud collaboration platforms like Office 365 or G Suite that store data in a centralized location for seamless file sharing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Enhance security and compliance
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Technology business reviewers also uncover security risks within your business. Consultants scan for missed patches, poorly configured networks, and other software vulnerabilities that make it easy for cybercriminals to hack your systems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    They’ll then compile their findings to create a more robust defense strategy, usually one that involves implementing advanced solutions like intrusion prevention systems, file access restrictions, and patch management software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you operate a business that’s subjected to data regulations like HIPAA or PCI-DSS, consultants will also pinpoint IT practices and solutions that are noncompliant and customize a strategy that ensures the privacy, integrity, and availability of your data.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Implement technologies that fit
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Considering that new technologies are released at a breakneck pace, it’s important you pick the ones that make sense for your operation, its goals, and the bottom line. Technology business reviews keep you up to date on the latest technology trends and gauge the impact of implementing them, so you can make informed decisions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Whether your goal is to increase profits, productivity, security, or all of the above, technology business reviews can put you on the right track. Our seasoned IT consultants can conduct these reviews for you and develop a strategy that gives you an edge over the competition. Just give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/top-reasons-for-technology-business-reviews/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1492737870.jpg" length="36828" type="image/jpeg" />
      <pubDate>Tue, 06 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/top-reasons-for-technology-business-reviews</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1492737870.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How blockchain can revolutionize healthcare</title>
      <link>https://www.apogeemsp.com/2018/11/how-blockchain-can-revolutionize-healthcare</link>
      <description>For non-IT individuals, new trends can seem very confusing. Blockchain, for instance, is a complex concept, but it has the potential to revolutionize every industry, including healthcare. That’s why you should take time to understand what it is and what it can do for your company. What is blockchain? Although the technology is known for […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For non-IT individuals, new trends can seem very confusing. Blockchain, for instance, is a complex concept, but it has the potential to revolutionize every industry, including healthcare. That’s why you should take time to understand what it is and what it can do for your company.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What is blockchain?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Although the technology is known for enabling cryptocurrencies like Bitcoin, blockchain was immediately recognized as having a broader value beyond an alternative form of currency. To understand why it's so vital, you need to be familiar with three key concepts:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Blockchain was originally developed to eliminate the need for centralized banks to process and validate transactions. The technology allows people to transfer money freely because each computer in the blockchain network can examine the chain and confirm whether a transaction is legitimate.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This way, transactions are much safer and more efficient. They cannot be altered unless the security of every computer in the network gets compromised simultaneously. That level of data security and integrity is handy for reducing costs in the healthcare industry.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Blockchain technology in healthcare

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Even with the use of digital files, data loss continues to be one of the biggest problems in healthcare. This resulted to $1.7 billion in damages and as many as 2,000 lives lost in the US, according to 
    
  
  
                    &#xD;
    &lt;a href="https://www.prnewswire.com/news-releases/failures-in-communication-contribute-to-medical-malpractice-300212716.html"&gt;&#xD;
      
                      
    
    
      CRICO Strategies CBS report in 2016
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
    .
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here’s how blockchain can address the problem of data loss and miscommunication:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What’s more, ransomware has taken a toll on data security in healthcare, and service providers are relying on costly solutions to keep up with the exponential growth in digital records. Blockchain technology can resolve both these issues at once.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Adopting new technology can be intimidating, especially for an industry as heavily regulated as healthcare. Blockchain technology has already been adopted by several organizations, but before you embrace this trend, you need full-time IT experts to assess your systems and manage your security. To learn more about how you can use blockchain in healthcare, give us a call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                     
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/11/how-blockchain-can-revolutionize-healthcare/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1320759295.jpg" length="74431" type="image/jpeg" />
      <pubDate>Mon, 05 Nov 2018 21:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/11/how-blockchain-can-revolutionize-healthcare</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1320759295.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How Office 365 deals with phishing attacks</title>
      <link>https://www.apogeemsp.com/2018/10/how-office-365-deals-with-phishing-attacks</link>
      <description>Microsoft not only builds robust productivity solutions for its customers, but it also prioritizes their security above all else. This year, the company invested a lot of money to protect Office 365 subscribers from increasingly sophisticated phishing scams. Read on to learn more about what they did. Effective anti-phishing solutions must be able to recognize […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Microsoft not only builds robust productivity solutions for its customers, but it also prioritizes their security above all else. This year, the company invested a lot of money to protect Office 365 subscribers from increasingly sophisticated phishing scams. Read on to learn more about what they did.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Effective anti-phishing solutions must be able to recognize the key elements of a phishing attack, which includes spoofed (or forged) emails, compromised accounts, unsafe links, and harmful attachments. In April 2018, Microsoft upgraded Office 365’s Advanced Threat Protection (ATP) features so it can better detect these elements and prevent a wide variety of phishing scams. These enhancements include:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Due to these improvements, Office 365 had the lowest phish rate among other well-known email services between May 1 and September 16, 2018. The company has stopped over five billion phishing attempts and protected users against seven billion potentially malicious links. If you’re looking for a secure email platform, Office 365 is the best option for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    That said, it’s not a substitute for good security awareness. No matter how secure Office 365 is, employees still need to be adequately trained to recognize a phishing email when they see one. Hackers are constantly changing their tactics to evade Office 365’s detection systems, so it’s important that everyone is alert at all times.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you need a well-fortified email service, we can implement and manage Office 365 for you. We even offer practical security advice to make sure your business, employees, and assets are safe and sound. Contact us now.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/how-office-365-deals-with-phishing-attacks/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2587680405.jpg" length="19019" type="image/jpeg" />
      <pubDate>Tue, 30 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/how-office-365-deals-with-phishing-attacks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2587680405.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What exactly is proactive cybersecurity?</title>
      <link>https://www.apogeemsp.com/2018/10/what-exactly-is-proactive-cybersecurity</link>
      <description>Most managed IT services providers (MSPs) promise “proactive” cybersecurity consulting. Businesses large and small embrace the idea of preventing cyberattacks and data breaches before they happen, and MSPs themselves would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cybersecurity means, so let’s take a minute to go […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Most managed IT services providers (MSPs) promise “proactive” cybersecurity consulting. Businesses large and small embrace the idea of preventing cyberattacks and data breaches before they happen, and MSPs themselves would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events. But it’s not always clear what proactive cybersecurity means, so let’s take a minute to go over it.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Understand the threats you’re facing

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Before any small- or medium-sized business (SMB) can work toward preventing cyberattacks, everyone involved needs to know exactly what they’re up against. Whether you’re working with in-house IT staff or an MSP, you should review what types of attacks are most common in your industry. Ideally, your team would do this a few times a year.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Reevaluate what it is you’re protecting

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Now that you have a list of the biggest threats to your organization, you need to take stock of how each one threatens the various cogs of your network. Map out every company device that connects to the internet, what services are currently protecting those devices, and what type of data they have access to (regulated, mission-critical, low-importance, etc.).
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Create a baseline of protection

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    By reviewing current trends in the cybersecurity field and auditing your current technology framework, you can begin to get a clearer picture of how you want to prioritize your preventative measures versus your reactive measures.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Before you can start improving your cybersecurity approach, you need to know where your baseline is. Devise a handful of real-life scenarios and simulate them on your network. Network penetration testing from trustworthy IT professionals will help pinpoint weak spots in your current framework.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Finalize a plan

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    All these pieces will complete the puzzle of what your new strategy needs to be. With an experienced technology consultant on board for the entire process, you can easily synthesize the results of your simulation into a multi-pronged approach to proactive security:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As soon as you focus on preventing downtime events instead of reacting to them, your IT infrastructure will increase your productivity and efficiency to levels you’ve never dreamed of. Start enhancing your cybersecurity by giving us a call for a demonstration.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/what-exactly-is-proactive-cybersecurity/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2424657686.jpg" length="18130" type="image/jpeg" />
      <pubDate>Fri, 26 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/what-exactly-is-proactive-cybersecurity</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2424657686.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>6 Tips to keep your Mac computer safe</title>
      <link>https://www.apogeemsp.com/2018/10/6-tips-to-keep-your-mac-computer-safe</link>
      <description>Although it is important, security is something that some Mac users overlook. That’s fine if all you do is watch YouTube videos or experiment with Photo Booth, but not if you use your computer for day-to-day business operations. Prevent internal and external threats from harming your device with these tips.  The basics First, let’s start […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Although it is important, security is something that some Mac users overlook. That’s fine if all you do is watch YouTube videos or experiment with Photo Booth, but not if you use your computer for day-to-day business operations. Prevent internal and external threats from harming your device with these tips. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      The basics
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      First, let’s start with the basics and head over to the Security &amp;amp; Privacy pane in System Preferences. Here, you’ll find the General, FileVault, Firewall, and Privacy tabs, which control various aspects of security. To change your security settings, click on the padlock icon on the bottom of the screen and type in your username and password.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Firewall
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Enabling the firewall will block unwanted incoming network connections. All you need to do is click 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Firewall 
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      in the System Preferences &amp;gt; Security &amp;amp; Privacy pane, click the padlock icon on the bottom left, enter your username and password, and click 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Turn On Firewall
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      . Don’t forget to enable Stealth Mode by clicking 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Firewall Options 
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      then clicking 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;i&gt;&#xD;
      &lt;span&gt;&#xD;
        
                        
      
      
        Enable Stealth Mode 
      
    
    
                      &#xD;
      &lt;/span&gt;&#xD;
    &lt;/i&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      in the dialog box — this makes your computer invisible on public networks.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Passwords
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Make sure to set strong passwords for your user accounts if haven’t already. To do this, go back to the General section of the Security &amp;amp; Privacy settings. In this section, you should also consider setting the Require Password field to “immediately.” This will require you to re-enter your login credentials to unlock your Mac when it goes to sleep mode or when a screensaver is on.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Automatic login
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      It’s best to disable this function, especially if you are using a mobile Mac. If your Mac gets stolen, you don’t want to give thieves a free pass to your private data.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Applications
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      At the bottom of the General Settings tab, there are three options that authorize which apps can run on your Mac. The safest option is to allow only apps from the App Store to run, and the least secure option is to allow apps downloaded from unauthorized stores. Get the best of both worlds by choosing the option of running apps from the App Store and from developers known to Apple.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      FileVault
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      The FileVault tab enables you to encrypt all the files in your account. To decrypt them, you must enter either your account password or the recovery key you created when you switched FileVault on. It might be tedious to type in a password every time to access a file, but it helps keep your vital data under lock and key.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      In this digital age, ensuring the protection of all your devices is crucial to your business’s success. Feel free to give us a call and we’ll help prepare your business for choppy waters.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/6-tips-to-keep-your-mac-computer-safe/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3414017464.jpg" length="18081" type="image/jpeg" />
      <pubDate>Thu, 25 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/6-tips-to-keep-your-mac-computer-safe</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3414017464.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>How IoT will change businesses</title>
      <link>https://www.apogeemsp.com/2018/10/how-iot-will-change-businesses</link>
      <description>In today’s corporate environment, most industries are ready for the Internet of Things (IoT) in their own unique ways. Let’s take a look at these examples of utilizing IoT in various business niches that are in operation or will be implemented soon. Improved logistics With IoT sensors, supply chain management and order fulfillment processes improve […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In today’s corporate environment, most industries are ready for the Internet of Things (IoT) in their own unique ways. Let’s take a look at these examples of utilizing IoT in various business niches that are in operation or will be implemented soon.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Improved logistics
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
With IoT sensors, supply chain management and order fulfillment processes improve markedly to meet customer demand. For example, sensors on delivery containers and trucks in transit give managers real-time status updates, allowing them to track their items and ensure they reach the right location at the right time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Streamlined inventory
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
IoT also presents automation opportunities for businesses that need to manage and replenish their stock. When data recorded from IoT devices are tied to your enterprise resource planning (ERP) system, you can accurately monitor your inventory, analyze purchase and consumption rates of a particular product, and automatically reorder items when IoT sensors detect that supply is running low. This minimizes out-of-stock incidents and prevents excess stock build-up.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Fast payment
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Given how most payments are done electronically via point-of-sale systems or the internet, IoT has the potential to revolutionize the way businesses process transactions. For example, ApplePay not only allows users to purchase goods and services using the usual smartphone applications, but through state-of-the-art wearable technology as well.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Soon, IoT devices might even allow restaurants and retailers to register or charge their customers the moment they walk through the door.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Market insight
    
  
  
                    &#xD;
    &lt;br/&gt;&#xD;
    
                    
  
  
    
Businesses that can make sense of IoT-collected data will gain a competitive edge. Marketers, for example, can gather valuable insight into how their products are used and which demographic is utilizing them the most. This information can then inform future marketing efforts and give businesses more focused direction on how to improve their products and services for their customers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Although businesses will certainly face many challenges in implementing the Internet of Things, those who overcome them will reap all the benefits of this burgeoning technology.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Want to know if an IoT deployment is right for your business? Contact our certified IT consultants today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/how-iot-will-change-businesses/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3047824109.jpg" length="41252" type="image/jpeg" />
      <pubDate>Wed, 24 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/how-iot-will-change-businesses</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3047824109.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>5 Tricks to cut cloud costs</title>
      <link>https://www.apogeemsp.com/2018/10/5-tricks-to-cut-cloud-costs</link>
      <description>As a business owner, it’s important to be aware of the unexpected costs associated with the cloud and what measures you can take to keep those costs down. They might not add up to much at first, but could eventually cost you more than the service is worth. Pay the right price for the services […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    As a business owner, it’s important to be aware of the unexpected costs associated with the cloud and what measures you can take to keep those costs down. They might not add up to much at first, but could eventually cost you more than the service is worth. Pay the right price for the services you receive with these five tips:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  No standalones

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cloud services come in various shapes and sizes, many of which are standalone platforms with rates that increase over time. Opt for a service provider that offers a suite of products that all work together. They are often less expensive than a group of standalone products. Another benefit of working with a cloud provider is that you receive a single point of contact to resolve your issues quickly and effectively.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Experience matters

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you plan on integrating a standalone cloud service into your system, make sure you hire an experienced integration consultant to facilitate a smooth transition. Integration mishaps can cause serious downtime and cost a lot of money.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Backups are important

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Unnecessary or inefficient backups will waste cloud storage space. Examine your cloud storage data by asking the following questions:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Remove users

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Many cloud service providers charge by the number of users in your system. By neglecting to manage the list of users, you could end up paying for people who no longer work for you. Implement processes that remove users when they are terminated and consider scheduling a regular audit. Ideally, this should be once every six months to a year, to ensure your cloud user list is up-to-date.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Monitor proactively

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Ask your cloud provider whether they can proactively monitor your account and notify you of potential issues before they cause problems. This is especially important if you have a pay-as-you-go license that charges based on resource or storage consumption.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Utilizing the right technology resources is vital to your business’s success, and so is knowing how to prevent them from racking up an overwhelming monthly bill. If you wish to enjoy all the benefits of cloud computing without breaking the bank, give us a call and we’ll be happy to help.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/5-tricks-to-cut-cloud-costs/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/3468704651.jpg" length="27352" type="image/jpeg" />
      <pubDate>Tue, 23 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/5-tricks-to-cut-cloud-costs</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/3468704651.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Reasons your business needs CRM software</title>
      <link>https://www.apogeemsp.com/2018/10/reasons-your-business-needs-crm-software</link>
      <description>Failure to understand your customers’ needs and wants could result in ill-informed marketing strategies. And when your company can’t satisfy their demands, they’ll likely turn to your competitors instead. To prevent this, deploying a customer relationship management (CRM) system can make a world of difference. Here’s a handful of reasons to make the switch. Grows […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Failure to understand your customers’ needs and wants could result in ill-informed marketing strategies. And when your company can’t satisfy their demands, they’ll likely turn to your competitors instead. To prevent this, deploying a customer relationship management (CRM) system can make a world of difference. Here’s a handful of reasons to make the switch.
      
    
    
                      &#xD;
      &lt;br/&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Grows with your business

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The ol’ Rolodex may have been useful for managing a few clients, but you’ll need a much better solution if you plan to maintain relationships with hundreds, possibly thousands, more. CRM scales with your business, meaning it can handle larger data sets and more clients as you expand your sales operation.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Organizes your data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    CRM software acts as a central database for all your sales records and transactions. This means important customer information can be retrieved in just a few clicks rather than by rifling through thousands of documents, sticky notes, and disorganized cabinets. And since CRM is hosted in the cloud, sales data, customer interactions, and other actionable information are available for the entire company.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Improves customer service

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Your sales team could be the most persuasive individuals in the world, but this means nothing if they can’t recall anything about their clients and their preferences. When your sales staff follows up on leads or existing customers, CRM will automatically retrieve contact history, past purchases, and customer preferences from your client database and display them on a single page during the call.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Armed with detailed customer information, sales representatives will be able to recommend products and services that meet the client’s needs. So instead of struggling through a sales call, marketing employees can focus on delivering a professional sales pitch.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Streamlines your sales funnel

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    CRM comes equipped with workflow management functions, supporting your sales pipeline in a number of ways. For example, you can configure your CRM to send instant follow-up emails when a lead visits a particular product page. You can even use automation to track where certain leads are in the sales pipeline and delegate the task to one of your sales closers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Analyzes sales data

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With real-time sales information, business managers can track marketing campaigns and adjust their strategy accordingly. For instance, you might notice that click-through-rates for promotional emails and company newsletters are higher during Tuesday afternoon than Friday night. Having this information can help you focus your marketing efforts and message to generate more leads.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In addition, you can use CRM to analyze customer calling activity, market demographics, lead conversion rates, and key performance indicators to influence future business decisions.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Understanding your customers can put you several steps ahead of the competition. If you need to manage contacts, eliminate time-consuming procedures, and improve your sales performance, CRM is the perfect business solution.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Contact us today to find out whether CRM is the right fit for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/reasons-your-business-needs-crm-software/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/560550696.jpg" length="30551" type="image/jpeg" />
      <pubDate>Mon, 22 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/reasons-your-business-needs-crm-software</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/560550696.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Office Insider: Get previews of new features</title>
      <link>https://www.apogeemsp.com/2018/10/office-insider-get-previews-of-new-features</link>
      <description>With major improvements like Calendar.help, Outlook, and Surface Pen, you would think that Office 365 has already reached its full potential. With the Office Insider feature, you’re bound to be proven wrong as you’ll have access to new features that make Office 365 better with each update. These nitty-gritty improvements give a competitive edge to […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    With major improvements like Calendar.help, Outlook, and Surface Pen, you would think that Office 365 has already reached its full potential. With the Office Insider feature, you’re bound to be proven wrong as you’ll have access to new features that make Office 365 better with each update. These nitty-gritty improvements give a competitive edge to businesses that rely on Microsoft’s productivity software.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Early Access

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Subscribing to Office Insider gives you access to new innovations, security updates, and bug fixes months before they are released to the public. This insider feature is available in two levels: the fast ring where updates are rolled out more frequently, but come with a few bugs, and the slow ring where updates are released slower, but come with little to no software bugs.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  What’s new for Office Insiders?

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    By being an Office 365 Insider, you can test the waters and get acquainted with the features way ahead of your competition.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Reserving a meeting room can be a lot easier now through Outlook. Misspelled search terms are now automatically managed by Outlook. Also, with the new supercharged VLOOKUP, HLOOKUP, and MATCH functions, you can easily find answers to your queries.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Feedback

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Subscribing to the Insider program also allows you to give your feedback directly to the Microsoft product team. It will help you to accustom yourself with the features earlier, and you’ll contribute to making Office 365 better for other users worldwide. You’ll be a part of the ongoing process of Office improvement.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Office Insider can open up your company to a wide variety of productivity-boosting features. The only question you have to ask yourself now is: Do I want to be at the cutting edge of tech innovations?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Contact us today to find out how you can get on the inside and know the latest Office updates.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/office-insider-get-previews-of-new-features/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2799818948.jpg" length="59748" type="image/jpeg" />
      <pubDate>Tue, 16 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/office-insider-get-previews-of-new-features</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2799818948.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>4 types of hackers to watch out for</title>
      <link>https://www.apogeemsp.com/2018/10/4-types-of-hackers-to-watch-out-for</link>
      <description>Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Why do hackers attack? Is it for money, notoriety, or political reasons? As a business owner, you should always try and find out the motive behind an attack to help you determine whether or not you’re a target and what data you need to protect. Let’s take a closer look at four different types of hackers and their motives.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Script Kiddies

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Skill-wise, script kiddies (or skids, for short) are at the bottom of the hacker totem pole. Their name comes from the fact that they use scripts or other automated tools written by others. Most of the time, script kiddies are young people on a quest for internet notoriety. Or, more often than not, they’re simply bored and in search of a thrill. Many never become full-time hackers; in fact, many script kiddies end up using their skills for the greater good, working in the security industry.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Though lacking in hacking know-how, script kiddies shouldn’t be dismissed so easily, as they can cause businesses much damage. In May 2000, for instance, a couple of skids sent out an email with the subject line “ILOVEYOU” and ended up causing a reported $10 billion in lost productivity and digital damage.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Hacktivists

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Hacktivists are primarily politically motivated, and they often hack into businesses and government systems to promote a particular political agenda or to effect social change. These so-called “hackers with a cause” steal confidential information to expose or simply disrupt their target’s operations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you’re a small- or medium-sized (SMB) owner, don’t think for a second that you’re immune to hacktivist attacks. This is especially true if your company is associated or partnered with organizations that are prime hacktivist targets. Or, if your business provides services that can be seen as unethical, you may targeted by hacktivists as well.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Cybercriminals

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When a hacker breaks into digital systems or networks with malicious intent, they are considered a cybercriminal. Cybercriminals target everyone from individuals to SMBs to large enterprises and banks that either have a very valuable resource to steal or security that is easy to exploit, or a combination of both.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    They can attack in a number of ways, including using social engineering to trick users into volunteering sensitive personal or company data, which they can then sell in underground markets in the dark web. They can also infect computers with ransomware and other malware, or use digital technology to carry out “conventional crimes” like fraud and illegal gambling.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Insiders

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Perhaps the scariest type of hacker is the one that lurks within your own organization. An insider can be anyone from current and former employees to contractors to business associates. Oftentimes their mission is payback: to right a wrong they believe a company has done them, they’ll steal sensitive documents or try to disrupt the organization somehow. Edward Snowden is a prime example of an insider who hacked his own organization — the US government.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Now that you know what motivates your enemy, and you think you might be a target, it’s time to secure your business from the different types of hackers out there. Get in touch with our experts today to learn how.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/4-types-of-hackers-to-watch-out-for/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1939649829.jpg" length="31407" type="image/jpeg" />
      <pubDate>Thu, 11 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/4-types-of-hackers-to-watch-out-for</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1939649829.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Business computers: things to look for</title>
      <link>https://www.apogeemsp.com/2018/10/business-computers-things-to-look-for</link>
      <description>When it comes to business computers, you can't mess around. The wrong choice of hardware can pile up costs for any small- and medium-sized business (SMB). You don't need unnecessary repairs, incompatible systems, and data breaches slowing operations down or draining resources. This guide will help your SMB make cost-efficient choices in hardware. Portability Laptops […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    When it comes to business computers, you can't mess around. The wrong choice of hardware can pile up costs for any small- and medium-sized business (SMB). You don't need unnecessary repairs, incompatible systems, and data breaches slowing operations down or draining resources. This guide will help your SMB make cost-efficient choices in hardware.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Portability

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Laptops allow you to keep working when you don’t have an electrical outlet. However, this ability to take your work anywhere can be counterproductive by creating more stress on employees who think they must work all the time.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Memory/Speed

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Desktop computers used to have more memory and faster processors than laptops. And although high-powered laptops have caught up, they are more expensive. If work is limited to word processing and emailing, affordable less-powerful laptops should be enough. Anything more will probably require a desktop machine.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Security

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Data security is necessary not only against data leaks but as protection from litigation, reputation damage, and loss of business. With a network security system and IT staff, vulnerabilities are easier to address for desktop computers within office premises. They're also less likely to be stolen.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    For laptops, however, mobility makes them more vulnerable. Data loss is a real risk as laptops may be connected to unsecured networks and hotspots or be lost or stolen. Protecting your laptops require special safeguards, and consequently more time and money.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Price

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Laptops and desktops come in varying prices according to preferences. On the cheaper end of the price range spectrum, there are notebook-style laptops that are limited to word processing and web browsing capabilities. Desktops have affordable equivalents as well. The deciding factor when it comes to price is your IT service provider or hardware supplier. With the right partner, you should be able to get a good bulk deal on powerful but affordable desktops or laptops.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Longevity

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Laptop computers may provide the convenience of mobility, but it’s much harder to upgrade their components as they get older. Laptops are also easier to drop or damage and more expensive to replace or repair. Being in a fixed location, desktops are less prone to this. And unlike laptops, many desktops are not always pre-assembled. Many desktops can be custom built with parts that are easily removed, replaced, or upgraded.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Final Recommendation

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    A growing company really needs a combination of both types of computers. However, a desktop computer will be generally more reliable for the fledgling company owner. Laptops should be added as budget permits to provide that extra portability and convenience, especially for managers who work remotely.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If you have other questions regarding enterprise hardware, give us a call. We'd be happy to recommend the best solution according to your company's business needs and objectives.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/business-computers-things-to-look-for/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/585221678.jpg" length="26593" type="image/jpeg" />
      <pubDate>Tue, 09 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/business-computers-things-to-look-for</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/585221678.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Web conversion made easy with 5 tips</title>
      <link>https://www.apogeemsp.com/2018/10/web-conversion-made-easy-with-5-tips</link>
      <description>Every marketing channel has best practices. For websites, it comes down to being user-friendly. Without this, even a terrific-looking website may discourage visitors from signing up for a free e-book or consultation. Be sure your website follows these 5 rules that make it easier to attract visitors and convert them. Make it mobile-friendly More people […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Every marketing channel has best practices. For websites, it comes down to being user-friendly. Without this, even a terrific-looking website may discourage visitors from signing up for a free e-book or consultation. Be sure your website follows these 5 rules that make it easier to attract visitors and convert them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Make it mobile-friendly

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    More people are now surfing the web on the go – via smartphones, tablets, and laptops. If you want a piece of this traffic, you need to make your website's design responsive to all mobile devices.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To give your visitors an enjoyable mobile experience, make sure your website design fits the screen of any device. Additionally, all elements of your website – pages, resources, actions, and so on – should be easily accessible. If not, visitors will get frustrated and click away to a competitor. And who can blame them? You’d probably do the same.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Make it easy for customers to contact you

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This means displaying your phone number in the upper-right corner of every page and providing a simple, easy-to-find contact form. While some people prefer not to give up their email address for fear it will be picked off by spambots, it can serve as another contact option for those who hate web forms. Ideally, you will provide more than one way for your customers to contact you. Give your visitors a choice, make it easy, and they will come.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Keep it simple

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Have you started to notice a theme here? Proper web design can be summed up in one word: easy. People are always busy. They don’t have time to navigate a complicated website, dig through dozens of pages to find a contact number, or try and figure out what it is that you’re selling because your mobile site doesn’t display content properly.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    So when it comes to design, simplicity makes sense. When producing a simple website, every page, word, and image you create must have a singular purpose: to get visitors to contact you. Don’t waste time distracting them with excessive information, silly games, or flashy animations. Instead, have a nice clean layout so they can understand what you’re offering quickly and can contact you with a click.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Include personal photos whenever possible

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Say you have to choose between two different websites. They both sell the same thing and look virtually the same. The key difference is that one uses real photos of the owner and his or her staff, while the other uses generic stock images of business people. Assuming images from both sites are of the same quality, which one will you more likely choose? Undoubtedly, the one that looks the most authentic.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    So next time you have to choose between stock images and shooting photos of you and your staff, invest some time and money in quality pictures taken at a studio – it’ll be worth every penny.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Move social media icons to the bottom of the page

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Everyone loves throwing social media icons on their websites, and it’s not a bad idea to show your credibility. However, if you put these at the top of the page, your visitor is more likely to click on them immediately. Sounds cool, right? Wrong. When this happens, you just created an exit for them to leave your site and never return – and we all know how easy it is to get distracted on social media.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Instead, place your social media icons at the bottom of the page or in the footer area. Remember the goal of your website is to convert. If your visitors leave before they get a chance to explore your services, content, and offerings, you’ve lost them before you even had them.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Need a website or another solution to enhance your digital presence? Give us a call and leverage our IT expertise for your business.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/web-conversion-made-easy-with-5-tips/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/359009748.jpeg" length="30658" type="image/jpeg" />
      <pubDate>Fri, 05 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/web-conversion-made-easy-with-5-tips</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/359009748.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Ignore these outdated disaster recovery myths</title>
      <link>https://www.apogeemsp.com/2018/10/ignore-these-outdated-disaster-recovery-myths</link>
      <description>With advancements in cloud computing, disaster recovery (DR) has become more efficient and affordable than ever. But many business owners still cling to DR myths that can safely be ignored. If you’re uncertain as to how DR has changed and are ready for an update, here are some myths that you ought to ignore.  Tape […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      With advancements in cloud computing, disaster recovery (DR) has become more efficient and affordable than ever. But many business owners still cling to DR myths that can safely be ignored. If you’re uncertain as to how DR has changed and are ready for an update, here are some myths that you ought to ignore. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Tape backups are the best DR solution
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Backup tapes are physical objects that deteriorate over time. Don’t believe us? Try listening to a cassette tape from the ‘90s. Over time, tape backups become distorted and stop working. Deterioration is slow and may only affect some files in the early stages, so don’t settle for a mere cursory check. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Aside from backups in your office, another set of tape backups needs to be stored outside your premises. In case a natural disaster damages your office, not all your data will be wiped out. But if your storage space isn’t safe from the elements, this could also be a problem. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Unlike tape backups, a cloud-based backup saves you time. Data is automatically backed up online, and you don’t need to spend time managing boxes of tapes. Your time is better spent on your assigned tasks, not IT management. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      The RTO you want will be too expensive
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Recovery time objectives (RTO) are essential to any DR plan. You need to get everything up and running again as quickly as possible to avoid serious losses. In the days before the cloud, a swift recovery time could cost you well into six figures. Today, cloud and virtualization solutions have made this much more affordable, and faster than ever before. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      Most DR providers can back up your critical data in an hour or two. And if you ever need to recover it, most services can do so in less than a day. That’s the power of the cloud. And when it comes to DR, it truly has changed everything. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;b&gt;&#xD;
      
                      
    
    
      Disaster recovery is for big business, not SMBs
    
  
  
                    &#xD;
    &lt;/b&gt;&#xD;
    &lt;b&gt;&#xD;
      &lt;br/&gt;&#xD;
    &lt;/b&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      The cloud has made this valuable service affordable for businesses of all sizes. From dental offices to small retail operations, SMBs can now take advantage of the best DR solutions on the market. Advances in IT and the cloud have eliminated the obstacles of complexity, costs, and insufficient IT resources. 
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      
                      
    
    
      We hope that by dispelling these myths, we’ve convinced you that disaster recovery is more affordable and efficient than ever. If you’d like to learn how our DR solutions can safeguard your business, send us a message and we’ll gladly fill you in.
    
  
  
                    &#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/ignore-these-outdated-disaster-recovery-myths/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1908269334.jpg" length="42854" type="image/jpeg" />
      <pubDate>Thu, 04 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/ignore-these-outdated-disaster-recovery-myths</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1908269334.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>4 Items in Your HIPAA Compliance Checklist</title>
      <link>https://www.apogeemsp.com/2018/10/4-items-in-your-hipaa-compliance-checklist</link>
      <description>Getting your practice up to code when it comes to HIPAA regulations can seem challenging upon first glance, but knowing where your IT efforts must be focused is the first step. In this article, we’ll zero in on four of the most critical items you must look into in order to become HIPAA-compliant. Telehealth and […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Getting your practice up to code when it comes to HIPAA regulations can seem challenging upon first glance, but knowing where your IT efforts must be focused is the first step. In this article, we’ll zero in on four of the most critical items you must look into in order to become HIPAA-compliant.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Telehealth and mHealth are not always compliant

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your practice has invested in, or is thinking about investing in, telehealth or mobile health (mHealth), you need to make sure that the tech you utilize is HIPAA-compliant. While most telehealth technology is HIPAA-approved, one or two additional measures might be required to make it compliant. An IT specialist should have no problem making sure your telehealth is up to code.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    On the other hand, mHealth might be a little more problematic. While a lot of hardware and apps, including Fitbit and the Apple Watch, are HIPAA-compliant, it is a field that is still very new and constantly changing. Your best bet is to consult with an expert to make sure your mHealth services are following all the necessary regulations.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  All info, not just EHRs, needs to be HIPAA-compliant

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your office has individually identifiable ePHI data on site, including information like billing records, appointment information, and test results, they must be kept on HIPAA-compliant devices and servers. A lot of medical practices that use cloud-based storage for their EHRs overlook this fact and opt for low-cost platforms that don’t meet certain minimums. While it’s good to have your EHRs ready to go on the cloud, make sure that your non-EHR data is protected as well. If it isn’t, you could be facing a fine.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Your protected health information notice must be available online

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    If your practice has a website, 
    
  
  
                    &#xD;
    &lt;a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/privacy-practices-for-protected-health-information/index.html"&gt;&#xD;
      
                      
    
    
      HIPAA’s rules
    
  
  
                    &#xD;
    &lt;/a&gt;&#xD;
    
                    
  
  
     dictate that it must contain a copy of your updated protected health information notice for patients to access. If you have a website and this information is not currently posted, rectify this as soon as possible to avoid any problems.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Healthcare business associates must also be HIPAA-compliant

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Conformity to HIPAA regulations is not just limited to medical practices, healthcare clearinghouses, and health plan organizations. Any business that has access, electronic or otherwise, to protected health information is also required by law to be HIPAA-compliant. This includes any accounting or law firms you work with that may already be accessing your files electronically to carry out work.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To avoid any potential trouble for your practice or its partners, it is best to ask them if they are HIPAA-compliant before partnering with them. If they aren’t, revoke all data access privileges, and make sure they take action to correct this issue immediately.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Still not sure if you’re 100% HIPAA-compliant? Our team of experts can run the necessary risk analysis and correct issues with your technology that may not be in line with current regulations. Just give us a call today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/10/4-items-in-your-hipaa-compliance-checklist/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/2927795618.jpg" length="27596" type="image/jpeg" />
      <pubDate>Mon, 01 Oct 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/10/4-items-in-your-hipaa-compliance-checklist</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/2927795618.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Beware of these social engineering tactics</title>
      <link>https://www.apogeemsp.com/2018/09/beware-of-these-social-engineering-tactics</link>
      <description>The Rio Summer Olympics took place years ago, but the hackers who infamously used social engineering to exploit the event are still with us. Although business owners may think that their systems are safe from malware, they may not be prepared for social engineering. This strategy can be used to steal personal information from unsuspecting […]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The Rio Summer Olympics took place years ago, but the hackers who infamously used social engineering to exploit the event are still with us. Although business owners may think that their systems are safe from malware, they may not be prepared for social engineering. This strategy can be used to steal personal information from unsuspecting victims and it doesn’t require any advanced technology. Here are some common social engineering scams you should know.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Phishing

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    This is the most frequently used social engineering attack, especially against small businesses. Check out these frightening statistics:
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    How is phishing carried out? Criminals make use of emails, phone calls, or text messages to steal money. Victims are directed to phony websites or hotlines and are tricked into giving away sensitive information like names, addresses, login information, social security, and credit card numbers.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To protect yourself, be wary of emails from people you don’t know that offer you a prize, come with attachments you didn’t request, direct you to suspicious sites, or urge you to act quickly. Phishing emails usually appear to come from reliable sources, but they are wolves in sheep’s clothing.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    One of the most infamous and widespread examples of phishing was during the 2016 Summer Olympics in Rio, where victims received fraudulent emails for fake ticketing services that stole their personal and financial information.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Tailgating

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    What’s the fastest and easiest way for criminals to enter a secure office? Through the front door, of course! Tailgating happens when an employee holds the door open for strangers and unauthorized visitors, allowing them to infiltrate an organization. This simple act of kindness enables fraudsters to enter restricted areas, access computers when no one is looking, or leave behind devices for snooping.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Quid pro quo

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Here, scam artists offer a free service or a prize in exchange for information. They may lure their victims with a gift, concert tickets, a T-shirt, or early access to a popular game in exchange for login credentials, account details, passwords, and other important information. Or hackers may volunteer to fix their victims’ IT problems to get what they want. In most cases, the gift is a cheap trinket or the tickets are fake, but damages from stolen information are all too real.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;h3&gt;&#xD;
  
                  
  Pretexting

                &#xD;
&lt;/h3&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Fraudsters pretend to be someone else to steal information. They may pose as a telemarketer, tech support representative, co-worker, or police officer to fish out credit card information, bank account details, usernames, and passwords. The con artist may even convince the unsuspecting victim to apply for a loan over the phone to get more details from the victim. By gaining the person’s trust, the scammer can fool anyone into divulging company secrets.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    In spite of the many security measures available today, fraudsters and their social engineering schemes continue to haunt and harm many businesses. Thus, it’s best to prepare for the worst. To protect sensitive information, educate yourself and be careful. Remember: If anything is too good to be true, it probably is!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    To shield your business from social engineering attacks, don’t take chances! Get in touch with us today.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="http://www.techadvisory.org/2018/09/beware-of-these-social-engineering-tactics-2/"&gt;&#xD;
      
                      
    
  
      Source.
    

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://irp-cdn.multiscreensite.com/99644ae3/1989198780.jpg" length="20687" type="image/jpeg" />
      <pubDate>Tue, 25 Sep 2018 20:00:00 GMT</pubDate>
      <guid>https://www.apogeemsp.com/2018/09/beware-of-these-social-engineering-tactics</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://irp-cdn.multiscreensite.com/99644ae3/1989198780.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
  </channel>
</rss>
