If you’re like most people, the GPS function on your smartphone has become the one feature you use and value more than any other. Few people these days can even remember what life was like before the ascendency of GPS. Paper maps? Written directions? Those things seem as archaic in today’s world as a stone […]
Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing […]
Apple CEO Tim Cook has been busy. Knowing that his company has little chance of dramatically increasing their market share in an increasingly saturated field for handheld devices, they’ve shifted gears. They are building a raft of new features and premium services into the Apple Store to make the product’s ecosystem even more vibrant than […]
How much does a successful ransomware attack cost a victim on average? The numbers will terrify you. Based on the latest statistics compiled by Coveware, each incident of a compromised computer costs a whopping $6,733, which is a hefty 13 percent increase from just one quarter ago. Part of the increase stems from the fact […]
How economies of scale make it hard for small practices to compete Small and start up operations suffer from the problem of “economies of scale,” making it hard for them to compete with larger firms. This is especially true in the area of IT infrastructure. Small practices need, but generally cannot afford, a completely […]
A small but growing number of people have been making the switch to MS Office clones like Apache’s OpenOffice and LibreOffice. The thinking is that they can get the same core functionality but avoid many (if not most of) the costs, bugs, flaws and weaknesses that have plagued Microsoft’s offering. This situation is often seen […]
Skype is introducing a new feature to its video call service that users have been asking about for quite some time now. Background blur. If you regularly make video calls, you’ve probably been in a situation where such a feature would have come in handy. It could be anything, really. Maybe you’re working from home […]
Ransomware and disaster recovery plans Disaster recovery is a basic element of good continuity planning. Business continuity planning–in the case of schools, the better term might be organisational continuity planning– refers to the broad range of plans created so that a institution can continue to be operational no matter what negative event might occur. […]
For the last several years, industry experts have been sounding the alarm about password security. We’ve known for quite some time that one of the biggest weak spots in corporate security is the fact that employee passwords are notoriously weak. Millions have been spent on security education. Seminars have been held on the dangers of […]
Healdsburg, Feb 28, 2019 – Fusion Technology Solutions, a Healdsburg-based computer networking and technology services company, has been named to the CRN 2019 Managed Service Provider (MSP) Top 500 list, recognizing North American solution providers with innovative approaches to managed services. Among these, Fusion Technology Solutions was further named to the MSP Pioneer 250, recognizing […]