Blog

Beware of watering hole attacks!

Hackers have plenty of ways to breach your systems. They can use complex programs to exploit software bugs, send emails to dupe you into downloading malware, or insert a malware-infected USB drive directly into your computer. However, another increasingly popular hacking method is a watering hole attack. What are watering hole attacks? Much like phishing,

Read More »

Back up your files with Apple Time Machine

There’s a popular belief that Macs are the most reliable computer brand because they are less likely to get viruses or crash often – but they do. And like any other computer, Macs aren’t invulnerable to coffee spills, theft, and crashes. When these happen, the Time Machine is your friend to restore your data. What

Read More »

4 ways to speed up mobile charging

Whether you use an iPhone or a Xiaomi, your mobile will sooner or later run out of battery. When this happens, you want it to be charged to 100% quickly, but not everyone knows how to do it. Read on to learn four ways about how you can charge your mobile faster. #1. Optimize your

Read More »

5 Things SMB owners don’t realize about cloud solutions

Surveys show that 85% of businesses in the US are using more than one cloud solution, so there’s no doubt that the cloud has gone beyond trendy to become the new norm for businesses with 10-100 computers. Although most people understand that cloud platforms allow you to access files and software applications via the internet,

Read More »

3 Surprising applications of blockchain

Most people associate blockchain technology with Bitcoin, the infamous digital currency that rose to fame in 2017. But blockchain technology is not tied to financial transactions, and it’s creating all sorts of exciting opportunities for faster, more secure information exchange — see for yourself! What is blockchain? Blockchain, like the cloud, is more of a

Read More »

3 ways to ensure your FB data is private

The public went into a frenzy when reports surfaced that Cambridge Analytica, a UK-based data analytics firm, retrieved millions of Facebook users’ private information without their knowledge. But that doesn’t mean you can’t do anything about it, and here are 3 ways to guarantee your data remains private. Download your Facebook data The thought of

Read More »

Did Facebook secretly collect Android data?

It was recently exposed that Facebook has been collecting Android phone users’ call history and SMS data for years. This may be alarming to many users, but Facebook has assured us that it was collected with consent. Here’s everything you need to know. How Facebook’s data-collecting activities were discovered Software developer Dylan McKay realized Facebook

Read More »

Windows Server 2019 announced

If Microsoft’s latest server software is any indication, the virtualization trend shows no signs of slowing down. The first preview of Windows Server 2019 was released in March and includes a number of features focused on IT efficiency. Let’s take a look at the most valuable updates for small businesses. Windows Server 2019 In March,

Read More »

Cybersecurity for SMBs requires a lot more than antivirus software

As a company comprised largely of US military veterans, the Sundog team has a unique perspective on network security. We believe that although military service and IT support take place in widely dissimilar physical environments, their success strategies are closely related. In the same way that you can’t pit an Ancient Roman soldier against a

Read More »
Free eBook for law firms! Discover how managed IT services can improve your firm’s efficiency, security, and compliance.Download Now
Scroll to Top

Sign Me Up For The Free Assessment