Blog

Past Event—The Best Free One-Hour Cybersecurity Awareness Training Ever—2020 Edition—Jan 30

The BAD news is that for many people and organizations, cybersecurity seems scary and overwhelming.

The GOOD news is that there are some basic things you can do to make yourself and your organization much more secure.

The GREAT news is that, for the fourth year in a row, RoundTable Technology is offering a free webinar to teach you and your staff exactly what you can do.

Business continuity in the cloud

Are you weighing the pros and cons of the cloud for business continuity? Let’s take a closer look at why the cloud is best for this strategy. Better uptime Backing up to an internal drive or an external hard drive won’t completely secure data. If someone steals your device, you instantly lose the backup it […]

Don’t skip security audits for your business

One step in the network security cycle you should never skip is security audit — doing so puts your business at risk of cyberattacks and data loss. Read on to understand how security audits can make or break your system integrity. Auditing and the security strategy Audits are necessary to maintain system integrity and uphold […]

Should you replace your Mac?

If you’ve owned a Mac for quite some time, it’s probable that you’ve gone through a few issues while using it. And after a while, using it can be more of a hassle than a convenience. If you’re already experiencing some major issues, it may be time to replace your Mac. Here are some telltale […]

Past Event—Online Training—Nonprofit New York Workshop—Logging in on January 23rd

Logging in used to be simple. You came to the office, turned on your computer, logged in and got to work. There was only one way to do it and one place to do it from. But today, most of the services you use are in the cloud. You log in to your computer, but then you have to log in to three or four or ten more things just to do your work. And you’re supposed to keep track of all these different passwords and systems? Not only that, but you might log in on your work computer at your office one day and from your personal laptop at a cafe in Montreal tomorrow. How in the world are you and your organization supposed to keep track of all this logging in and make it easy and secure?

What Wi-Fi router features to look for

Wireless routers are essential for operating a modern business. Routers allow one network connection to essentially be split into many and then shared by different users and devices — usually over a Wi-Fi connection. If you are looking for a new Wi-Fi router for your office, there are some important features you should be aware […]

Predictive forecasting in Office 365’s Power BI

People have always been intrigued by what the future holds, especially when it comes to business. If you’re an Office 365 subscriber, you now have Power BI’s predictive forecasting at your disposal.

BI is for small businesses too

Business Intelligence (BI) has conventionally been limited to big business; only they can afford pricey experts with specialist knowledge who can leverage BI’s value. But the rise of self-service BI tools has leveled the playing field, allowing small- and medium-sized businesses (SMBs) to get in on the game too. And with SMBs now producing far […]

Windows 10’s November 2019 Update: What you need to know

Microsoft rolled out the latest Windows 10 update on November 12. And though it’s a relatively small update, it comes with new features that will improve your Windows 10 computer’s functionality and performance. Also known as Windows 10 version 1909 or 19H2, the Windows 10 November 2019 Update can be installed by heading to Settings […]

BYOD tips to improve security

Lax bring your own device (BYOD) policies are a growing concern for businesses. If not managed properly, these can pose security risks to your organization. How can you mitigate the risks associated with the BYOD trend? Whether your employees are using smartphones, tablets, or laptops, you need a BYOD security policy. Additionally, you need to […]

Webinar—Defend & Protect—Your Path to Compliance with New Cybersecurity Laws—February 27thJoin Us