,

Top 3 WordPress Plugins You Didn’t Even Know You Were Missing

wordpress plugins for cms website development

WordPress is one of the most popular platforms for website design and management on the market today. With powerful and user-friendly templates, it is a great place to look at for building your website. We code custom sites and help customer sites on WordPress daily. With that in mind, there are plugins that add functionality to sites. This month we would like to introduce you to the top three WordPress plugins we suggest.

Read more
,

Holy Big Brother! Google Location History: An All Knowing Function You Probably Didn’t Know You’ve Enabled

Google Location History - IT Networks - Big Brother is Watching

Internet privacy is a touchy subject these days. With more and more connected devices in our homes and businesses, it is important that you know what settings allow in terms of data collection and your privacy. Google Location History is an interesting application that tracks your movement throughout the day. It is benign enough but you wouldn’t believe how closely this app can track your movements. Read on to get a look at how it works and also some instructions on how to enable it if you choose.

Read more
,

5 Critical Components Any Professional Disaster Recovery Plan Must Have

Disaster Recovery Plan IT

If you are in business, you have most likely considered what you might do if a disaster hit. Disaster happens. Theft, hardware failure, ransomware and other viruses, even natural disasters . . . Disaster recovery and business continuity must be things you have planned for the safety of your business, your employees and your reputation. When considering a proper and professional disaster recovery plan, many variables need consideration. Read on for our 5 Critical Components Any Professional Disaster Recovery Plan Must Have.

Read more
,

3 Critical Steps You MUST Take To Avoid WannaCry And Ransomware Like It

wannacry ransomware prevention

How confident are you in your cyber security protocols? If you got hit by ransomware today, would you know how to get yourself back up and running without paying the cyber criminals a dime? Do you have an IT partner who can visualize your server real time so you don’t lose time and money during a disaster? These are all questions you should have answers to and part of a larger conversation about proper cyber security preventions. Read on to learn more about one of the most recent cyber security attacks – WannaCry – and what you need to do to protect your business.

Read more
,

Why Good Camera Systems Need Great IT Pros

security cameras design, intstallation and security integration

You’ve heard many horror stories about viruses and ransomware by now. But, have you heard about what malware and hackers can do to your camera system if you aren’t careful? Off brand security systems may appear attractive with their off brand price points, but can you afford your cameras leaking critical and confidential footage/data? We didn’t think so, read on for some information on why a good camera system needs a great IT pro.

Read more
,

5 Signs Your PBX Phone System Is On Its Last Leg

pbx phone system failure is the worst

“Time Is Money”

I’m sure you heard that one before. The fact is, downtime and productivity loss from pbx phone system failure can cost your business thousands of dollars in the blink of an eye. Today’s consumer has hundreds of options at their fingertips (literally); all one search engine away.

Don’t lose business all because your legacy phone system finally took a dive. You also don’t want to force your own hand when it comes to choosing a new pbx phone system due to lack of preparation.

That being said, check out these 5 signs your pbx phone system is on its last leg.

Read more
,

Don’t Use Public WiFi Without Reading These Data Security Quick Tips

public wifi is dangerous for data security

We’ve all done it. Signed into the public WiFi at a restaurant or coffee shop. Being connected has become a commodity these days and hackers are just waiting to take advantage of you and your data. This month we dive into a few quick tips to secure your mobile devices and laptops from outside intruders when working on the road or connecting to a free hotspot.

Read more
,

Phone Systems Decoded – 8 Commonly Used Telecom Acronyms & What They Actually Mean

ats telecom acronyms for phone systems

If you’ve ever had the pleasure of speaking with a telecom expert or engineer, chances are they’ve thrown a number of Telecom Acronyms at you . . . PBX, VoIP, PRI . . . What does any of that even mean? Look no further! Behold, 8 commonly used acronyms in the telecom industry and what they mean . . . without all the geek speak!

Read more
,

What To Consider When Buying That Security Camera System (Hint, It Isn’t Price)

ats security camera system cctv integrated security

You’ve made the decision and are now looking at getting a new security camera system. While we understand the urge to buy that economical (cheap) system from Amazon or Costco, you really get what you pay for when it comes to your cameras. The differences between commercial and professional grade systems are stunningly apparent when it comes to picture quality, reliability and longevity. Read on and take a look for yourself!

Read more
,

Stop These 3 Hazardous File Sharing Habits Yesterday!

file sharing tips with ATS IT Managed Services

If you are in business, you have file sharing needs as well as habits. This activity comes with its own risks though and it is important to protect yourself when it comes to sharing files both internally and externally in business. Read on for 3 hazardous file sharing habits you have to stop yesterday!

Read more