blogheader-rev

Technology Unwrapped

The most important technology concepts, strategies and actions uncovered for your business.

How a Cloud-Based Phone System Improves SMB Customer Service

Bob Tingwald
Quality customer service is crucial to the longevity of your small or medium-sized business. Providing excellent service retains customers and builds value, and when customers are satisfied, they bring in more customers. One important component of your business’s customer service strategy you might not have considered is the quality of your business phone system. Is yours making the cut? If not, a cloud-based business phone system will make a positive impact on your organization. With the range ...
Read More
Topics: Cloud, Phone Systems

Basic IT Security Policy Recommendations

Wynn Obermeyer
In this golden age of technology, companies can run a completely virtual business without ever opening a physical store. However, online businesses come with vulnerabilities and risks that can threaten your company’s security and livelihood. All businesses, small and large, are at risk for security breaches every day. Threats like ransomware and phishing can lead to detrimental damages to a company.  In fact, within six months of a cyber attack, 60 percent of small and midsize businesses (SMBs) ...
Read More
Topics: Security Threats, Network Security, Technology Planning

Is Your Omaha or Lincoln Company in Growth Mode? 5 Tips for Scaling IT

Chris Vilim
Omaha is home to over 45,000 businesses, and it’s not surprising, considering we enjoy a winning combination of moderate taxes, low cost of living and high quality of life. In fact, more than 20 Omaha businesses are among the 5,000 fastest growing businesses in the nation. Meanwhile, with Lincoln making “top 10 cities” lists for Business Climate and Best Cities for Young Professionals, and even #1 Happiest Cities, we are certainly primed for more economic growth in Nebraska. Your technology ...
Read More
Topics: Owners & Managers, Technology Planning, IT Support

Top 5 Cyber Security Threats for Real Estate Companies

Kaitlin Schneider
Having recently purchased a house with my fiancé, I have witnessed firsthand how complex and involved the real estate process can get, as well as how many potential cyber security risks arise during a real estate transaction. Whether your real estate company sells residential or commercial properties, security of your contacts and data is critical. 
Read More
Topics: Security Threats, Network Security

Support for Company IT Managers: Don’t Be Left Behind

Kaitlin Schneider
On any given day, internal IT managers have a lot on their plate. You’re at the heart of it all: updating software, supporting end users, streamlining operations and keeping it all secure.  With so much on your to-do list, it’s easy for internal IT managers to get sidetracked by seemingly minor tasks, leaving  you scrambling for time to complete larger objectives that also demand your attention. 
Read More
Topics: Owners & Managers, Outsourced IT

What You Need to Know About the Dark Web, Deep Web, and Surface Web

Kaitlin Schneider
Every organization conducts business online, but you may not realize that the Web is much larger and more complex than most of us are aware of. In fact, the portion of the web that you use for day-to-day activity is just the tip of the iceberg.   There’s also the deep web, and the malevolent-sounding dark web.   It’s important to understand the differences among the surface web, the deep web and the dark web, as well as what you can do to protect your information from ending up for sale on the ...
Read More
Topics: Security Threats, Network Security

AI-Designed Deepfakes Present New Terrain for Cyber Threat Landscape

Kaitlin Schneider
Since they started showing up online in 2017, deepfakes have been sprouting up with more frequency.  While many of the examples that you see on YouTube and TikTok are uncanny and entertaining manipulations of face-swapped celebrities dubbed with each other’s voices, the eerie technology behind the phenomenon has the potential for serious cyber security risks for SMBs.  In one 2019 instance, an energy company in the United Kingdom was scammed out of $243,000, an amount one employee thought he ...
Read More
Topics: Security Threats, Trends

Identifying TrickBot Hinges on Your Ability to Recognize Phishing Emails

Angela Wight
The first step towards protecting yourself and your business is awareness. What types of scams are circulating? What are hackers pushing out and seeing results on? What tricks should I be watching out for?  One particularly "tricky" cyber threat, TrickBot, has evolved and taken different forms over the years. It’s even been crippled by Microsoft, who shut down its servers in October 2020.  However, TrickBot is back, and it’s something you need to be able to recognize. 
Read More
Topics: Security Threats

How has Microsoft Teams Transformed the Unified Communications Landscape?

Jason Hahn
Since the outbreak of COVID-19, the service, support and new deployment of IT and voice systems has changed quite a bit.   Bridging the distance between the deployment group and the customer has never been as complicated as it was the past year. There have been many bridges to build, cross and even invent. Not to mention pitfalls to navigate. 
Read More
Topics: Microsoft Products, Trends

Pros and Cons of Microsoft Teams for Project Management

Chris Vilim
Although project management may not be the first thing that comes to mind when you think of Microsoft Teams, the platform offers a lot of capabilities that can improve the project management process. These range from video conferencing to Office 365 integration to scheduling and hosting meetings.  However, while using Microsoft Teams for project management can offer many benefits, there are some limitations as well. As such, it’s important to know Microsoft Teams’ best practices for project ...
Read More
Topics: Microsoft Products, The Workplace