November 2020

Cyber-Security is one of the most challenging aspects of running a small to medium sized business. With limited technical proficiency and resources small business owners often reach out to Managed IT Service companies to secure their systems and lessen risk. Still, not all IT Services companies have the expertise to provide expert cyber-security guidance to their customers. Small business owners should seek out IT providers that stay in...

Read More

At Radiant Technology Solutions, our priority is to help you streamline your IT processes so your company can run smoothly, grow quickly, and do business safely. That is why we constantly evaluate our client’s operational processes to determine where we can help make things easier. If your business is thinking of making the change to QuickBooks Online or vice versa? Here is a quick list of pros and cons...

Read More
coronavirus

Although the number of COVID-19 infections decreasing in some areas and people beginning to return to a relative state of normalcy, experts are warning of a likely inevitable second wave that could likely come in the 2020-2021 holiday season.   In the event of a second wave, it’s important to prepare your network now and ensure that you can withstand another potential lockdown as the season approaches....

Read More
zoom hacked zoom bomb

Employees around the world are working remotely full-time during the COVID-19 pandemic. Many are turning to applications like Zoom to meet online. Unfortunately, cybercriminals see this trend as a new opportunity to attack people for profit. Therefore, you must protect these platforms so your company is safe from costly and embarrassing security breaches.  Common video conference attacks:  Video Bombing: This involves uninvited guests disrupting your meetings. They may show inappropriate images, shout...

Read More

Imagine your employee is having problems with a 5-year-old computer. Whenever the employee starts their applications, they wait minutes for the program to load. Also, the computer shuts down or crashes while they are working on critical projects. The employee is frustrated with the computer and is asking for a new device. When buying a computer for your business, you must consider the below specs: Portability: If...

Read More

Phishing emails are an attempt to gain access to sensitive or personal information such as usernames, passwords, financial or personal information by criminals who have disguised themselves as a legitimate person or business. The intent is to use this information for illegal activities. Phishing has been around for nearly 20 years, first used as a phrase sometime around 1996 by hackers stealing America Online information....

Read More