A few of our craftiest thoughts

We've got an easy-on-the-eyes hub for the best tech tips, tricks, and insights for our top-performing friends.

Why Proactive System Monitoring Is Critical

Few things are as potentially destructive to small and mid-sized businesses as downtime.The loss of revenue, the reputation damage, the loss of customers...

Read More

Navigating Cyber Security Insurance

According to the Office of the Director of National Intelligence, 2023 was a watershed year for ransomware globally, with the number of attacks rising by...

Read More

Why You Need Comprehensive IT Management

It’s a simple fact that, in today’s business, your organization is only as strong as its IT. 

Read More

What Are Managed IT Services, Really?

These days, every business needs some level of IT support. Even a custom cabinet maker toiling away in their garage has to have at least an email address,...

Read More

Basic IT Budgeting for Small to Mid-Sized Businesses

If you own a small to mid-sized business, you need an IT budget.

Read More

Comparing IT Support Solutions for Small to Mid-Sized Businesses

Not all IT support is created equal.For small to mid-sized businesses in particular, choosing the right level of support can be a head-scratcher. Going...

Read More

The Benefits of an Audit-First Approach

Let’s talk about reaction. Not in Newton’s Third Law sense, but in technology. Specifically, being reactive in IT decision-making.Too often companies find...

Read More

Cyber Security 101 for Small and Mid-Sized Businesses

If you own a small to mid-sized business, you’re under constant threat of a cyber attack. That’s not hyperbole. Every day, an estimated 2,200 hacks and...

Read More

Cyber Security Training: Knowing Is Half the Battle

In cyber security, the one constant is change.Bad actors are always tinkering and experimenting with new tactics to con individuals out of their...

Read More

Behind the Wall

In 2023, according to a report from Cybersecurity Ventures, there was a cyberattack every 39 seconds. That adds up to roughly 2,200 attacks each and every...

Read More

5 Things Your Managed IT Services Provider Needs to Do Before You Hire Them

Here’s a dirty little secret about most IT managed services providers (MSPs): The more complicated they can make technology seem, the more solutions they...

Read More

The Email Line of Defense

Email has long been a favorite target of cyber criminals, with “phishing” being the most common form of attack. In fact, out of the estimated 347 billion...

Read More

10 Ways to Protect Your Business From a Cyber Attack

One of the most common errors we see small to mid-sized businesses make is a lack of focus on the basics of IT security.We get it. Security is a pain in...

Read More

Get to Know the Dark Web

The internet you interact with on a daily basis is not the entire internet. Websites you routinely visit, social media platforms you frequent, streaming...

Read More

Gone Phishing

Each day, some 347 billion emails are sent around the world. Every one of these messages has the potential to cause damage to a person or business.That’s...

Read More

The Power of Data Encryption

The numbers paint an ugly picture. According to a study, 43% of today’s cyber attacks are aimed at small and medium-sized businesses. And yet, just 14% of...

Read More

Endpoints: The First Line of Defense

The cyber security landscape is constantly changing. Every step forward in technology creates new opportunities for bad actors to poke and prod and...

Read More

Upgrading Your IT Has Never Been More Critical to Success

IT has changed dramatically in the last two decades, to say the least. We’ve seen more technological evolution in the last 18 months than we have in the...

Read More

Minimize Headaches and Maximize Productivity With Remote IT Support

Every business relies on its IT systems running smoothly to keep employees productive and organizational goals on track. But every business has its own...

Read More

Great Onsite IT Support Makes All the Difference

When it comes to finding the right managed IT service provider, the onsite support they provide is a big difference maker. You want a provider that aces...

Read More

How IT Procurement Impacts Your Business for Years

Whether you’re at a business, government agency, or nonprofit organization, the process of acquiring the right IT assets will impact your business'...

Read More

Strategic IT Planning Needs To Be at the Core of Every Business

If you’re a business leader, you have a vision and strategy. It’s the core of everything you do. It was there in the beginning when you explored options,...

Read More

Does Your Business Need an IT Security Audit?

From financial records to client information to valuable IP, your IT systems house highly confidential information that are crucial to your business...

Read More

Drive Business Results With Digital Transformation Consulting

Organizational IT can be complex and chaotic. As a business grows, the IT burden grows with it. New devices, systems, and software get added to the fray...

Read More

Tools for Working From Home Efficiently

We're in the aftermath of the biggest social and possibly economic challenge we've faced in modern times. For those of us who are older millennials or Gen...

Read More

Benefits of Using DropBox as a Architecture Project Management Software For Architects & Office Firms

Business is good. Your client list is growing. Your team is thriving. You’re ready for the next step. It’s time to expand your architecture firm and open...
Read More

Dropbox Business Folder and File Structure For Your Architecture Firm

With hundreds of architectural projects, multiple design teams, and an active business, maintaining control of your firm’s file structure is tough....
Read More

Cyber Security Basics For Architecture Firms

One of the most common issues we see with potential clients is a lack of focus on IT security basics. We get it. Security is a pain in the butt. But...

Read More

Do You Know These 6 Latest Types of Cyber Attacks and Treats?

Security is becoming a bigger and bigger issue for small to mid-sized businesses in the Seattle area. While you may think your firm is too small to be a...

Read More

I Got Hacked: 6 Things You Should Do Immediately if You Think You Got a Hacked Account

The possibility of getting hacked is scary stuff. It’s even scarier when your livelihood depends on it. As the owner or manager of a small to mid-sized...
Read More

Transforming Into a Virtual Company and How We Survived “Snowpocalypse”

If you’re reading this, then we all survived. Despite the dire predictions, Seattle did not implode, and the Columbia Tower did not come crashing down....

Read More

What Exactly Are Managed IT Services?

If you own a small to mid-sized business, chances are you’ve heard the words managed IT services. You’ve probably been contacted at least once by a...

Read More

Security and IT Risk

Technology is amazing! There are eye-tracking keyboards for folks with disabilities, robots that can parkour, and 3D printed houses! Unfortunately, the...

Read More

Hook, Line and Sinker: All About Email Phishing

If you have an email address, it's pretty likely you've received a phishing email. The average user receives 16 malicious emails per month, so you've...

Read More

Shadow IT is a thing, and here's what you can do about it

You might have heard your conspiracy theorist uncle rant about "shadow governments" and "rogue ops" last Thanksgiving. While you might have...
Read More

Why Hiring Internally Rarely Solves Your IT Issues

It seems like we hear this story with a different spin on it almost every week: a company that’s grown and become more successful starts to outgrow their...

Read More