HUB TechMinutes

Business technology news, tips and events.

HUB TechMinutes

Better business through better information.

Is Your Mobile Device Safe from Malware?

Mobile devices are becoming more important in business use, which means that their security needs to be a serious consideration. While for most of its history, the telephone’s function was limited to sending sound, the new functions that these new mobile devices have give them more utility, but also make them more of a target for threats, including viruses.

Continue reading
  0 Comments
0 Comments

Could You Identify a Social Engineering Attack?

Social engineering can allow a cybercriminal to access networks without being hampered by the security solutions that a business has in place. Through the manipulation of the human element of a company, its critical resources are exposed. In order to protect your business against the threat of a social engineer, there has to be an overall awareness in your company culture.

Continue reading
  0 Comments
0 Comments

Tip of the Week: Comparing the Pros and Cons of Desktops and Laptops

Should your next computer purchase be a desktop or a laptop? Let’s talk about the less obvious differences between the two so you can make the right decision when buying computers for your staff.

Continue reading
  0 Comments
0 Comments

Remote Monitoring and Maintenance Keeps Your Business In Business

Depending on your business’ setup, you might have an in-house IT department that manages any of your technological assets, or you might have an outsourced vendor that you prefer to work with. Regardless, you know that as a business owner, you don’t have time to worry about managing IT--especially if you’re a small organization that has a limited budget and a limited workforce to do the work.

Continue reading
  0 Comments
0 Comments

How the Business Software Alliance Will Come After Your Business

As a business owner, you should know that you shouldn’t abuse the software licenses that your business relies on to function, or use pirated software to fulfill that need. While there are many people do such things, the response from software companies in an attempt to stop such activities has created a system that can award those who exploit it.

Continue reading
  0 Comments
0 Comments

Get Updates On Our New Blog Posts!

Book your free introductory consultation now.

Let's Talk

Happy Clients

Don't Miss Our Next Newsletter!

Subscribe to our free monthly newsletter! It's packed with valuable information, useful tips, and important security alerts.
* indicates required
Your email address is secure with us - we never share our subscriber information.

HUB Tech Minutes

11 December 2019
Mobile devices haven’t been known to have a lot of faults when it comes to security, but when a really bad malware attack does happen, the best solution may be to wipe the device and start over from a factory reset. Currently, there is a malware targ...
10 December 2019
While the major holiday shopping days have passed us by, many people are still looking for that perfect gift often using the Internet to find it. While online shopping is certainly more convenient, it can also be dangerous. To help keep you safe this...
05 December 2019
In days, Microsoft is pulling the plug on both Windows 7 and Windows Server 2008 R2. If your business still has to move away from this software, you need to act today. The consequences for not moving away from these titles can be absolutely dire for ...