Blog

Office 365: What plan is the right one?

March 8th, 2017

From Word to SharePoint, Office 365 has a lot offer. But each business requires different features from Office 365. Some may prioritize business analytics, while others may be content with no more than the productivity suite and Outlook. If you’re planning to deploy Office 365, first consider your business needs, then use the information below to find out which license is right for you.

Fileless malware: who are the targets?

March 3rd, 2017

There have been some truly horrifying cyber-security headlines popping up over the last month. If you’ve been reading about “fileless” malware attacking banks and other big-name institutions around the world, we’re here to set the record straight: Your business isn’t in direct danger.

Real-world audits: disaster recovery plans

February 28th, 2017

We can write about disaster recovery planning (DRP) until our fingers bleed, but if we never discuss real-world scenarios it’s all just fumbling in the dark. Examining these successes and failures is the best way to improve your business continuity solutions, and the recent audit of a state government office is rich with valuable takeaways.

Attacks on WordPress websites

February 27th, 2017

“Easy-to-use,” “SEO-friendly,” “open-source,” and “customizable.” These are some of the words that best describe WordPress, currently the most popular Content Management Solutions (CMS) platform. With thousands of websites affected in a recently launched series of attacks, “easy to target,” “hackers’ favorite,” and “prone to attacks” could soon be used to define the experience of running a WordPress website.

Social media platforms that suit your SMB

February 24th, 2017

Social media marketing is tricky, to say the least. It’s difficult to allocate the resources that create the desired effect, especially when so many platforms are available. Facebook might be the biggest name in the industry, but that doesn’t mean it will suit your organization.

Popular printer brands are prone to attacks

February 23rd, 2017

This is not a question often asked by anyone who has ever used a printer. Given the increasing sophistication of hackers’ capabilities, the discovery that cyber thievery can, in fact, be performed through some popular printer brands hardly comes as a surprise.

K12TG @ BrainStorm 2017 Wisonsin Dells

February 20th, 2017

Stop at booth 201 in the Kalahari Resort & Convention Center and meet the K12TG Team . Sales and Technical team member will be available at our booth during show hours. (27 Feb 17 3:30pm to 7:30pm)

Once again the K-12 Technology Group will be exhibiting at the BrainStorm Technology Conference in Wisconsin Dells (Booth 201). K12TG team members expert in Cloud Hosted Solutions both Voice and Data, Network Security, Education Software Licensing, and Wireless Networking will be available.

Why sign up for the Office Insider program?

February 17th, 2017

To deliver unparalleled service, Microsoft tests products and features months before they’re released to the public. One of the ways they do this is with the Office Insider program, a voluntary Office 365 subscription that gives participants a sneak peek into future Microsoft developments.

5 great ways to prevent cyber-attacks

February 15th, 2017

There has been a movement among technology providers to promise “proactive” cyber security consulting. Small- and medium-sized businesses love the idea of preventing cyber-attacks and data breaches before they happen, and service providers would much rather brainstorm safeguards than troubleshoot time-sensitive downtime events.

Office 365 and G Suite

February 10th, 2017

Google and Microsoft have both set impressive milestones in the tech industry. These industry giants continually roll out innovative solutions that simplify the lives of users around the world, especially with G Suite and Office 365. This raises a question: Which is a better option for your business?

Cost and commitment
G Suite offers two pricing plans: $5 and $10 per user per month.