click to reveal

Sign Up for CMIT Quicktips!



Welcome to QuickTips, the blog that helps small business owners stay up to date on the latest technology trends, security find useful information, advice, insights, resources and inspiration for running and growing their businesses.

How to Maximize Time Management and Boost Productivity After a Long Holiday Weekend
Returning to work after a long holiday is never easy. On top of rediscovering day-to-day motivation in the wake of a relaxing weekend filled with Thanksgiving leftovers, chances are you had a few hundred (or... more
5 Strategies for Using Technology to Bring Family and Friends Together this Thanksgiving
More than any other American holiday, Thanksgiving is about spending time with family and friends — with the extra bonus of all that delicious food. Turkey, stuffing, mashed potatoes, cranberry sauce, pumpkin pie… All of... more
CryptoWall Is Back — Here’s How to Keep Your Systems Safe and Your Data Secure
It’s been more than a year since the CryptoWall virus first started wreaking havoc in cyberspace, and two years since state, federal, and international authorities broke up the related CryptoLocker ring. But in recent weeks,... more
5 Smart Disaster Prep Tips To Consider With Winter On The Horizon
Yes, it might be a little early to start talking about cold weather and winter storms. But with the first widespread snowfall of the season affecting the Western United States last week, and a record-breaking... more
What the New Cybersecurity Bill Does (And Doesn’t Do) — Plus 4 Ways to Keep Your Systems Safe
Last week, the United States Senate passed the Cybersecurity Information Sharing Act by an unusually bipartisan vote of 74 to 21. But tech experts have already said that CISA may be mostly ineffectual when it... more
Want to Deduct $25,000 from Your Taxes and Invest in the Future of Your Business? Here’s How
Like everything in the tax world, US Internal Revenue Code’s Section 179, which allows companies to deduct up to $25,000 worth of qualifying equipment purchased in 2015, contains multiple shades of black, white, and gray.... more
Critical Questions to Consider in Light of Ongoing Security Compromises
Although the pace of data breach stories seems to have slowed in 2015 compared to past years, the scary part is that could be because such incidences of cyber attacks have become alarmingly common. Last... more
Historic Floods and Near-Miss from Hurricane Joaquin Highlight the Need for Disaster Preparedness
Last week, historic rainfall devastated South Carolina, inflicting more than $1 billion in flood damage, breaching nearly 20 dams, and causing the deaths of 17 residents. After Hurricane Joaquin looked like it could land a... more
5 Reasons Why File Sync and Share Is Critical for Business Success
In today’s digital world, file sync and share options are everywhere — even if we don’t always know what they are. Consider how essential it is for you and your employees to have the ability... more
Why Protecting Your Business From Cyber Crime Is More Important Than You Think
We’ve all heard the horror stories about cyberattacks: CryptoLocker virus, spearfishing, data breaches. What do all of these nasty things have in common? They can cost businesses big money if not properly guarded against. Here’s... more
10 Ways to Become a Spreadsheet Pro by Making Microsoft Excel Work Smarter and Faster
For years, Microsoft Excel has represented the gold standard when it comes to spreadsheet software. Although firm market share figures specific to Excel use are hard to come by, Microsoft Office, the productivity suite in... more
How to Avoid 5 Major Security Risks that Could Affect Your Business
In today’s modern workplace, technology is the number one driver of innovation and efficiency. But without reliable IT support, technology can also represent the number one threat to your business’ security.  That’s why we’ve identified... more
5 Must-Ask Questions When You’ve Outgrown Your Current IT Provider
Picture this: you’ve been stuck in IT limbo for years. Relying on friends to get new technology up and running. Tasking a key employee with maintaining systems (in addition to fulfilling their other responsibilities). Perhaps... more
Jumpstart Your Daily Routine By Organizing Your Desktop
With the back to school frenzy behind us and a change of seasons on the horizon, there’s no better time to give your work life a reboot. And believe it or not, technology can play... more
Malware Exploits Increase Need for Layered Network Security
A new wrinkle in the ongoing battle against malware exploits emerged last month, when security reports from Kaspersky Lab and Symantec revealed a hacking group responsible for targeted attacks on Twitter, Facebook, Apple, and Microsoft... more