Blog

Travelling? Here’s How You Can Protect Your Business Abroad

Travelling? Here’s How You Can Protect Your Business Abroad

During the winter, many business owners and higher-ups travel for a variety of reasons. Whether to make future-facing deals, take a breather on a warm beach, or for a combination of both, your data is still at risk when you travel – more so when in another country. Many business operators feel that it is more difficult to remain protected while abroad, and depending on where you go, that is correct. However, there are a few key ways you can protect your confidential business when you travel. Here are our suggestions.

Back Up Sensitive Data Before Leaving

Regardless of whether your business automatically backs up server files or if you keep all of your sensitive data on one convenient mobile device such as a laptop, it is crucial to back up everything before you depart for your trip. Be sure to either upload to the server or store your data in an offline external hard drive in the event that any devices you have with you while away are compromised.

Revolution Networks Welcomes new vCIO, Tony Silva

Revolution Networks Welcomes New vCIO, Tony Silva

Revolution Networks Welcomes new vCIO, Tony SilvaRevolution Networks is proud and delighted to welcome yet another experienced IT professional to our team. Tony Silva will be joining us as our new vCIO (Virtual Chief Information Officer), bringing us over 20 years of experience in IT and IT Management. He has spent many years designing and implementing support solutions for all sorts of clients – from mom and pop shops to multi-million-dollar military contracts. Tony spent several years in Portugal to pursue his IT education, and at that time he managed the IT services for an electrical company before moving on to other projects. One of these was the implementation of the Citizens Store, a one-stop shop that was the Portuguese equivalent of service Canada, where people could renew identification such as passports and health cards.

Tony then moved to Canada, where he spent his time supporting servers for HP/Compaq before becoming a consultant and implementing the networking infrastructure at CIDA. Tony has been the IT manager for Mattamy Homes,

4 Ways for Your Business to Be More Productive on Windows 10

4 Ways for Your Business to Be More Productive on Windows 10

At Revolution Networks, we understand all too well the need to make your business operate as efficiently as possible. It only makes sense that this extends to your computer systems and, specifically, their operating systems. Windows 10 is one of the most streamlined and reliable ones out there, the prime and only candidate for most businesses aiming to get things done as simply and quickly as possible. However, there are some tricks you can use to multitask and be even more productive on Windows 10, and here are a few key ones to get you started.

 

Snap Assist

To avoid having to switch between open windows, losing precious time, try making the very most of your screen real estate with Windows 10’s Snap Assist feature. To do this, simply drag a window to one of your screen’s side edges and it will auto-snap to your desktop. Your other recent windows will then be displayed as thumbnails in the other half of the display,

5 Ways to Speed Up Your Computer System

5 Ways to Speed Up Your Computer System

Regardless whether you operate a small or large business, having a computer system that is reliable, efficient, and fast is essential in order to keep pace in the modern always-online world we live and work in. There are many ways you can speed up your system that are cost-effective, proven to work, and utilized by many businesses and individuals. Here are five ways you can get your system to perform better than ever before.

 

Uninstall Unused Programs

If you have applications on your computer that have been sitting there unused for months, chances are you won’t need to use them again for some time. Many users don’t consider this, but even if a program isn’t in use, it still secretly functions in order to receive online updates, scan files and perform other background tasks. This means that if you have a multitude of programs installed that are going unused, they’re taking a collectively large bite out of your system’s performance. Uninstall what you don’t use,

Eddy Abounehme Honoured Among Ottawa’s 2017 Forty Under 40

Eddy Abounehme Honoured Among Ottawa’s 2017 Forty Under 40

We are excited to announce that Revolution Networks’ President Eddy Abounehme has been named one of Ottawa’s Forty Under 40 recipients. The honour, presented in partnership by the Ottawa Chamber of Commerce and Ottawa Business Journal, recognizes the contributions and accomplishments of our capital city’s top business leaders aged 40 and under.

Selected from a competitive pool of over 200 stellar nominees, Eddy Abouneheme was recognized for his business leadership and success as President of RevNet and CEO of seoplus+, which was also recently ranked as one of the fastest growing companies in Ottawa in 2017.

The judging panel was composed of Ottawa’s top names and most accomplished leaders in business, law, media, and publications. Eddy was honoured based on their evaluation of his business accomplishments, professional expertise, and communtiy involvement right here in the city of Ottawa.

Business Leadership and Success

Eddy was recognized for his succsesful leadership with the local IT service provider, RevNet. Under Eddy’s guidance,

4 Signs your Computer has a Viral Infection

4 Signs your Computer has a Viral Infection

In today’s always-online society, viruses are commonplace. Everything from Twitter to CBC News comment sections can be hiding a nasty surprise in plain sight, and countless people fall victim to computer infections every year. When an unsuspecting employee downloads a virus, the consequences for the network can be devastating. While it’s impossible to guarantee absolute immunity to all the risks out there, here are a few signs that your system has an unwelcome visitor.

Unexpected toolbar additions and strange browser tweaks.

Strange new additions to your browser such as plugins, toolbar additions, and tweaks to your settings that you didn’t make are dead giveaways. Also, be wary of browser home page changes and odd pop-up messages that make little to no sense to you. Avoid websites filled to the brim with copy-pasted clickbait and dozens of ads. Public file-sharing sites are a huge no-no as well.

You’re using an anti-antiviral system.

It goes without saying that viruses are engineered to bypass antiviral programs such as Norton 360 as best as possible,

4 Ways to Maximize Office 365 Effectiveness

4 Ways to Maximize Office 365 Effectiveness

Microsoft Office 365 is a digital Swiss army knife for SMBs and large enterprises alike. Powerful and intuitive, it provides users with a host of applications that aim to streamline their tasks and produce high-quality work. However, there’s more to O365 than you might think. Here are five ways you can maximize the effectiveness of this suite of applications and get the most out of it.

Help everyone get on the same page. Literally.

Collaboration is key in many workplaces, and that’s going to include a lot of revisiting content and making changes. So instead of sending updated attachments via email to one another and waiting for replies, why not simplify those little edits and tweaks? O365 allows for real-time mobile and desktop-based co-authoring of documents through Microsoft Word, PowerPoint, or Excel web apps. You can now even Skype with co-workers while collaborating, without losing any changes.

Bypass permission-based nightmares.

Edit permissions can be an absolute pain. If you use a business edition of O365,

How Managed Services Can Improve Office Efficiency

Small business owners face many challenges when it comes to efficiency and keeping expenses manageable due to their limited resources. Since it is usually impossible to hire enough professionals to manage each segment of a small business due to the employer contributions on payroll as well as the salaries, managed services are becoming a popular means of having access to the necessary knowledge and experience required at manageable contract rates.

Managed IT services are an area of particular importance to small business owners. Although information technology resources are the mainstay of most businesses these days, hiring a full-time professional that specializes in IT is just not feasible for most small business owners. Managed IT services offer fast and reliable help for a pre-set monthly fee.

Aside from maintaining computer and phone systems that are fast and reliable, managed services for IT also enables you and your employees the ability to access data remotely which is crucial when you and your employees are on the move.

File Encryption: How Can I Protect My Data?

When it comes to systems security, there are many layers of protection that should be incorporated to protect your company’s data. One of these protective measures is to employ file encryption. File encryption is used to stop valuable information from being accessed by anyone without the correct encryption certificate and password. It is often used for financial data, sensitive emailings and personal information.

File encryption at its most base level is a “secret code” generated by the program you use to turn your data into an unreadable file. Encryption tools use complex algorithms to create codes that are near impossible to decipher without the appropriate key or password used to protect the data. One tip from newport website design — While encryption is an important step to protecting your data from both users of your computer and while sending and receiving files in the cloud, on its own it is not 100 percent guaranteed not to fail. Your IT support can review your systems security protocols with you to ensure you employ all methods to protect your vital information.

How Firewalls Can Help Protect the Perimeter

A critical portion of the systems security for your business is a firewall. If you have more than one computer or wireless devices hooked up to a network, then usually two types of firewall are employed. One form is a software firewall which should be activated on all computers and the other form is a hardware firewall that operates within your router. The complexity of firewall protection you require is based on the needs of your business.

In order to understand the purpose of a firewall, think of it as a fence around your computer or network that protects the perimeter and helps stop the invasion of hackers into your system. A hardware firewall would be like a large fence between the Internet and your complete network while a software firewall would be like a fence around each individual computer station. The firewalls use different protocol types to filter out malicious data from being allowed to enter while allowing safe data to come through. Depending on the protocol used by the firewalls in your business,