11 Dec 2019

The guide to choosing the best Android tablet to gift


Gadgets are one of the most popular choices this season. Surely no one will be disappointed if they receive an Android tablet, but it is still ideal if they get one that best fits their lifestyle. If you’re considering giving an Android tablet as a present, you’ll quickly find the selection overwhelming. Here are some tips that can help you zero in on the right one.

What’s your budget?

Giving gifts shouldn’t burn a hole in your pocket. The great thing about Android is that there are tablets available for a wide budget range, from the ridiculously affordable yet highly praised Amazon Fire HD 10 (from $149.99 on Amazon.com) to the top-of-the-line Samsung Galaxy Tab S6 (from $795.99).

What do reviews say about the product?

Consider expert reviews before buying an Android tablet. There are a ton of websites dedicated to reviewing tablets and other mobile devices. Take for example the well-known Engadget, or Trusted Reviews. Sites like these generally give a good overview […]

The guide to choosing the best Android tablet to gift2019-12-11T08:00:20-07:00
10 Dec 2019

Small and Mid-Size Businesses Need to Focus on Cybersecurity


What are you doing to protect your business and secure sensitive customer data? Many #SMBs believe that they're not at risk for a cyberattack, which makes them an easier target. Check out this article for strategies to protect valuable customer information. Then give us a call. Our team at GeeksHD can help you get started.

Small and Mid-Size Businesses Need to Focus on Cybersecurity2019-12-10T11:12:16-07:00
10 Dec 2019

Develop ‘Security Champions’ For Successful Enterprise Security Scalability


"Scaling up a corporate security department can be an exercise in futility. These organizations need to cover multiple areas of expertise, from classic IT security to physical security, compliance, regulation, secure coding, incident handling and legal/privacy, all while facing the need to run lean." Read this article for to discover how getting to the root cause of vulnerabilities helps leverage your best assets and employees to protect your organization from future breaches.

Develop ‘Security Champions’ For Successful Enterprise Security Scalability2019-12-10T08:24:16-07:00
9 Dec 2019

Is your company secure?


It takes 311 days and $4 million on average to contain an email hack. With Microsoft 365, GeeksHD can help your organization avoid costly breaches and stay secure. Microsoft 365 is a complete, intelligent solution to empower employees to be creative and work securely together. It brings together the abilities to identify and access management, threat protection, information protection and security management in a simple, secure, all-in-one solution. Contact us to learn more.

Is your company secure?2019-12-09T17:07:01-07:00
9 Dec 2019

Customer story: iSalon


For @iSalon, making the move to #Microsoft365Business was a no-brainer. In fact, the IT department at @iSalon identified the superior data-loss prevention tools from Microsoft 365 as a game-changer for the company. In addition to protecting customer #data and simplifying IT management, @iSalon has already seen a positive impact on its bottom line since adopting Microsoft 365 Business. Our team at GeeksHD can help you increase security measures and grow your business. Contact us to learn more.

Customer story: iSalon2019-12-09T14:09:12-07:00
9 Dec 2019

Should you replace your Mac?


If you’ve owned a Mac for quite some time, it’s probable that you’ve gone through a few issues while using it. And after a while, using it can be more of a hassle than a convenience. If you’re already experiencing some major issues, it may be time to replace your Mac. Here are some telltale signs that you should.

Your device can’t support the latest macOS version

Apple releases a new version of macOS every September or October. Typically, Mac models from the past several years are supported. So if your device can’t update to the latest version, it’s a sign that you need to have your Mac replaced.

As of this writing, the latest macOS version is 10.15 Catalina. Here are the following Mac models that support the update:

  • MacBook (2015 and later)
  • MacBook Air (2012 and later)
  • MacBook Pro (2012 and later)
  • iMac (2012 and later)
  • iMac Pro (2017 and later)
  • Mac Pro (2013 and later)
  • Mac mini (2012 and later)

This means that devices made earlier than those in the list cannot install macOS Catalina. For […]

Should you replace your Mac?2019-12-09T08:00:33-07:00
6 Dec 2019

What Wi-Fi router features to look for


Wireless routers are essential for operating a modern business. Routers allow one network connection to essentially be split into many and then shared by different users and devices — usually over a Wi-Fi connection. If you are looking for a new Wi-Fi router for your office, there are some important features you should be aware of.

Network type

Look at any router and you will quickly see that there are a number of different networks available. The four most commonly found are 802.1b, 802.1g, 802.1n, and 802.11ac. These designations indicate how fast the router can transfer wireless data, with 802.11ac being the fastest of these four. Those who want to connect multiple devices via Wi-Fi or cable may do better with 802.11ac router.


This is closely associated with the router’s network type, and is usually one of the first things listed on router boxes and specifications. To spot the router’s throughput, look for Mbps. This indicates the speed at which the router is […]

What Wi-Fi router features to look for2019-12-06T08:00:43-07:00
4 Dec 2019

Why telephony and VoIP attacks continue


Hackers will never stop looking for new ways to hurt your business. One way is through launching denial-of-service (DoS) attacks on Voice over Internet Protocol (VoIP) systems. Read on for a complete rundown of this cyberthreat.

Denial-of-service attacks

The end goal of any DoS attack is to overwhelm a system with so many requests that the system is eventually forced to shut down. Telephony DoS (TDoS) attack is a subcategory leveled at VoIP systems. Alarmingly, this attack is commonly used against hospitals and 911 phone lines. Much like ransomware, some TDoS attackers even demand a ransom to halt the attack. They take advantage of cryptocurrencies and caller-ID spoofing to make it incredibly difficult to identify attackers.

TDoS attacks generally employ fewer resources than the DoS attacks that are designed to cripple IT systems such as networks, servers, and software. At its most basic, all that a TDoS attack requires is an automated phone dialer that calls a target phone number and hangs up […]

Why telephony and VoIP attacks continue2019-12-04T08:00:35-07:00
2 Dec 2019

Customer story: Jack’s Diving Locker


Did you know that technology is helping to protect and save our oceans? With #cloud security and communication tools, @JacksDiveLocker has exponentially increased their outreach and education efforts to keep our oceans healthy and thriving. Want to see how the latest #security tools can help grow your business? Contact our team at GeeksHD to get started today!

Customer story: Jack’s Diving Locker2019-12-04T07:23:30-07:00
2 Dec 2019

Predictive forecasting in Office 365’s Power BI


People have always been intrigued by what the future holds. Seers use crystal balls and tarot cards, but business managers such as yourself need a tool that’s based purely on science. If you’re an Office 365 subscriber, you now have Power BI’s predictive forecasting at your disposal.

Predictive forecasting uses a variety of statistical techniques, such as modeling and data mining, to analyze current and historical facts to make predictions about the future.
The predictive forecasting function of Office 365 provides users with the skills to generate reports, interactive charts, and 3D visualizations of business performance.

Its built-in predictive forecasting models can automatically detect seasonality in the data, though users can override this by applying a non-seasonal algorithm if they so desire. It also enables users to see how results are affected by adjusting the parameters of the time or confidence interval assigned to be analyzed. Simply put, users can perform advanced forecasting without the complexity that usually accompanies these kinds of processes.

Power BI’s predictive forecasting can also help fill […]

Predictive forecasting in Office 365’s Power BI2019-12-04T07:23:25-07:00