<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

The Tabush Cloud & Managed IT Blog

2017: Year of the Cloud

It’s hard to imagine that just ten years ago, in 2006, the term “cloud computing” hadn’t been invented yet. By definition, cloud means an IT system or application that lives in a remote datacenter and is managed by a third party provider, as opposed to residing on a server in the customer’s location. Companies large and small had all of their IT systems running on servers and software that lived within the company’s walls.

Fast forward just ten years to 2016, and it’s hard to find a business that does not use the cloud for some part of their IT. While it used to be that decision makers had to be convinced why they should trust the cloud for a certain service, today it’s hard to make an argument why certain things should not live in the cloud. Why the complete shift?

Topics: IT Insights Cloud Cloud for Business

5 Reasons Desktop-as-a-Service (DaaS) Will Be Huge in 2016

As I wrote about at the beginning of the year, desktop-as-a-service (DaaS) is a sector of technology that will really grow this year. And, this is why:

Topics: Cloud IT IT Insights Boxtop Desktop as a Service (DaaS)

Predictions for Small Business IT in 2016

This time of year always brings a slew of articles about “what’s next” – the hot technologies, stocks, real estate markets, movies, music, food – what we should all plan to use/invest in/watch/ eat, etc. Since everyone else is doing it, I figured why not chime in on the topic I spend most of my time in: Small Business IT. So, without further ado, here are my predictions for 2016:

Topics: IT Insights Small Business

CryptoLocker: A Firsthand Experience

The big IT news lately has been about the Heartbleed SSL vulnerability, however, malware and viruses still are the most prominent threat to small to medium sized businesses.

CryptoLocker, which surfaced in late 2013, is still out there, and its destructiveness hasn’t dwindled. CryptoLocker is malware which encrypts all files it finds on a computer or network, rendering them inaccessible.

Last month we were called in by a business which had been ‘hit’ with this CryptoLocker virus and want to share with you how we battled it.

Topics: IT Insights Computer Viruses and Malware Protection

Internet Filtering at the Workplace

The Internet is probably the most significant invention in the last fifty years. It's hard to believe that only 20 years ago, the Internet as we know it didn't exist. Most office desks had computers, but they were for internal applications only. Today, we all know how much that has changed.

But just because every business needs the Internet to function, and the access is limited only to the speed of your connection, should companies allow their employees unrestricted Internet access from their office computers, or should it be limited to business use only?

As a service provider who has worked with over 250 small and mid-sized businesses over the years, I've heard pretty good arguments for both sides.

Topics: IT Insights Internet Filtering

The Target Hack: How could it happen?

Unless you've been living in a bubble without access to the news or Internet for the past 3 months, you've heard about the massive security breach that Target suffered. Hackers were able to get into Target's computer system and download over 110 million credit and debit card numbers. While we don't know who these 110 million lucky winners are, you can rest assured that if you weren't in that group, someone very close to you was.

Last week, more details on how the attack occurred were released. Apparently, Fazio Mechanical, a HVAC contractor who does work for Target, had someone hack into one of their PC's through a targeted phishing attempt. Fazio's systems were set up with certain access to Target's system to communicate work orders, invoices, etc. The hackers used that connection to access Target's database containing credit card numbers, and somehow downloaded it all from there. This is shameful at best.

Topics: IT Security IT Insights Breach

Windows 8.1 Release Update: The Restoration of the Beloved “Start” Button


Businesses can rejoice! The START button is back with Windows 8.1.

Are you one of the many Windows users who’ve been missing the “Start” button? Well, on October 18th a tweaked version of Microsoft’s Windows operating system will restore the beloved “Start” button, and update other features. A full retail version of Windows 8.1 will be available and will be offered as a free download to all Windows 8 users. Windows 8.1 will be available worldwide, starting in New Zealand at midnight on October 18th.

Topics: IT Insights Microsoft Windows Tech News

Ode To Basecamp

Like most people I know, I consider myself a busy person. As a small business owner, I wear many hats in the company, dipping my hand into sales, marketing, finance, management, and client services.

Over the years, I've tried using a number of different strategies to keep all of my tasks, ideas, and projects organized. I've used Outlook Tasks, email folders, file folders, and enough post-it notes to fill a small landfill.

Topics: IT Insights Software Tips & Tricks