Google’s new amazing collaboration tools

New Collaboration Tools

Google just wrapped up it’s 2017 Next conference where it shared many new products and features. A few stood out to us and our clients: Team Drives This new feature allows you to have shared folders accessible by teams, and secured like an on-site file server. Unlike normal cloud shared folders, these Team Drives are managed by the company not the user. The benefit of this is files are not lost when someone leaves the company, as well as you can control who can edit/delete/access the files, securing them. Drive File Stream When you have hundreds if not thousands of gigabytes of… Read moreGoogle’s new amazing collaboration tools

Have your accounts been compromised?


Over 189 websites have been compromised over the past few years leaking over 2 billion email accounts and their passwords. Since a lot of us end up using the same passwords for multiple accounts, these hacks can be very damaging. Once websites are hacked user’s passwords are made available to the world. So how do you know if your account has been compromised? There is a great site called haveibeenpwned. You can for free go to and enter your email address to see if any account tied to your email address has ever been part of any of these leaks. Find out if… Read moreHave your accounts been compromised?

“Spoofed” Emails: What They Are And How To Guard Against Them

Spoofed Emails

When you write a letter in real life, there’s nothing stopping you from putting any return address you want on the top of the envelope to potentially mislead the recipient as to its origins. In theory, that’s a security hole that email is not supposed to have; when you send an email to someone, the address you sent it from is attached to it automatically, and you’re not given the option to edit or alter this information. Unfortunately, that’s not exactly true. A hacking technique called “spoofing” does indeed make it possible for emails to appear to be coming from one address… Read more“Spoofed” Emails: What They Are And How To Guard Against Them

2-Step Verification: Make the Right Tradeoff


People aren’t good at creating strong passwords and remembering them. Far too many people use obvious choices like “password” and “123456.” As a result, criminals can break into accounts and steal information or install malware. Surely there’s a better way. One way to improve security is to require a second piece of information, in addition to the password. That’s called two-step verification. There are a lot of ways to do this, and people are always devising more. All of them involve a tradeoff. They make it harder for unauthorized people to get in, but it’s also a bit less convenient for… Read more2-Step Verification: Make the Right Tradeoff

IBM is saving a minimum of $265 per Mac on average versus a comparable PC


IBM just presented at JAMF conference. Last year they announced how the Macs were helping them cut the costs of their IT support. Read More about IBM’s initial findings. IBM has found that their total cost of ownership has improved with their switch to Mac. IBM is saving a minimum of $265 per mac on average versus a comparable PC. While the initial cost of the Mac is higher the easier roll out and management lowers the overall cost of ownership. Employees at IBM are now overwhelmingly choosing a Mac over other devices. Their over 217,000 devices are being supported by… Read moreIBM is saving a minimum of $265 per Mac on average versus a comparable PC

3 Common Security Problems Small Business Don’t Know They Have


Here are three common security problems we see in our work and the strategies we use for keeping our clients’ networks safe. If you run your business on macs, you’ll want to read on.   Problem #1: Improper Network Setup from the Beginning It’s not uncommon for a business’ IT support to have been trained for work in a PC environment rather than a Mac environment. Therefore, the network solutions recommended are often improper for what a Mac-based business truly needs. We found this recently with a client that was having file permission issues, internet interruptions and whose emails wouldn’t… Read more3 Common Security Problems Small Business Don’t Know They Have

Adobe issues Flash Update to deal with major security issues.


Dear Triad Mac Customers, Today Adobe issues a set of updates to fix security issues with Flash Player. Vulnerabilities were found that could allow someone to take control of a targeted computer through Flash Player. These updates have been released by adobe, to update your flash player you can go to adobe’s website at If you have a Mac you can also go to your System Preferences, then to Flash Player (normally in the bottom row) then click on Updates, then click Check Now to check for updates. If you are not sure if you have Flash you can… Read moreAdobe issues Flash Update to deal with major security issues.

macOS Sierra


Apple today released MacOS Sierra. This new upgrade will work on 2009 or later MacBooks and iMacs, as well as 2010 or newer MacBook Airs, MacBook Pros, Mac Minis, and Mac Pros. Sierra brings a ton of new features including Siri to the Mac. When using iCloud you can now free up space easily by syncing your desktop and document files to your iCloud account. Not all software is compatible at the moment, we recommend you check with third parties like Adobe and Microsoft to make sure all of your software will work prior to upgrading. You can upgrade by… Read moremacOS Sierra

iOS 10


iOS 10 is available September 13th. Messages will be revamped in iOS 10. New features will include animations like balloons, confetti or fireworks that can take over an entire screen to celebrate a special occasion, invisible ink to send a message which is only revealed after a friend swipes over it, and handwritten notes. iOS 10 will automatically suggest emojis that can replace a particular word in a message. Tapback is the new feature which let users respond with a simple tap. Apple is also opening up Messages to developers so they can create apps and other experiences within Messages… Read moreiOS 10

Apple Watch – Series 2


The Apple Watch 2 is official, and it’s waterproof. Or swim-proof, at least. And it’s aiming right at the sports and fitness market. The second-generation model, which is officially called Apple Watch Series 2, adds a faster dual-core processor, improved graphics, a much brighter display, and GPS, which can be used to measure pace, distance and speed when running and biking. But the highlight feature will be the added waterproofing. The new model is water resistant up to 50 meters (164 feet) and can be worn while showering and even swimming. In fact, there are new swim modes designed to… Read moreApple Watch – Series 2