Omnis Technologies Blog

CTERA Cloud Gateway Web Interface Walkthrough
IT disasters can strike at any moment. If and when they do, how well do you have your clients protected? Que the CTERA C200 hybrid cloud solution. This local NAS (network-attached storage) unit takes the human factor out of backups by combining two steps into one. No more are the days of saving physical backups […]

Public vs Private Cloud Solutions for Small Businesses
Cloud computing solutions are gaining popularity in small businesses. According to research by Gartner, up to 60% of business owners will be relying on the cloud for hosting data by 2022, roughly doubling the numbers from 2018. Since cloud solutions are being widely adopted, providers are expanding their offerings to meet the needs of more […]

What is a VoIP Phone System?
If you’re looking for a phone system that saves money or gives flexibility, VoIP systems are worth considering. It stands for “voice over internet protocol”. They differ from traditional phone systems by using computer or smartphone apps instead of a hardlined phone. It works similarly to apps like Skype and Zoom, you communicate over the […]

How to Use Chrome’s Password Checkup and Password Manager
Google Chrome’s Password Checkup is now featured in the Chrome Security Checkup dashboard. As long as your version of Chrome is up to date and you’re signed in to your Google account, you will benefit from new security features. The most notable feature is the automatic password check. Each time you create a password on […]

5 Cybersecurity Tips Every Employee Needs to Know
As sophisticated as cybersecurity software is, small business owners will always be one click away from triggering disruptions like viruses or ransomware. The risk will never disappear completely as long as people are using computers. People aren’t perfect and everyone makes mistakes. With these tips, your employees will help mitigate cyber threats to your company. […]

Bring Your Own Device Policies for Small Businesses
Bring your own device policy, or BYOD, refers to an agreement between employers and employees who use their personal laptops, smartphones, or tablets for work purposes. These policies have up-sides and down-sides. BYOD Advantages Cost savings Increased productivity Disadvantages Security risks IT management Cost Savings With BYOD, the company doesn’t have to purchase devices for […]

Securely Reopening Your Small Business | IT Checklist for SMB Cybersecurity
The economic and workplace disruption caused by COVID-19 has left SMBs especially vulnerable to cyberattacks. A firm tracking ransomware trends, Coveware, reported the average company size targeted by ransomware was 635 employees in Q1 2020. However, the median company size was only 62 employees, showing how large enterprises pull averages up. As you reopen your […]

How to Set Up Google’s 2-Step Verification
Password leaks are all too common. Data breaches release millions of passwords and account credentials to the web at once. On haveibeenpwned.com, there’s a list of sites that suffered a recent breach and the number of accounts affected: Other popular sites with reported breaches include: Forbes, LinkedIn, Drop Box, and Kickstarter. Click here for the […]

Emails Designed for Deception – Phishing Emails Decoded
Phishing emails are created to look like emails from financial institutions, government agencies, or ecommerce sites. Scammers design these emails with logos, buttons, and text to trick you into clicking dangerous links. I took one of these emails out of my spam folder and inspected the HTML code behind it. Here are my findings: Misleading […]

How to Clear Unread Emails in Gmail
Accumulating a huge number of unread emails from promotions, notifications, or other types of frequent messages takes no time at all. It’s easy to let them stack up by only skimming subject lines instead of opening every “30% off!” offer that hits your inbox. But when you’re unread number reaches the hundreds or even thousands, […]