Reasons to Use a Managed Service Provider for Wireless Networking

Reasons to Use a Managed Service Provider for Wireless Networking

Wireless networking has become a very important aspect of human life. The global marketplace has forced businesses to find new ways of reaching their customers in countries around the world. However, wireless networking isn’t just for business owners. Various people in every way of life rely on wireless networking for different reasons. Teenagers, young adults, […]

read more
Meltdown and Spectre Spawn New Round of Phishing Scams

Meltdown and Spectre Spawn New Round of Phishing Scams

The recent announcement of the vulnerabilities found in the Intel, ARM, and AMD processors has sparked a new phishing campaign – not the good kind of fishing with bait and largemouth bass. Although, these hackers are using a particular kind of bait. While Meltdown and Spectre require access to your system, hackers have various ways […]

read more
Celebrating Nexus IT Consultants’ 20-Year Anniversary

Celebrating Nexus IT Consultants’ 20-Year Anniversary

Two decades in business is no small achievement. The Nexus IT Consultants team is proud to have thrived in the Northern Utah business community for twenty years now; we think this is a good opportunity to look back and consider where the company came from, and how it’s gotten to where we are today.

read more
Meet Salt Lake City Technology Specialist:  Travis Gunn

Meet Salt Lake City Technology Specialist: Travis Gunn

Hi folks!  Travis here. You may have met me already, but if not, I hope we get to meet soon.  I've been with Nexus IT Consultants now for three years. Working here is so great. It feels like just yesterday that I joined this fantastic team. The employees here are great, and we have terrific customers and partners as well.

read more
Are You Tired Of Waiting For IT Support?

Are You Tired Of Waiting For IT Support?

The cost of downtime goes up exponentially when you’re waiting for an unresponsive IT company. So why bother? Try our responsive Help Desk instead.  So much of the IT industry is dependent on time. How quickly an IT firm can respond to a problem, how much downtime their client deals with, how much they’re charged […]

read more
Hacking Alert – An Employee Of Your Manufacturing Company May Be Sending Intellectual Property To a Criminal and Not Know It!

Hacking Alert – An Employee Of Your Manufacturing Company May Be Sending Intellectual Property To a Criminal and Not Know It!

Your manufacturing company is in the crosshairs of hackers. Cyber-spies are using backdoor viruses to steal intellectual property from businesses like yours. According to Verizon’s 2017 Data Breach Investigations Report, these cyber-spies are supported by nation states. 620 of data breaches hit the manufacturing sector last year, and 94% were committed by state-affiliated actors. 91% […]

read more
7 Ways to Reduce Your Paper Usage

7 Ways to Reduce Your Paper Usage

In spite of the move toward living digitally, Americans still use over 90 million tons of paper each year. Everyone nowadays seems to be reading everything online, and yet more than 2 billion books are printed each year. In addition, over 24 billion newspapers are printed annually, along with 350 million magazines. Only about half […]

read more
What is Chromium?

What is Chromium?

Is Chromium, the next browser from Google, trying to take over for Chrome? At a recent I/O developer conference, Google’s senior VP of products, Sundar Pichai, announced that Google Chrome now has over 1 billion active users. Though Microsoft has pushed their Edge browser hard, consumers simply like Chrome better. So, why mess with perfection? […]

read more
Why Do 4 Out Of 10 Companies Still Use Ransomware Friendly Anti-Virus?

Why Do 4 Out Of 10 Companies Still Use Ransomware Friendly Anti-Virus?

If The Marketplace Distrusts and Has Moved Away From Legacy Anti-Virus and Switched To Next-Generation Endpoint Protection To Escape Ransomware Infection, Why Are You Keeping It? All the way back in 2006, the word was getting out that Anti-Virus software must retire and make way for the Cloud, Next-Generation Endpoint Protection. AV served its purpose […]

read more
The Future We’ve All Been Eagerly Anticipating Is Here – Are You Ready?

The Future We’ve All Been Eagerly Anticipating Is Here – Are You Ready?

The standard of next-generation telecommunication is no longer the future, but the present. You’re probably not using it, even though you should be, and you may have to wait. When casual conversations bring up speed, it’s inevitable we hear the clichés about “faster than the speed of sound” or “faster than the speed of light”. […]

read more
Is Your Backdoor Open? You’ll “WannaCry” When the Hackers Get In

Is Your Backdoor Open? You’ll “WannaCry” When the Hackers Get In

Dangerous cyberattacks have been released by a group of hackers known as The Shadow Brokers. These exploits will lock up your data for good – no ransom, no return. But this isn’t all they do – they’ll also leave behind a parasite that lets them “hang out” inside your computer, infect others, and re-enter through a […]

read more
Using Yoast SEO to Write Effective Meta Descriptions

Using Yoast SEO to Write Effective Meta Descriptions

The term, “meta description” may seem foreign to some but we all see these descriptions each time we search for something online. The meta description can contain up to 320 characters and should be an interesting summary of what your website is all about. It shows up in the search results as those first few words/lines […]

read more