New malware tests virtualization security

2017January20_Virtualization_BOne of the core principles of virtualized technology is the ability to quarantine cyber security threats easily. For the most part, vendors have been winning this security tug-of-war with hackers, but that may change with the resurrection of a long-dormant piece of malware that targets virtualized desktops. If your business employs any form of virtualization, learning more about this updated virus is critically important to the health of your technology.

What is it?

Back in 2012, a brand new virus called “Shamoon” was unleashed onto computers attached to the networks of oil and gas companies. Like something out of a Hollywood film, Shamoon locked down computers and displayed a burning American flag on the display while totally erasing anything stored on the local hard disk. The cybersecurity industry quickly got the virus under control, but not before it destroyed data on nearly 30,000 machines.

For years, Shamoon remained completely inactive — until a few months ago. During a period of rising popularity, virtualization vendors coded doorways into their software specifically designed to thwart Shamoon and similar viruses. But a recent announcement from Palo Alto Networks revealed that someone refurbished Shamoon to include a set of keys that allow it to bypass these doorways. With those safeguards overcome, the virus is free to cause the same damage it was designed to do four years ago.

Who is at risk?

As of the Palo Alto Networks announcement, only networks using Huawei’s virtual desktop infrastructure management software are exposed. If your business uses one of those services, get in touch with your IT provider as soon as possible to address how you will protect yourself from Shamoon.

On a broader scale, this attack shows how virtualization’s popularity makes it vulnerable. Cyber attackers rarely write malware programs that go after unpopular or underutilized technology. The amount of effort just isn’t worth the pay off.

Headlines decrying the danger of Shamoon will be a siren call to hackers all over the globe to get in on the ground floor of this profitable trend. It happened for ransomware last year, and virtual machine viruses could very well turn out to be the top security threat of 2017.

How can I protect my data?

There are several things you need to do to ensure the safety of your virtual desktops. Firstly, update your passwords frequently and make sure they’re sufficiently complex. Shamoon’s most recent attempt to infect workstations was made possible by default login credentials that had not been updated.

Secondly, install monitoring software to scan and analyze network activity for unusual behavior. Even if legitimate credentials are used across the board, accessing uncommon parts of the network at odd hours will sound an alarm and give administrators precious time to take a closer look at exactly what is happening.

Ultimately, businesses need virtualization experts on hand to protect and preserve desktop infrastructures. Thankfully, you have already found all the help you need. With our vast experience in all forms of virtualized computing, a quick phone call is the only thing between you and getting started. Call today!

Posted in General Articles B, Virtualization | Tagged | Comments closed

An old virus gets a new shot at virtualization

2017January20_Virtualization_AVirtualizing your desktops comes with a number of benefits, one of which is improved security. Unfortunately, nothing perfect lasts forever, and the virtualization industry is facing a frightening new form of malware. Although this threat is nothing more than a facelift on an old virus, it is just as dangerous as it was the first time it made headlines. If you’re utilizing any sort of virtualized desktop, you need to be fully aware of this new development.

What is it?

Back in 2012, a brand new virus called “Shamoon” was unleashed onto computers attached to the networks of oil and gas companies. Like something out of a Hollywood film, Shamoon locked down computers and displayed a burning American flag on the display while totally erasing anything stored on the local hard disk. The cybersecurity industry quickly got the virus under control, but not before it destroyed data on nearly 30,000 machines.

For years, Shamoon remained completely inactive — until a few months ago. During a period of rising popularity, virtualization vendors coded doorways into their software specifically designed to thwart Shamoon and similar viruses. But a recent announcement from Palo Alto Networks revealed that someone refurbished Shamoon to include a set of keys that allow it to bypass these doorways. With those safeguards overcome, the virus is free to cause the same damage it was designed to do four years ago.

Who is at risk?

As of the Palo Alto Networks announcement, only networks using Huawei’s virtual desktop infrastructure management software are exposed. If your business uses one of those services, get in touch with your IT provider as soon as possible to address how you will protect yourself from Shamoon.

On a broader scale, this attack shows how virtualization’s popularity makes it vulnerable. Cyber attackers rarely write malware programs that go after unpopular or underutilized technology. The amount of effort just isn’t worth the pay off.

Headlines decrying the danger of Shamoon will be a siren call to hackers all over the globe to get in on the ground floor of this profitable trend. It happened for ransomware last year, and virtual machine viruses could very well turn out to be the top security threat of 2017.

How can I protect my data?

There are several things you need to do to ensure the safety of your virtual desktops. Firstly, update your passwords frequently and make sure they’re sufficiently complex. Shamoon’s most recent attempt to infect workstations was made possible by default login credentials that had not been updated.

Secondly, install monitoring software to scan and analyze network activity for unusual behavior. Even if legitimate credentials are used across the board, accessing uncommon parts of the network at odd hours will sound an alarm and give administrators precious time to take a closer look at exactly what is happening.

Ultimately, businesses need virtualization experts on hand to protect and preserve desktop infrastructures. Thankfully, you have already found all the help you need. With our vast experience in all forms of virtualized computing, a quick phone call is the only thing between you and getting started. Call today!

Posted in General Articles A, Virtualization | Tagged | Comments closed

New virus threatens virtual machines

2017January20_Virtualization_CBefore some of our clients have even had a chance to wrap their heads around what virtualization is and how it works, hackers have already started attacking the new and exciting technology. By updating a virus from several years ago for virtualized environments, hackers hope to totally wipe the data off your hard drives. If you utilize any sort of virtualization services, it’s imperative that you know how to steer clear of this threat.

What is it?

Back in 2012, a brand new virus called “Shamoon” was unleashed onto computers attached to the networks of oil and gas companies. Like something out of a Hollywood film, Shamoon locked down computers and displayed a burning American flag on the display while totally erasing anything stored on the local hard disk. The cybersecurity industry quickly got the virus under control, but not before it destroyed data on nearly 30,000 machines.

For years, Shamoon remained completely inactive — until a few months ago. During a period of rising popularity, virtualization vendors coded doorways into their software specifically designed to thwart Shamoon and similar viruses. But a recent announcement from Palo Alto Networks revealed that someone refurbished Shamoon to include a set of keys that allow it to bypass these doorways. With those safeguards overcome, the virus is free to cause the same damage it was designed to do four years ago.

Who is at risk?

As of the Palo Alto Networks announcement, only networks using Huawei’s virtual desktop infrastructure management software are exposed. If your business uses one of those services, get in touch with your IT provider as soon as possible to address how you will protect yourself from Shamoon.

On a broader scale, this attack shows how virtualization’s popularity makes it vulnerable. Cyber attackers rarely write malware programs that go after unpopular or underutilized technology. The amount of effort just isn’t worth the pay off.

Headlines decrying the danger of Shamoon will be a siren call to hackers all over the globe to get in on the ground floor of this profitable trend. It happened for ransomware last year, and virtual machine viruses could very well turn out to be the top security threat of 2017.

How can I protect my data?

There are several things you need to do to ensure the safety of your virtual desktops. Firstly, update your passwords frequently and make sure they’re sufficiently complex. Shamoon’s most recent attempt to infect workstations was made possible by default login credentials that had not been updated.

Secondly, install monitoring software to scan and analyze network activity for unusual behavior. Even if legitimate credentials are used across the board, accessing uncommon parts of the network at odd hours will sound an alarm and give administrators precious time to take a closer look at exactly what is happening.

Ultimately, businesses need virtualization experts on hand to protect and preserve desktop infrastructures. Thankfully, you have already found all the help you need. With our vast experience in all forms of virtualized computing, a quick phone call is the only thing between you and getting started. Call today!

Posted in General Articles C, Virtualization | Tagged | Comments closed

Let Office 365 help you save the date

img-calendar-170px-op3When you’re planning a reunion, going back and forth with your friends is frustrating, to say the least. Imagine a similar scenario in your office. The benefits of sharing your calendar with colleagues include knowing when to hold meetings, set project deadlines as well as knowing the best time to talk with clients. Knowing this, Microsoft has made changes to its calendar sharing function on Office 365, and here some of them:

Simplicity
Users’ first impression of the new model is that it’s much simpler. To share your calendar, simply click the Share option in the calendar menu bar and then enter the names of people with whom you wish to share. With a few clicks, you can decide who gets to see your schedule and how much of it they can view. On top of that, you’ll be able to nominate users who create appointments or accept meeting requests on your behalf – when the update rolls out in early 2017.

What sharers get to see
Once a user accepts a sharing invitation, the calendar is then added to the set they open. The invitation needs to be accepted using an updated client in order for the embedded instructions to be properly processed. Depending on how much you’re willing to share, the calendar allows you to either show full details of your schedule or just certain parts of it.

Mobile devices included
Besides the new sharing interface, this model extends into mobile devices where Outlook for iOS, Android, and Windows 10 Mobile will be able to view and edit shared calendars for the first time. And because calendar events are time-sensitive, changes will be executed and synced immediately, ensuring that your calendar is always accurate.

Immediate synchronization is available for OWA and mobile clients. For Mac users, Outlook continues to use periodic synchronization. This is used to share calendar information with users outside of your Office 365 tenant.

Updates: Outlook for Mac
Known as the black sheep of the Outlook family, implementation features of Outlook for Mac generally differs from the way things are done in other clients. Fortunately, Outlook for Mac’s calendar sharing function is being upgraded, with changes that include:

  • Intuitive UI to match other Outlook clients, including the addition of an Accept button to simplify calendar sharing invitations.
  • Shifting away from the Mac-specific local linked calendars, roaming shared calendars reads data from Exchange Online to ensure the same set of shared calendars are visible across all devices.
  • Immediate synchronization will replace periodic synchronization.

Even the tiniest details — calendar sharing included — have the potential to greatly impact the outcome of your business. If you have questions or concerns about managing various aspects of Office 365, feel free to get in touch today.

Posted in General Articles C, Office | Tagged , , , , , , , , , , , , , , | Comments closed

Office 365 simplifies calendar sharing

img-calendar-170px-op2Calendar sharing is one of those mundane yet vital components of effective scheduling. The task of sharing one’s calendar hasn’t always been easy, and many wonder why. Microsoft has recently improved upon its calendar sharing features in Office 365 for all users, and here are some of the reasons you should accept the latest advancement with open arms:

Simplicity
Users’ first impression of the new model is that it’s much simpler. To share your calendar, simply click the Share option in the calendar menu bar and then enter the names of people with whom you wish to share. With a few clicks, you can decide who gets to see your schedule and how much of it they can view. On top of that, you’ll be able to nominate users who create appointments or accept meeting requests on your behalf – when the update rolls out in early 2017.

What sharers get to see
Once a user accepts a sharing invitation, the calendar is then added to the set they open. The invitation needs to be accepted using an updated client in order for the embedded instructions to be properly processed. Depending on how much you’re willing to share, the calendar allows you to either show full details of your schedule or just certain parts of it.

Mobile devices included
Besides the new sharing interface, this model extends into mobile devices where Outlook for iOS, Android, and Windows 10 Mobile will be able to view and edit shared calendars for the first time. And because calendar events are time-sensitive, changes will be executed and synced immediately, ensuring that your calendar is always accurate.

Immediate synchronization is available for OWA and mobile clients. For Mac users, Outlook continues to use periodic synchronization. This is used to share calendar information with users outside of your Office 365 tenant.

Updates: Outlook for Mac
Known as the black sheep of the Outlook family, implementation features of Outlook for Mac generally differs from the way things are done in other clients. Fortunately, Outlook for Mac’s calendar sharing function is being upgraded, with changes that include:

  • Intuitive UI to match other Outlook clients, including the addition of an Accept button to simplify calendar sharing invitations.
  • Shifting away from the Mac-specific local linked calendars, roaming shared calendars reads data from Exchange Online to ensure the same set of shared calendars are visible across all devices.
  • Immediate synchronization will replace periodic synchronization.

Even the tiniest details — calendar sharing included — have the potential to greatly impact the outcome of your business. If you have questions or concerns about managing various aspects of Office 365, feel free to get in touch today.

Posted in General Articles B, Office | Tagged , , , , , , , , , , , , , , | Comments closed

Simplify calendar sharing with Office 365

img-calendar-170px-op1Knowing your friend’s schedules comes in handy when you’re trying to arrange a reunion, and the same can be said for businesses. Through calendar sharing, employees can simultaneously arrange meetings, prioritize projects and set schedules for contacting customers. Unfortunately, it isn’t as easy as it sounds. Recently, Microsoft made changes to its calendar sharing function that might make things a little simpler. Here are some of them:

Simplicity
Users’ first impression of the new model is that it’s much simpler. To share your calendar, simply click the Share option in the calendar menu bar and then enter the names of people with whom you wish to share. With a few clicks, you can decide who gets to see your schedule and how much of it they can view. On top of that, you’ll be able to nominate users who create appointments or accept meeting requests on your behalf – when the update rolls out in early 2017.

What sharers get to see
Once a user accepts a sharing invitation, the calendar is then added to the set they open. The invitation needs to be accepted using an updated client in order for the embedded instructions to be properly processed. Depending on how much you’re willing to share, the calendar allows you to either show full details of your schedule or just certain parts of it.

Mobile devices included
Besides the new sharing interface, this model extends into mobile devices where Outlook for iOS, Android, and Windows 10 Mobile will be able to view and edit shared calendars for the first time. And because calendar events are time-sensitive, changes will be executed and synced immediately, ensuring that your calendar is always accurate.

Immediate synchronization is available for OWA and mobile clients. For Mac users, Outlook continues to use periodic synchronization. This is used to share calendar information with users outside of your Office 365 tenant.

Updates: Outlook for Mac
Known as the black sheep of the Outlook family, implementation features of Outlook for Mac generally differs from the way things are done in other clients. Fortunately, Outlook for Mac’s calendar sharing function is being upgraded, with changes that include:

  • Intuitive UI to match other Outlook clients, including the addition of an Accept button to simplify calendar sharing invitations.
  • Shifting away from the Mac-specific local linked calendars, roaming shared calendars reads data from Exchange Online to ensure the same set of shared calendars are visible across all devices.
  • Immediate synchronization will replace periodic synchronization.

Even the tiniest details — calendar sharing included — have the potential to greatly impact the outcome of your business. If you have questions or concerns about managing various aspects of Office 365, feel free to get in touch today.

Posted in General Articles A, Office | Tagged , , , , , , , , , , , , , , | Comments closed

5 useful commands for Google’s AI assistant

2017January18_Android_BVoice-powered AI systems are enjoying a resurgence. With improved bandwidth, both on desktops and on mobile devices, software vendors can easily relay complex voice commands to the cloud to be analyzed by more powerful computing software. Everyone has seen Siri do it on Apple phones, but how many realize that Android has its own AI, Google Now? If you’ve got an Android phone, pick it up and give a few of our favorite voice commands a whirl!

Before you can start playing with Google’s AI, you need to turn on the service. On your Android device, press and hold the home key at the bottom of the screen, then swipe upwards. This will open the Google Now interface. Tap the search bar at the top of the screen, then the Google icon on the left-hand side of the search bar.

From there, tap the three stacked lines in the upper left corner of the screen, followed by Settings, and then Voice. Once you’ve toggled the “From any screen option,” saying the phrase “Ok Google” any time your phone is unlocked will prompt it to start listening for a command. Turn it on and try some of the examples below!

Tip #1: Reminders

Google Now can certainly help with information discovery, but what about when you just need a little help managing your calendar? The phrase “Remind me to [action] + [time]” is all you need to set a quick reminder before you have a chance to manually add it to your calendar.

And if you’re not sure when you need to be reminded, ask Google to set the notification based on location. “Remind me to buy eggs next time I’m at Safeway.” If you have location services turned on, your phone will prompt you next time you’re near the store.

Tip #2: Anything involving your clock app

Whether you want to “Set an alarm/time for [time]” to achieve productivity goals, or you need to know “What time is it in [location]” before calling a client in another time zone, Google Now can essentially perform any task from your native clock app with a simple request.

Tip #3: Convert/calculate anything

As the business landscape becomes more and more globalized, we’re constantly calculating currencies, units of measurement, and simple sums. For example, “What is X dollars in euros?” could help you easily convert the price of an invoice, or “How many kilometers are in X miles?” could shorten the time required to calculate how much material you need to order for a new product.

Tip #4: Retrieve documents from Gmail

Searching Google from your desktop, you may have noticed that important documents from your email account occasionally show up at the top of a search page. That’s because Google can recognize official documents such as flight itineraries, hotel receipts, and utility bills. Just say “Show me my flight to Phoenix” and Google Now will pull it up immediately.

Tip #5: Basic phone commands

The majority of the applications that came with your phone can receive voice commands. “Take a photo,” “Open acme.com,” “Turn on Wi-Fi,” and “Open Salesforce1,” are just some of the ways you can minimize the time you spend tapping your phone.

There are dozens more, and while such small tasks may seem silly, they represent a fundamental shift in the way we interact with our technology. Smartphones should help you do more, but if you can’t find what you’re looking for, it’s just a waste of time. Spend a few moments tinkering with your Google Now and give us a call today to find out more.

Posted in Android, General Articles B | Tagged , , , , | Comments closed

5 great voice commands for Google Now

2017January18_Android_AGoogle Now has been around for years, but the service still doesn’t have the name recognition of Apple’s Siri or Amazon’s Alexa. Considering that it is delivered on nearly every new Android device, it’s a crime that it doesn’t get more use. For a crash course in some of Google’s best AI-powered voice-commands, take a look at five of our favorites.

Before you can start playing with Google’s AI, you need to turn on the service. On your Android device, press and hold the home key at the bottom of the screen, then swipe upwards. This will open the Google Now interface. Tap the search bar at the top of the screen, then the Google icon on the left-hand side of the search bar.

From there, tap the three stacked lines in the upper left corner of the screen, followed by Settings, and then Voice. Once you’ve toggled the “From any screen option,” saying the phrase “Ok Google” any time your phone is unlocked will prompt it to start listening for a command. Turn it on and try some of the examples below!

Tip #1: Reminders

Google Now can certainly help with information discovery, but what about when you just need a little help managing your calendar? The phrase “Remind me to [action] + [time]” is all you need to set a quick reminder before you have a chance to manually add it to your calendar.

And if you’re not sure when you need to be reminded, ask Google to set the notification based on location. “Remind me to buy eggs next time I’m at Safeway.” If you have location services turned on, your phone will prompt you next time you’re near the store.

Tip #2: Anything involving your clock app

Whether you want to “Set an alarm/time for [time]” to achieve productivity goals, or you need to know “What time is it in [location]” before calling a client in another time zone, Google Now can essentially perform any task from your native clock app with a simple request.

Tip #3: Convert/calculate anything

As the business landscape becomes more and more globalized, we’re constantly calculating currencies, units of measurement, and simple sums. For example, “What is X dollars in euros?” could help you easily convert the price of an invoice, or “How many kilometers are in X miles?” could shorten the time required to calculate how much material you need to order for a new product.

Tip #4: Retrieve documents from Gmail

Searching Google from your desktop, you may have noticed that important documents from your email account occasionally show up at the top of a search page. That’s because Google can recognize official documents such as flight itineraries, hotel receipts, and utility bills. Just say “Show me my flight to Phoenix” and Google Now will pull it up immediately.

Tip #5: Basic phone commands

The majority of the applications that came with your phone can receive voice commands. “Take a photo,” “Open acme.com,” “Turn on Wi-Fi,” and “Open Salesforce1,” are just some of the ways you can minimize the time you spend tapping your phone.

There are dozens more, and while such small tasks may seem silly, they represent a fundamental shift in the way we interact with our technology. Smartphones should help you do more, but if you can’t find what you’re looking for, it’s just a waste of time. Spend a few moments tinkering with your Google Now and give us a call today to find out more.

Posted in Android, General Articles A | Tagged , , , , | Comments closed

Android AI: 5 helpful requests for Google Now

2017January18_Android_CGoogle is synonymous with some of the best internet search technology on the market. But for some reason, one of the most effective ways to utilize Google search has flown mostly under the radar. If you’re jealous of Apple’s Siri, you may not even realize that you have your own AI assistant sitting in your pocket. Pull out your Android phone because you’ll want to try a few of these powerful Google Now commands.

Before you can start playing with Google’s AI, you need to turn on the service. On your Android device, press and hold the home key at the bottom of the screen, then swipe upwards. This will open the Google Now interface. Tap the search bar at the top of the screen, then the Google icon on the left-hand side of the search bar.

From there, tap the three stacked lines in the upper left corner of the screen, followed by Settings, and then Voice. Once you’ve toggled the “From any screen option,” saying the phrase “Ok Google” any time your phone is unlocked will prompt it to start listening for a command. Turn it on and try some of the examples below!

Tip #1: Reminders

Google Now can certainly help with information discovery, but what about when you just need a little help managing your calendar? The phrase “Remind me to [action] + [time]” is all you need to set a quick reminder before you have a chance to manually add it to your calendar.

And if you’re not sure when you need to be reminded, ask Google to set the notification based on location. “Remind me to buy eggs next time I’m at Safeway.” If you have location services turned on, your phone will prompt you next time you’re near the store.

Tip #2: Anything involving your clock app

Whether you want to “Set an alarm/time for [time]” to achieve productivity goals, or you need to know “What time is it in [location]” before calling a client in another time zone, Google Now can essentially perform any task from your native clock app with a simple request.

Tip #3: Convert/calculate anything

As the business landscape becomes more and more globalized, we’re constantly calculating currencies, units of measurement, and simple sums. For example, “What is X dollars in euros?” could help you easily convert the price of an invoice, or “How many kilometers are in X miles?” could shorten the time required to calculate how much material you need to order for a new product.

Tip #4: Retrieve documents from Gmail

Searching Google from your desktop, you may have noticed that important documents from your email account occasionally show up at the top of a search page. That’s because Google can recognize official documents such as flight itineraries, hotel receipts, and utility bills. Just say “Show me my flight to Phoenix” and Google Now will pull it up immediately.

Tip #5: Basic phone commands

The majority of the applications that came with your phone can receive voice commands. “Take a photo,” “Open acme.com,” “Turn on Wi-Fi,” and “Open Salesforce1,” are just some of the ways you can minimize the time you spend tapping your phone.

There are dozens more, and while such small tasks may seem silly, they represent a fundamental shift in the way we interact with our technology. Smartphones should help you do more, but if you can’t find what you’re looking for, it’s just a waste of time. Spend a few moments tinkering with your Google Now and give us a call today to find out more.

Posted in Android, General Articles C | Tagged , , , , | Comments closed

Why you should update your SBC

2017January17_VoIP_CDid you know that your VoIP systems are especially vulnerable to cyber attacks? When it comes to VoIP, hackers will go to great lengths to intercept messages over a network or even use denial-of-service attacks to shut yours down. To protect your network, firewalls and antivirus software may be your first options, but they simply can’t defend against modern voice attacks. What you need is an updated session border controller (SBC).

What is it?
In a nutshell, an SBC is a dedicated hardware device or software application that acts as a gatekeeper of your VoIP network, controlling how phone calls are initiated, conducted, and terminated. Much like a firewall, an SBC examines voice messages transmitted as IP packets and prevents unauthorized sessions to the network. This protects your business from call jacking, eavesdropping, and denial-of-service attempts.

But even though most businesses deploy SBC, many tend to leave it unmanaged, rendering it ineffective against new and emerging VoIP-based attacks. To make sure this doesn’t happen in your business, consider the following security best-practices with SBC:

Update frequently
Security threats are ever-evolving, and your security systems need to do the same. Set aside one hour per week to check for security updates and distribute them company-wide. To avoid disrupting daily operations and consuming large amounts of bandwidth, we recommend performing updates during off-hours.

Enable real-time alerts
Whether via email or text, your SBC product should alert you when something happens, when it has blocked a call, and why. These alerts will let you know about any attempted attacks and will notify you when your SBC is due for an update.

Assess SBC performance
To find out whether your SBC is routinely blocking threats, make sure to periodically evaluate its effectiveness. If a third-party is managing your VoIP systems, have them perform a security test to identify possible vulnerabilities within your system.

After the security assessment, your provider should compile a report about SBC performance and recommended solutions and updates you should install to mitigate security risks. This allows you to close up any security holes well before a malicious hacker exploits them.

Educate staff
Understanding why you need to update your SBC is a good first step in defending against a variety of VoIP-based attacks, but that’s no silver bullet. Aside from technical attacks, businesses need to train staff to spot cunning threats like vishing, a social engineering scam whereby hackers attempt to obtain sensitive information via phone calls.

Installing an SBC is important, but it can give businesses a false sense of security. As we mentioned, the cyber security landscape is ever-changing. So if you’re not taking a proactive role in updating and assessing your SBC, then your business might suffer for it in the near future.

To avoid spending a lifetime recovering from successful voice attacks, contact us today. We take the time to ensure your SBC is up-to-date and your business is safe.

Posted in General Articles C, VoIP | Tagged , , , , , , | Comments closed
  • Internet Presence Management for Small Business Owners

    pronto logoFull-service, pay-as-you-go all inclusive websites, from design and content to SEO and social media management for one low monthly price.

    Learn more about our small business online marketing services.