Five Nines Blog

Five Nines Experts Sharing Actionable IT Advice

The Benefits of Promptly Replacing Old Computers

As long as old computers are still running with limited problems, they don't need to be replaced... right? It may seem easy to place these updates on the lower end of your...

Case Study: Supporting A Rural Nebraska Hospital

Five Nines is partnered with a 22-bed critical access hospital in rural Nebraska that supports up to 125 employees working between a hospital, clinic, and remote clinic. The...

A Deeper Dive Into 8x8

Businesses rely on phone calls and virtual meetings for collaboration both internally and externally on a daily basis, and in order to achieve significant levels of up-time this...

Be Prepared To Fight Cybercrime With User Training

In the tech industry today, even the most reliable tools can be used against you. Five Nines has recently discovered phishing attempts that are in the form of an Office 365...

NBA Bank Technology Event Recap: Financial IT

We had a great time at the Nebraska Bankers Association Bank Technology Conference last week. We got the chance to connect with financial organizations across the state of...

Defining Your IT Road Map

Preparation is an important part of any business, but when it comes to business technology preparation can make or break how your technical environment operates in the event of an...

Troubleshooting Tips: Don't Let Frustration Win

Running into a technical problem can be stressful, overwhelming, and a huge disruption to your workday. Don't be like this guy (thank you to our co-owner James, who provided this...

How To Combat Organizational Downtime

When it comes to workplace technology, the possibility of downtime is very real and has lasting impacts on organizations who experience it. Downtime is idle time within a business...

Hand-Held Hacking: Mobile Devices

Your mobile device holds your entire life: emails, messages, photos, social media accounts, etc. Because your phone is always in your hands, on your desk, or in your pocket, it's...

How to Begin The Fight Against Cybercrime

Small to medium-sized businesses are consistently targets of cyber-attacks due to their size and underestimated security measures. According to the 2017 State of Cybersecurity in...