Male hands using a low profile keyboard, overlaid with tech graphics

Blog

Articles by Function4

New Study Finds More than Half of U.S. SMB Owners Believe Working Remotely Is Here to Stay Post-Pandemic

November 15th, 2021 by Function4

Smiling Businessman with Headphones Using Laptop Computer in Home Office

Embracing remote work has been a love-hate relationship for many small and medium-sized business (SMB) owners. With new technology allowing workers to work from wherever and whenever more than ever before, employers have had to balance...

Read Full Story »

Posted in: Business Technology

Top 12 Tips for Managing Remote Teams

November 8th, 2021 by Function4

A women working remotely on her laptop while on the phone in her kitchen.

In the past week, I heard from several former colleagues who contacted me for advice on managing remote workers. As companies around the globe grapple to address coronavirus and the workplace, managers who have never led distributed workforces...

Read Full Story »

Posted in: Business Technology

Sustaining Business in an Uncertain World

October 26th, 2021 by Function4

A woman working from her home office, videoconferencing on her laptop with other co-workers who are also working remotely

"The world of work cannot and should not look the same after this crisis." That's what the Secretary-General of the United Nations said recently. We all know the first chapter. When COVID-19 arrived, the business world had to pivot instantly and...

Read Full Story »

Posted in: Business Technology

Here's Where to Spend Your Money on Digital Transformation in a Post-COVID World

June 17th, 2021 by Garrett Hollander

It's safe to say that the ongoing COVID-19 pandemic has been a challenge for all of us — especially for organizations that were in the process of undergoing their own digital transformations as the lock downs started in March 2020. The need to use...

Read Full Story »

Posted in: Business Technology

The 4 Types of Collaboration Habits That Make Information Security Breaches an Inevitability

June 10th, 2021 by Garrett Hollander

The 4 Types of Collaboration Habits That Make Information Security Breaches an Inevitability

Because of the ongoing COVID-19 pandemic, more people are working remotely than ever before. On the one hand, productivity hasn't really suffered as there are a large number of cloud-based tools that make it possible to be just as productive outside...

Read Full Story »

Posted in: Cybersecurity

Protecting Office Printers and MFPs from Security Risks

May 11th, 2021 by Akisa Matsuda

Protecting Office Printers and MFPs from Security Risks

It is no secret that in this age of new normality, increased security threats such as phishing or ransomware attacks, are a very real concern. Almost all devices are prone to cybersecurity threats and office printers and multifunction devices...

Read Full Story »

Posted in: Cybersecurity

COVID-19 Accelerates Azure Adoption Among Customers

March 31st, 2021 by Function4

A blue 3D cloud that is connected to several laptops interposed over a globe and circuitry imagery, representing the Cloud technology like Microsoft Azure

Leading Managed Technology Services Provider (MTSP) Reports on Spike in Cloud Demand from Small to MidSized Businesses (SMBs) SUGAR LAND, TX - Function4, a leading managed technology services provider (MTSP), announced today that the COVID-19...

Read Full Story »

Posted in: Press Release

5 Reasons to Start Using Cloud Communications Today

January 21st, 2021 by Adam Vervaeke

UCaaS-graphic

Cloud communications adoption was already on the rise even before 2020. The year-over-year market growth rate for Unified Communications as a Service (UCaaS) from 2018 to 2019 was 17.7 percent, with global revenue reaching $10.4 billion in Q4. Today,...

Read Full Story »

Posted in: Phone Systems

Five Key Trends for the Display Industry during the New Normal

January 5th, 2021 by Mehryn Corrigan

Five Key Trends for the Display Industry during the New Normal

The display industry was already going through considerable changes when COVID-19 hit. Now, the pandemic has accelerated that innovation. The following are five key trends based on our new environment that companies in the display space should keep in...

Read Full Story »

Posted in: Business Technology

The Less-Touch Office: Working in the Era of COVID-19

December 3rd, 2020 by Sharp

The Less-Touch Office: Working in the Era of COVID-19

For a time, touchscreen displays were the height of innovation. Forget the old-school buttons; that was so last century. Everyone wanted an interface that reminded them of their iPhone. And that technology is still great – there are many possibilities...

Read Full Story »

Posted in: Business Technology

As COVID Fuels P2P & O2C Digital Transformation, Esker is Perceived as a Unicorn

November 17th, 2020 by Daniel Reeve

COVID Fuels P2P and O2C SaaS Platforms Digital Transformation

There’s a big focus on digital transformation across the entire enterprise. In fact, Information Age calls out that 47% of CIO’s are seeing an increase in the pace of transformation. CFO’s are sharing that they need to protect their organizations and...

Read Full Story »

Posted in: Document Management

How Body Temperature Scanning can make your Facility a Safer Environment

October 22nd, 2020 by Josh Chrisman / Kevin Box

US Healthcare data breaches in the past 12 months

When the COVID crises begin early in 2020 and offices started to reopen, many organizations scrambled to put policies and programs to help keep employees and customers safe. If you've recently walked into any public facility, you've probably experienced...

Read Full Story »

Posted in: Cybersecurity

Cybersecurity Trends to Know in 2020 & How to Protect Your Business

August 5th, 2020 by Ed Hoffmann

Weekly Cyber Attacks

Organizations today face an ever-increasing number of cyber threats. The rapid growth of criminal software development, coupled with the cybersecurity skills shortage, has also contributed to the rise in cyber-attacks. The COVID-19 pandemic has had...

Read Full Story »

Posted in: Cybersecurity