Expert Strategic IT Advice

Bolstering Home Security Through Technology

Just as technology continues to change the way we live our lives in general, the world of home security is also affected by technological progress. Innovations that once would have seemed like the stuff of sci-fi movies now…

Why Americans Must Get Better in Terms of Cyber Security

An overview of the many different reasons why when it comes to cyber security, most Americans should be downright ashamed of themselves. If you spend the majority of your life in the digital world, as millions of people…

Why are we not better at stopping employee theft?

The seriousness of employee theft should lead us to examine what we have been doing and what more we can do How big is the problem? We can’t do everything ourselves, so we need to be able to…

What You NEED to Know

A discussion of the concept of managed services security, including some important factors that your organization MUST be aware of. In an effort to remain technologically competitive in increasingly crowded industries, more and more businesses are turning to…

Weekly Tech Tip: Create a mobile device action plan

Mobile devices can create significant security and management challenges, especially if they hold confidential information or can access the corporate network. Require users to password protect their devices, encrypt their data, and install security apps to prevent criminals…

If Disaster Strikes

Free Ransomware Decryption Tools to Get Your Business Back on Track Free ransomware decryption tools are essential for removing malware from your computer and allowing your system to work once again.   Ransomware will wreak havoc on your…

Credit Card Thieves Move Online – Businesses Fight Back

The increased adoption of chip cards has fraudsters moving online, but businesses are fighting back with improved online security. Security is one of the biggest concerns of our IT clients and for a good reason. The more the…

Weekly Tech Tip: Control physical access to computers and network components

Prevent access or use of business computers by unauthorized individuals. Laptops can be particularly easy targets for theft or can be lost, so lock them up when unattended. Make sure a separate user account is created for each…

How to Choose a Rock Star Quality Data Center

There are a number of questions that colocation service providers must answer before your business signs up for their colo services. Colocation (colo) is a term used to describe a data center facility that lets a business rent…

The Internet of Things: Friend or Foe at the Workplace?

While increases in security and productivity are beneficial, using the IoT also provides for added risks from hackers prowling the internet. The Internet of Things (IoT) is the term used by those in the IT industry as a…