Blog

Guarding Your Network Against Ransomware

Hybrid workforce is here to stay, and some businesses are entirely remote. With the benefits remote employees bring, it also introduces dangers like unprotected network access and greater exposure to ransomware. Over the last several…

Read more

Lessons from a Global Technology Outage

As we saw two weeks ago, our entire world is dependent on technology. The global technology outage precipitated by a faulty software update rollout by Crowdstrike illustrates how a small problem can have enormous repercussions.…

Read more

Disaster Preparedness for Business Recovery

We are entering the seasons of storms (including hurricanes and tornadoes), wildfires and other possible disasters. Even a power outage of short duration can affect your business. What if you ship orders because of an…

Read more

Trends in Cloud Computing

Cloud Computing is a commonly-used term, but the concept has been in the works for decades. In recent decades, cloud has come into its own as a powerful mode of computing used for businesses large,…

Read more

Cloud Trends in 2024

Cloud Computing, long a fundamental part of digital transformation, is seeing even more changes in 2024 and beyond. From hybrid and multi-cloud to the intersection of artificial intelligence and cloud computing, and the security and…

Read more

From Cybersecurity to Cyber-Resilience

Cybersecurity is an ever-present issue, especially in these times of rapid innovation. With this innovation, companies need to remember the importance of protecting systems, devices, networks and data from cyber attack. But what if we…

Read more

Taking a Proactive Approach to Cybersecurity

The state of cybersecurity seems to be getting better, though there’s always room for improvement. According to a recent report by CompTIA, “The State of Cybersecurity 2024”, more companies see the need to take a…

Read more

Protect Your Network Using Defense in Depth

The old defenses against cyberattacks–firewalls, antivirus programs and operating system patches–worked well when the security perimeter was the office. Now that remote work is here to stay and more devices are connected to company networks,…

Read more

From Aware to Prepared

With an increasing number of devices connected to networks, as well as increasingly sophisticated cyber attacks, the threat landscape is incredibly broad. In 2003, the US government and various industries collaborated and created Cybersecurity Awareness…

Read more

Getting Started with A Preparedness Plan

With the recent wildfires in Maui, disaster preparedness is (or should be) once again top of mind. Aside from the physical recovery of businesses, integrity of their data (the lifeblood of the business) is at…

Read more

Cloud Security – A Shared Responsibility

While cloud computing is now a common way to provision computing resources and outsource IT functions, security can be a (perceived) obstacle to adoption. Cloud security can be a shared responsibility, however, between the customer…

Read more

Make Cloud Work for Your Business

Cloud computing, with its many “as a service” offerings, is an option for replacing outdated on-premise infrastructure with a flexible, pay-as-you-go, Internet-based form of computing. Read on to learn about saving costs and supporting business…

Read more

Protecting Your Data Using Cloud Backup

As shown by recent wild weather, one never knows when a natural disaster – or for that matter, a man-made one – might strike. How can you prepare your business to stay running and have…

Read more

Choosing Unified Communications for Your Business

What if, instead of being limited to an in-office phone system with its possibly rough connection and dropped calls, you could experience seamless communication via the cloud? This is possible with Voice Over Internet Protocol…

Read more

Keep From Getting Hooked by Phishing Attacks

Cyber attacks, including phishing attacks, seem to always be in the news these days. Ransomware, malware, data breaches, all are on the rise, with several high-profile attacks in recent years. Even more recently, the failure…

Read more

Assessing Your Network Health

How do you know how strong, secure and flexible your company’s IT network is? Does network traffic move along seamlessly, or get bogged down by insufficient bandwidth or other bottlenecks? Even more important, can you…

Read more

Cyber Resilience About More Than Just Technology

Attacks and threats producing attacks continue to occur. How can your company keep up, and protect itself from financial, legal and other consequences? Cyber resilience, the ability to recover from a cyber attack, involves people…

Read more

Reach Customers with an Email Newsletter

Email is a cornerstone of digital marketing for many businesses, and making a newsletter a part of your email campaign is an inexpensive yet potentially rewarding way to communicate with both present and future customers.…

Read more

Developing a Culture of Cybersecurity

When it comes to cybersecurity, tools and technology help. What can help even more is making cybersecurity a part of company culture, to the point of safety becoming second nature. Read on to learn more…

Read more

What’s On Your Holiday Tech Wish List?

What if you could deduct technological expenses, reducing your taxes and availing your business of new technology?  According to the IRS, you can deduct a portion of your tax expense for products (sometimes even services)…

Read more

The Importance of Threat Intelligence

The month of October, designated Cybersecurity Awareness, has passed. This doesn’t mean threats to your network have disappeared; rather, attacks threaten your company’s network, finances and reputation year-round. Read on to learn more about the…

Read more

Defense in Depth Provides Robust Cybersecurity

Many companies, while they have defenses against cyberattack, still fight to keep ahead of cyberattacks. What if your company is one of these, and could find a better way to protect your technological assets–data, applications,…

Read more

Set High Standards for Cybersecurity

As we know, October is Cybersecurity Awareness month. There is much to be aware of, including how to prepare for an attack, current threats, how well your data is protected, and who has access to…

Read more

Cybersecurity Awareness is Just the Beginning

Readers are likely aware of some of the headline-grabbing cyber attacks in recent years–WannaCry, SolarWinds and Colonial Pipeline, just to name a few. But what about the attacks–and resulting loss of revenue and reputation–that don’t…

Read more

Is 5G in Your Future?

There’s been a lot of hype about 5G, the next generation of cellular technology. It will build on 4G and LTE, offering faster mobile broadband speeds, extremely reliable low-latency connections, and enabling machine-to-machine connections like…

Read more

Perform a Cybersecurity Assessment

How do you know your network and your digital assets are really safe? How can you be sure? Often, it takes a cyber attack and subsequent data breach to learn that your company’s defenses are…

Read more

Use UCaaS While Staying Secure

What if your business could integrate all of its communication tools (telephony, video conferencing, chat and more) over the internet? Unified Communications as a Service (UCaaS) provides cloud computing benefits on a subscription basis, and…

Read more

Getting Started with Zero Trust

Treating even employees like possible intruders may seem harsh. Yet, with so many devices connected to cloud services and the Internet, “zero trust” may be the best way to keep your company safe from cyber…

Read more

Data Security in the Cloud

Cloud computing is used by many businesses, including small to medium-sized companies. Reasons for moving to the cloud include the desire for someone else to operate and maintain infrastructure, and to use a pay-as-you-go subscription…

Read more

Business Benefits of Data Governance

Data collection by businesses is a given, and a great deal of data is collected by a business in the process of performing its functions. In turn, it can help a business perform its role.…

Read more

Keep Your Cyber Shield Up

Threats are everywhere, and not expected to decrease. All over the world, individual and state actors seek to attack businesses of every size–malware and ransomware via phishing emails, denial of service attacks, and other intrusions.…

Read more

The Vital Role of Cybersecurity

We live in interesting times, that’s for sure. With the war in Ukraine in its second month, cyberattack risks are high all over the world. That’s usually the case, though, even in times of relative…

Read more

Business Benefits of Unified Communications as Service

Some years ago, when Unified Communications was just beginning, companies adopting the new technology had to operate and manage infrastructure on the premises. Now, with Unified Communications as a Service (UCaaS), companies can access computing…

Read more

Understanding Disaster Recovery

What would your company do when faced with a disaster? For example, what would happen if a fire damaged your physical headquarters? And what if a cyberattack compromised your network with its data and applications?…

Read more

Be Prepared with an Incident Response Plan

It’s said often that the matter of experiencing a cyberattack is “when,” not “if.” How can your company begin to prepare itself for something that can adversely affect it? According to CompTIA’s article, an Incident…

Read more

Technology Industry Trends in 2022

A number of trends are expected to continue, as well as new ones to develop, in the coming year. These trends will introduce opportunities along with challenges in the IT industry. Read on to learn…

Read more

Joining the Omnichannel Trend

Many pieces comprise the customer experience puzzle, and one key trend is omnichannel, wherein multiple channels are integrated in such a way that a customer can switch seamlessly from one to another including call center,…

Read more

Is Your Network Prepared for Unified Communications?

Unified Communications, or UC, is an Internet-based way to bring together your company’s communications–telephony, web conferencing, email and more. With its benefits, it requires a reliable and secure network to keep your employees connected and…

Read more

Security and Compliance Go Hand in Hand

With the amount of data being generated by businesses the world over, every single day, securing this data is vital. While Government, Industry and other regulations offer compliance to standards, information security reduces business risks…

Read more

Stay Safe from Phishing Attacks

Many threats to your network abound, and often ransomware, malware and viruses enter your network through social engineering, or “phishing” emails. Read on to learn the extent of the problem and how you can keep…

Read more

Cybersecurity Awareness is the First Step

Cybersecurity Awareness month is here, and is a great time to remember the importance of protecting our networks. Cybersecurity is a puzzle with many pieces; training your workers in awareness and best practices for cybersecurity…

Read more

Empower your Communication and Collaboration with UCaaS

Unified Communication as a Service (UCaaS) powers video and voice collaboration and communications on platforms like Microsoft Teams and Zoom, among others. These two popular platforms offer video conferencing, file sharing, and even telephony, which…

Read more

Use Desktop as a Service to Secure Remote Work

More than ever, your employees are working outside the office; this trend is expected to continue. Therefore your company needs the flexibility, reliability and security of a virtual connection. Read on to learn about Desktop…

Read more

Technologies That Support Remote Work

Many companies realized the benefit of remote employees working from home. With companies competing to be the employer of choice, ability to work remotely has become a benefit many job hunters are looking for. With…

Read more

Getting the Best Results from Your Cloud Budget

  While moving to the cloud can be a cash-saving step–in the sense of shifting capital expense for infrastructure to an operational expense–the issue of managing cloud spending remains. Read on to learn more about…

Read more

Keep Your Network Secure Against Cyber Attack

Late last year, as well as more recently, two major cyber attacks occurred–one at SolarWinds via their software platform in December of 2020, and one at Colonial Pipeline just this month. These attacks are even…

Read more

Benefits of Cloud for Small and Medium Business

Small to medium-sized businesses (SMBs) look to get more from their technology spending. The cloud, or Internet-based computing, is an effective way to allocate your technology spend, with its flexible and cost-effective self-service model. Read…

Read more

Benefits of Cloud for Small and Medium Business

Small to medium-sized businesses (SMBs) look to get more from their technology spending. The cloud, or Internet-based computing, is an effective way to allocate your technology spend, with its flexible and cost-effective self-service model. Read…

Read more

Benefits of Cloud for Small and Medium Business

Small to medium-sized businesses (SMBs) look to get more from their technology spending. The cloud, or Internet-based computing, is an effective way to allocate your technology spend, with its flexible and cost-effective self-service model. Read…

Read more

Review Your Strategy For Cloud Security

Many businesses have taken advantage of cloud computing for its benefits–its flexibility, ability to help companies scale use according to demand, and a subscription-based pricing model, among others. When migrating to the Cloud it is…

Read more

Review Your Strategy For Cloud Security

Many businesses have taken advantage of cloud computing for its benefits–its flexibility, ability to help companies scale use according to demand, and a subscription-based pricing model, among others. When migrating to the Cloud it is…

Read more

Role of Your Employees in Cybersecurity

It’s sometimes thought that employees can be a “weak link” in your cybersecurity plan. This need not be so. Rather, your employees–when well-trained in cybersecurity policies and practices–can be your greatest asset. Reason to learn…

Read more

Examine Data Security Policies for Remote Work

Nearly a year after the pandemic closed business offices worldwide, remote work is the norm. Keeping your company’s computer network strong and secure is of great importance. Even now, businesses may want to revisit decisions…

Read more

Technology Planning and Budgeting for 2021

There’s no doubt, 2020 has been a period of massive change. The pandemic has forced businesses to change the way they do business–for example, more staff are working remotely than ever before. Read on to…

Read more

Technology Planning and Budgeting for 2021

There’s no doubt, 2020 has been a period of massive change. The pandemic has forced businesses to change the way they do business–for example, more staff are working remotely than ever before. Read on to…

Read more

Work Anywhere Securely with the Cloud

With remote work a fixture in our economy, technology has risen to meet the challenge. From virtual desktops to unified communications, it is easy to work anywhere.  Read on to learn how technology based in…

Read more

Work Anywhere Securely with the Cloud

With remote work a fixture in our economy, technology has risen to meet the challenge. From virtual desktops to unified communications, it is easy to work anywhere.  Read on to learn how technology based in…

Read more

Trends in Cybersecurity in 2020

This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the…

Read more

Trends in Cybersecurity in 2020

This extraordinary year, with its rapid shift toward remote work force, has brought about changes in the cybersecurity landscape. With the security perimeter widened by use of devices outside the office, businesses are using the…

Read more

Developing A Plan for Data Protection

Data breaches have become so common that they are no longer news. Gartner predicts,  “as more companies look to benefit from data, there will be an inevitable increase in data use and sharing missteps.” However,…

Read more

Developing A Plan for Data Protection

Data breaches have become so common that they are no longer news. Gartner predicts,  “as more companies look to benefit from data, there will be an inevitable increase in data use and sharing missteps.” However,…

Read more

Network Monitoring for Your Business

Your organization’s computer network is the backbone of your IT operations, supporting data and applications such as Voice-Over IP (VoIP), call center and more. Monitoring this network can help save time and money. Read on…

Read more

Network Monitoring for Your Business

Your organization’s computer network is the backbone of your IT operations, supporting data and applications such as Voice-Over IP (VoIP), call center and more. Monitoring this network can help save time and money. Read on…

Read more

What is Infrastructure as a Service (IaaS)?

Cloud computing is now a common way for small to medium-size businesses to provision computing resources for flexible, cost-effective results. Read on to learn about how one cloud model–Infrastructure as a Service or IaaS–can help…

Read more

What is Infrastructure as a Service (IaaS)?

Cloud computing is now a common way for small to medium-size businesses to provision computing resources for flexible, cost-effective results. Read on to learn about how one cloud model–Infrastructure as a Service or IaaS–can help…

Read more

Business Continuity in Challenging Times

It is never too soon to consider what your business will do in the event of a disaster–a cyber attack, a natural disaster, or an epidemic. In the Covid-19 pandemic and subsequent quarantine, many businesses…

Read more

Business Continuity in Challenging Times

It is never too soon to consider what your business will do in the event of a disaster–a cyber attack, a natural disaster, or an epidemic. In the Covid-19 pandemic and subsequent quarantine, many businesses…

Read more

Cybersecurity in Challenging Times

In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors,…

Read more

Cybersecurity in Challenging Times

In these unprecedented times, we spend more time than ever on various devices, using them both for work and recreation. As in other difficult times, heroes rise to the occasion. However, so do bad actors,…

Read more

Requirements for Remote Office

With remote workers becoming the ‘new normal’ in these strange times, remote office security and communication become increasingly important. Read on to learn more about preparing your employees and business for remote work. Remote Office…

Read more

Requirements for Remote Office

With remote workers becoming the ‘new normal’ in these strange times, remote office security and communication become increasingly important. Read on to learn more about preparing your employees and business for remote work.

Read more

Disaster Preparedness – COVID-19

The World Health Organization provides guidance for businesses and employers about the Coronavirus, formally known as COVID-19. Around the world, officials in government, education, and industry are preparing for a prolonged epidemic. That could include…

Read more

Disaster Preparedness – COVID-19

The World Health Organization provides guidance for businesses and employers about the Coronavirus, formally known as COVID-19. Around the world, officials in government, education, and industry are preparing for a prolonged epidemic.

Read more

Business Broadband Internet and Your Network

Business Broadband Internet is the engine powering the operations of businesses worldwide. From cloud services to Unified Communications, broadband is what makes fast, uninterrupted business operations possible. Read on to learn more about broadband’s benefits…

Read more

Business Broadband Internet and Your Network

Business Broadband Internet is the engine powering the operations of businesses worldwide. From cloud services to Unified Communications, broadband is what makes fast, uninterrupted business operations possible.

Read more

Training Your Employees to Help Avoid Cyberattacks

Commonly, employees are thought to be the “weak link” in combating cyberattacks. What if, with thorough training, your employees become your best resource in fighting attacks like phishing, ransomware and malware, and social engineering attacks?

Read more

Training Your Employees to Help Avoid Cyberattacks

Commonly, employees are thought to be the “weak link” in combating cyberattacks. What if, with thorough training, your employees become your best resource in fighting attacks like phishing, ransomware and malware, and social engineering attacks?…

Read more

Moving Beyond Windows 7 End of Support

With the end of service for Windows 7, businesses need to find another solution. While Windows 7 will not stop working, it won’t be as secure, and the lack of updates and patches will make…

Read more

Moving Beyond Windows 7 End of Support

With the end of service for Windows 7, businesses need to find another solution. While Windows 7 will not stop working, it won’t be as secure, and the lack of updates and patches will make…

Read more

Emergent Trends Expected to Change the Tech Landscape

The 2020s–this year and beyond–will be a time of great disruption created by emerging technology. Not only will technologies like hyper-automation, artificial intelligence and human augmentation change the way people interact with technology, it will…

Read more

Emergent Trends Expected to Change the Tech Landscape

The 2020s–this year and beyond–will be a time of great disruption created by emerging technology. Not only will technologies like hyper-automation, artificial intelligence and human augmentation change the way people interact with technology, it will…

Read more

Upgrading from Windows 7 and Windows 2008

On January 14, 2020, Windows 7 and Server 2008 will reach the end of their life cycle, with operating system patches and updates no longer available. Networks and connected devices without an upgrade will be…

Read more

Upgrading from Windows 7 and Windows 2008

On January 14, 2020, Windows 7 and Server 2008 will reach the end of their life cycle, with operating system patches and updates no longer available. Networks and connected devices without an upgrade will be…

Read more

Network Compliance is for Everyone

With so many organizations generating data in the course of daily business, it’s more important than ever to protect it from loss or compromise. Data breaches are frequently in the news, and aside from the…

Read more

Network Compliance is for Everyone

With so many organizations generating data in the course of daily business, it’s more important than ever to protect it from loss or compromise. Data breaches are frequently in the news, and aside from the…

Read more

Cloud Migration Considerations

With companies seeking the best return on investment for their technology expenditure, Cloud migration, or, in some cases, migrating to a different Cloud environment or changing to a new Cloud provider, can be a good…

Read more

Cloud Migration Considerations

With companies seeking the best return on investment for their technology expenditure, Cloud migration, or, in some cases, migrating to a different Cloud environment or changing to a new Cloud provider, can be a good…

Read more

Monitor Your Network to Keep it Safe and Thriving

With technology ever changing and progressing, more is demanded from your network than ever before.  Cloud computing, along with multiple applications and huge amounts of data, demand a strong and healthy network. Read on to…

Read more

Monitor Your Network to Keep it Safe and Thriving

With technology ever changing and progressing, more is demanded from your network than ever before.  Cloud computing, along with multiple applications and huge amounts of data, demand a strong and healthy network. Read on to…

Read more

Hybrid Cloud Considerations

Cloud computing, despite varying levels of adoption, has become a common way for a business to avail itself of computing resources without having to maintain expensive infrastructure. Companies can use varying levels of resources, scaling…

Read more

Hybrid Cloud Considerations

Cloud computing, despite varying levels of adoption, has become a common way for a business to avail itself of computing resources without having to maintain expensive infrastructure. Companies can use varying levels of resources, scaling…

Read more

Train Your People to Fight Cyberattacks

With the advance of technology, many benefits have come to businesses—commerce taking place twenty-four hours a day and the ability to have meetings with workers half a world away, among others—but cybercriminals have learned to…

Read more

Train Your People to Fight Cyberattacks

With the advance of technology, many benefits have come to businesses—commerce taking place twenty-four hours a day and the ability to have meetings with workers half a world away, among others—but cybercriminals have learned to…

Read more

Consider Unified Communications for Your Business

Imagine being able to integrate business class phone systems, collaboration and virtual meetings and your contact call center all within a secure and reliable unified communications suite. This means you can work anywhere, get customer…

Read more

Consider Unified Communications for Your Business

Imagine being able to integrate business class phone systems, collaboration and virtual meetings and your contact call center all within a secure and reliable unified communications suite. This means you can work anywhere, get customer…

Read more

Cybersecurity Risks and Preventive Action

Even with so much information available about how to protect your network and business from data breaches and cyber attacks, a surprising number of businesses aren’t prepared. Read on to learn about how to make…

Read more

Cybersecurity Risks and Preventive Action

Even with so much information available about how to protect your network and business from data breaches and cyber attacks, a surprising number of businesses aren’t prepared. Read on to learn about how to make…

Read more

The Importance of a Business Continuity Plan

With some parts of the country heading into tornado season, and with natural and man-made disasters a possibility anywhere, there’s no time like now to consider how to keep your business running in the event…

Read more

The Importance of a Business Continuity Plan

With some parts of the country heading into tornado season, and with natural and man-made disasters a possibility anywhere, there’s no time like now to consider how to keep your business running in the event…

Read more

Keep Your Network in Compliance, and Healthy Too

A company’s network is the backbone of its IT infrastructure, depended upon for connection to customers, potential customers, vendors and employees, as well as public and private cloud infrastructure. Not only that, your network’s health…

Read more

Keep Your Network in Compliance, and Healthy Too

A company’s network is the backbone of its IT infrastructure, depended upon for connection to customers, potential customers, vendors and employees, as well as public and private cloud infrastructure. Not only that, your network’s health…

Read more

The Importance of Data Protection

Cyber attacks and data breaches are regularly in the news, and often come with a loss or exposure of customers’ data and a loss of reputation to the business. Large, well-known businesses are often in…

Read more

The Importance of Data Protection

Cyber attacks and data breaches are regularly in the news, and often come with a loss or exposure of customers’ data and a loss of reputation to the business. Large, well-known businesses are often in…

Read more

Tips to Avoid Security Breaches

According to a recent CompTIA report, even though people know what to do to avoid security breaches, they don’t always put this knowledge into practice. Employees can, however, take advantage of cybersecurity training in the…

Read more

Tips to Avoid Security Breaches

According to a recent CompTIA report, even though people know what to do to avoid security breaches, they don’t always put this knowledge into practice. Employees can, however, take advantage of cybersecurity training in the…

Read more

Hacking Hazards to Watch in 2019

The more technology advances, the more businesses must be aware of security breaches and hacker attacks. Where are hackers likely to strike in 2019, and how can you protect your business? Read on to learn…

Read more

Hacking Hazards to Watch in 2019

The more technology advances, the more businesses must be aware of security breaches and hacker attacks. Where are hackers likely to strike in 2019, and how can you protect your business? Read on to learn…

Read more

Tackling Security in the Cloud

Over the last ten to fifteen years, the cloud has gone from new technology to accepted–and by many, embraced–fact. According to a recent CompTIA study, cloud computing is now a critical part of today’s IT…

Read more

Tackling Security in the Cloud

Over the last ten to fifteen years, the cloud has gone from new technology to accepted–and by many, embraced–fact. According to a recent CompTIA study, cloud computing is now a critical part of today’s IT…

Read more

What is Cybersecurity and Why it Matters

Over the last several years, we have heard about high-profile cyber attacks and data breaches. However, large companies are not the only ones subject to such attacks. Small to medium businesses are at risk as…

Read more

What is Cybersecurity and Why it Matters

Over the last several years, we have heard about high-profile cyber attacks and data breaches. However, large companies are not the only ones subject to such attacks. Small to medium businesses are at risk as…

Read more

Is Blockchain Coming to Your Neighborhood?

Since 2008, the cryptocurrency Bitcoin has been in the news. Not only that, its underlying technology called Blockchain has become better known as an emerging technological trend. According to a COMPTIA brief citing research by…

Read more

Is Blockchain Coming to Your Neighborhood?

Since 2008, the cryptocurrency Bitcoin has been in the news. Not only that, its underlying technology called Blockchain has become better known as an emerging technological trend. According to a COMPTIA brief citing research by…

Read more

The Business Risks of Cybersecurity

With daily business processes as well as innovative new technologies like the Cloud Computing, keeping your company’s data and systems safe is a top priority. Damages from cybercrime, in the form of lost revenue, continue…

Read more

The Business Risks of Cybersecurity

With daily business processes as well as innovative new technologies like the Cloud Computing, keeping your company’s data and systems safe is a top priority. Damages from cybercrime, in the form of lost revenue, continue…

Read more

Who’s Monitoring Your Network?

A business’ network is relied upon heavily for many daily functions, and there are many places problems can occur. According to CompTIA, four leading security concerns are attacks from ransomware and malware, viruses that can…

Read more

Who’s Monitoring Your Network?

A business’ network is relied upon heavily for many daily functions, and there are many places problems can occur. According to CompTIA, four leading security concerns are attacks from ransomware and malware, viruses that can…

Read more

Considering Cloud Computing?

Cloud computing has become more and more popular over the last several years, with that popularity continuing into 2018 and 2019. According to a report by the International Data Corporation (IDC), public cloud services will…

Read more

Considering Cloud Computing?

Cloud computing has become more and more popular over the last several years, with that popularity continuing into 2018 and 2019. According to a report by the International Data Corporation (IDC), public cloud services will…

Read more

Creating A Culture of Security

With more data than ever being collected, analyzed, managed, and stored, keeping the data as well as the business’s systems secure is a priority leading into 2018, and beyond. According to statistics, more than 50%…

Read more

Creating A Culture of Security

With more data than ever being collected, analyzed, managed, and stored, keeping the data as well as the business’s systems secure is a priority leading into 2018, and beyond. According to statistics, more than 50%…

Read more

The Business Benefits of Cloud Computing

In little more than a decade, cloud computing has changed from a cutting-edge technology to a well-established part of the IT function in many businesses. Cloud computing offers the benefits of cost savings and access…

Read more

The Business Benefits of Cloud Computing

In little more than a decade, cloud computing has changed from a cutting-edge technology to a well-established part of the IT function in many businesses. Cloud computing offers the benefits of cost savings and access…

Read more

The Human Side of Network Security

As Technology grows, so does the complexity of threats to your network–hackers infiltrating your network and stealing passwords, infection of your network with malware, phishing schemes, and even cybercriminals masquerading as your own IT staff,…

Read more

The Human Side of Network Security

As Technology grows, so does the complexity of threats to your network–hackers infiltrating your network and stealing passwords, infection of your network with malware, phishing schemes, and even cybercriminals masquerading as your own IT staff,…

Read more

Is the Public Cloud Right for Your Business?

Migration to the cloud has become more common over the years, with more and more companies moving to the Cloud each day. Benefits of the Cloud extend to many if not all business systems—Communication and…

Read more

Is the Public Cloud Right for Your Business?

Migration to the cloud has become more common over the years, with more and more companies moving to the Cloud each day. Benefits of the Cloud extend to many if not all business systems—Communication and…

Read more

Planning for Disaster Recovery

We hear in the news every day about natural disasters such as fires, floods, storms and even earthquakes, and know the damage they cause. But what about the potential consequences for your business? What if…

Read more

Keeping Your Network Secure

A network is only as strong as its weakest link, and if that weakest link is your security, that can compromise the revenue and the reputation of your business. Attacks just from ransomware have increased…

Read more

Keeping Your Network Secure

A network is only as strong as its weakest link, and if that weakest link is your security, that can compromise the revenue and the reputation of  your business. Attacks just from ransomware have increased…

Read more

Keeping Network Expenses in Check

Your network is the backbone of your technology infrastructure, enabling your business to run smoothly. But are you using it in the most cost-effective manner, getting the most for your technology budget? Read on to…

Read more

Keeping Network Expenses in Check

Your network is the backbone of your technology infrastructure, enabling your business to run smoothly. But are you using it in the most cost-effective manner, getting the most for your technology budget? Read on to…

Read more

Is Your Network Ready for Business?

Your network is under continuous pressure to keep up with the growth of your business. Broadband networks providing instant connectivity are a core requirement for most businesses. Your network needs to provide fast access to…

Read more

Is Your Network Ready for Business?

Your network is under continuous pressure to keep up with the growth of your business. Broadband networks providing instant connectivity are a core requirement for most businesses.  Your network needs to provide fast access to…

Read more

Aim for the Cloud

The time may be right for your business to move to the Cloud. With its many advantages, including cost savings, security and flexibility, cloud computing also gives businesses a competitive advantage, allowing employees to work…

Read more

Aim for the Cloud

The time may be right for your business to move to the Cloud. With its many advantages, including cost savings, security, and flexibility, cloud computing also gives businesses a competitive advantage, allowing employees to work…

Read more

Cloud Adoption and Software as a Service (SaaS)

Most businesses today have adopted some form of  Cloud Computing and Software as a Service (SaaS) to run their business. According to a recent article by Forester Research,“SaaS Improves Business Results Due To Greater Innovation…

Read more

Cloud Adoption and Software as a Service (SaaS)

Most businesses today have adopted some form of  Cloud Computing and Software as a Service (SaaS) to run their business. According to a recent article by Forrester Research,“SaaS Improves Business Results Due To Greater Innovation…

Read more

Closing the Door on Cyber Crime

Businesses today are under constant attack from Cyber Criminals. Ransomware,  including the WannaCry Virus , is an example of a top threat to avoid. With the risk of lost data, lost productivity and lost reputation,…

Read more

Closing the Door on Cyber Crime

Businesses today are under constant attack from Cyber Criminals. Ransomware,  including the WannaCry Virus , is an example of a top threat to avoid. With the risk of lost data, lost productivity and lost reputation,…

Read more

Migrating to the Cloud? Ready for Takeoff?

Companies large and small have migrated to the Cloud Computing model for economic and competitive advantage. As you evaluate your options, here are some questions to ask that will help you get ready. On-Premise vs.…

Read more

Technology Trends you Will Hear About in 2018

According to technology research firm Gartner Group, technology spending is expected to grow to $3.7 Trillion dollars in 2018. Communications Services ($1.387 billion) and IT Services ($931 billion) make up the majority of spending. In…

Read more

Technology Trends you Will Hear About in 2018

According to technology research firm Gartner Group, technology spending is expected to grow to $3.7 Trillion dollars in 2018. Communications Services ($1.387 billion) and IT Services ($931 billion) make up the majority of spending. In…

Read more

What’s in Your Technology Budget Next Year?

Many companies start their budget this time of year. As you are thinking about strategic investments, consider how you can leverage technology to improve customer service, make your employees more productive, and possibly save money.…

Read more

What’s in Your Technology Budget Next Year?

Many companies start their budget this time of year. As you are thinking about strategic investments, consider how you can leverage technology to improve customer service, make your employees more productive, and possibly save money.…

Read more

What’s in Your Data Center?

Most experts agree we will create more Data this year than in all prior years combined. According to research firm IDG the world will create 163 zettabytes of data a year by 2025. It is…

Read more

What’s in Your Data Center?

Most experts agree we will create more Data this year than in all prior years combined. According to research firm IDG the world will create 163 zettabytes of data a year by 2025. It is…

Read more

The IoT Security Challenge

The internet of Things (IoT) is much-talked-about technology. Driven by low-cost sensors, ubiquitous connectivity and updates to the Internet Protocol (IP), IoT is rapidly being adopted. Research firm Gartner expects over 8 billion devices connected…

Read more

The IoT Security Challenge

The internet of Things (IoT) is much-talked-about technology. Driven by low-cost sensors, ubiquitous connectivity and updates to the Internet Protocol (IP), IoT is rapidly being adopted. Research firm Gartner expects over 8 billion devices connected…

Read more

Considering Cloud Security

According to a recent research report “Assessing the Cloud Security Landscape” by the Computing Technology Industry Association (CompTIA), 85% of business owners and IT professionals participating in a survey responded that they are Confident in…

Read more

Considering Cloud Security

According to a recent research report “Assessing the Cloud Security Landscape” by the Computing Technology Industry Association (CompTIA), 85% of business owners and IT professionals participating in a survey responded that they are Confident in…

Read more

How is Your Network Health?

Your network is the backbone of your IT Infrastructure. Your network health is also an integral part of your defense against Cyber threat. Cloud Computing, Communications and Collaboration, Data Protection, and Digital Transformation put more…

Read more

How is Your Network Health?

Your network is the backbone of your IT Infrastructure. Your network health is also an integral part of your defense against Cyber threat. Cloud Computing, Communications and Collaboration, Data Protection, and Digital Transformation put more…

Read more

Digital Marketing – Where to Start?

According to Forbes Magazine, in 2017 “Digital Marketing has Taken the Marketing Industry by Storm.” There is a wide array of options for digital marketing: content marketing, big data, email marketing, live streaming video, mobile…

Read more

Digital Marketing – Where to Start?

According to Forbes Magazine, in 2017 “Digital Marketing has Taken the Marketing Industry by Storm.” There is a wide array of options for digital marketing: content marketing, big data, email marketing, live streaming video, mobile…

Read more

Getting the Most from Cloud Computing

Cloud Computing adoption continues to outpace the growth rate of total IT spending. According to research firm Gartner, the market for public cloud services will continue expanding, with year-over-year revenue growth of 17.3%. Compare this…

Read more

3 Technology Trends Driving Business Outcomes

Many businesses turn to technology to find ways to reduce costs and overhead. Technology trends–Software as a Service, Internet of Things, Software Defined Wide Area Networking, marketing automation, and Cloud-based communications and collaboration–are top of…

Read more

What’s Your Cloud Budget?

Most companies rely on Cloud Computing for their business. Popular Software as a Service (SaaS) applications including Voice over IP (VoIP), Hosted Email, Sales Force Automation (SFA), and Customer Relationship Management (CRM) can all be…

Read more

How to Avoid Being a Ransomware Hostage

Ransomware, spyware, phishing schemes, and other Cyber attacks are commonplace in today’s world of technology. According to a recent article in Forbes, ransomware attacks grew at an accelerated pace in 2016 with reports of 638…

Read more

Migrating to the Cloud with Confidence

More and more companies are migrating to Cloud Computing to gain competitive advantage and reduce capital expense. According to CompTIA’s 9th annual Security Trends study, companies reported over 80% net usage of Cloud Computing. Over…

Read more

Is Your Network Ready for Cloud Backup?

Ransomware, Privacy Breach, Compliance requirements and Business Continuity make the case to protect your company’s data. Cloud backup and Disaster Recovery as a Service (DRaas) require reliable network access to ensure your IT assets are…

Read more

What are Managed Services and Why Should I Care?

A managed services provider (MSP) takes on the responsibility for a company’s technology and infrastructure by proactively providing a defined set of IT services for a fixed monthly fee. This approach is preferred by businesses…

Read more

What are Managed Services and Why Should I Care?

A managed services provider (MSP) takes on the responsibility for a company’s technology and infrastructure by proactively providing a defined set of IT services for a fixed monthly fee. This approach is preferred by businesses…

Read more

Rethinking Wide Area Networking

There is a shift in how businesses use technology. New applications, including Voice over IP VoIP phone systems, Cloud Based Email, File Sync & Sharing all require solid network infrastructure. According to a recent report…

Read more

Rethinking Wide Area Networking

There is a shift in how businesses use technology. New applications, including Voice over IP VoIP phone systems, Cloud Based Email, File Sync & Sharing all require solid network infrastructure. According to a recent report…

Read more

Considerations for Cloud Migration

The market for Cloud Computing is maturing. According to Trends in Cloud Computing, a recent research report by the Computing Technology Industry Association (CompTIA), 90 percent claim using some form of Cloud Computing. In fact,…

Read more

Considerations for Cloud Migration

The market for Cloud Computing is maturing. According to Trends in Cloud Computing, a recent research report by the Computing Technology Industry Association (CompTIA), 90 percent claim using some form of Cloud Computing. In fact,…

Read more

Internet of Things: Reality or Myth

Technology is always evolving, with new ways to benefit always on the horizon. Like Mobility and Cloud, Internet of Things (Iot) is a shift in computing that will impact many businesses and organizations within the…

Read more

Internet of Things: Reality or Myth

Technology is always evolving, with new ways to benefit always on the horizon. Like Mobility and Cloud, Internet of Things (Iot) is a shift in computing that will impact many businesses and organizations within the…

Read more

Cyber Threats You Should Protect Against

Defending against Cyber threats is no easy task. Understanding the risks and designing a defense strategy are important steps in protecting yourself from Malicious actors and Cybercriminals. Staying current on Operating System and Application Patches,…

Read more

What’s Top of Mind in the Boardroom

I was privileged to attend a peer meeting with other Audit Committee chairs to discuss important topics for the Board of Directors during 2017. Some of the main topics that concern board members include global…

Read more

Cyber Threats You Should Protect Against

Defending against Cyber threats is no easy task. Understanding the risks and designing a defense strategy are important steps in protecting yourself from Malicious actors and Cybercriminals. Staying current on Operating System and Application Patches,…

Read more

Cyber Threats You Should Protect Against

Defending against Cyber threats is no easy task. Understanding the risks and designing a defense strategy are important steps in protecting yourself from Malicious actors and Cybercriminals. Staying current on Operating System and Application Patches,…

Read more

Cybersecurity is Everybody’s Business

It is no surprise, technology flattens the world for many businesses. What’s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to…

Read more

Cybersecurity is Everybody’s Business

It is no surprise, technology flattens the world for many businesses. What’s more, nearly every business sector finds it necessary to collect, maintain, analyze, and monetize user data. Many think Cybersecurity risks only apply to…

Read more

Can You Afford a Data Loss?

According to the technology industry research firm Gartner Group, ninety percent of companies that experience data loss go out of business within two years. Countless studies indicate the longer the downtime, the greater the risk.…

Read more

Can You Afford a Data Loss?

According to the technology industry research firm Gartner Group, ninety percent of companies that experience data loss go out of business within two years. Countless studies indicate the longer the downtime, the greater the risk.…

Read more

Technology Trends for 2017

It’s that time of year when many businesses are setting goals and budgets for next year. This is a good time to reflect on the impact technology can have on your business. While Cloud Computing…

Read more

Technology Trends for 2017

It’s that time of year when many businesses are setting goals and budgets for next year. This is a good time to reflect on the impact technology can have on your business. While Cloud Computing…

Read more

Tips for Reducing Telecom Expense

Businesses today rely on resilient network connectivity to ensure employee communications, collaboration, and productivity. Applications including Voice over IP (VoIP), Hosted Contact Center, Cloud Backup, and more, need a bulletproof telecom network. What’s more, for…

Read more

Tips for Reducing Telecom Expense

Businesses today rely on resilient network connectivity to ensure employee communications, collaboration, and productivity. Applications including Voice over IP (VoIP), Hosted Contact Center, Cloud Backup, and more, need a bulletproof telecom network. What’s more, for…

Read more

Proactive Networking Monitoring: What & Why

Your business relies more and more on healthy network infrastructure. Migration to Cloud, Compliance and IT Security all fuel the case to proactively monitor your network health. By proactively scanning your network, you can identify…

Read more

Proactive Networking Monitoring: What & Why

Your business relies more and more on healthy network infrastructure. Migration to Cloud, Compliance and IT Security all fuel the case to proactively monitor your network health. By proactively scanning your network, you can identify…

Read more

Business Continuity Essentials

Business owners know there are a number of threats to business continuity. Next to employees, your IT systems and their data may be your most valuable assets. Your business may fall prey to Cyber attack…

Read more

Business Continuity Essentials

Business owners know there are a number of threats to business continuity. Next to employees, your IT systems and their data may be your most valuable assets. Your business may fall prey to Cyber attack…

Read more

Cloud Computing Defined

The demand for Cloud Services continues to climb. Recent forecasts from International Data Corporation (IDC) predict worldwide spending on public Cloud services will grow at a 19.4% compound annual growth rate (CAGR) – from nearly…

Read more

Cloud Computing Defined

The demand for Cloud Services continues to climb. Recent forecasts from International Data Corporation (IDC) predict worldwide spending on public Cloud services will grow at a 19.4% compound annual growth rate (CAGR) – from nearly…

Read more

Achieving Network Peace of Mind

By proactively monitoring and managing your Network infrastructure, you can avoid the hassles of downtime due to bottlenecks, security intrusions and more. By having the latest data at your fingertips, you can make the best…

Read more

Achieving Network Peace of Mind

By proactively monitoring and managing your Network infrastructure, you can avoid the hassles of downtime due to bottlenecks, security intrusions and more. By having the latest data at your fingertips, you can make the best…

Read more

Are Public Cloud Services Right for Your Business?

Every day more companies realize the cloud offers them brand new ways to solve their business problems. Public Cloud services are available for a wide range of solutions, including Communications and Collaboration, CRM, Contact Center,…

Read more

Are Public Cloud Services Right for Your Business?

Every day more companies realize the cloud offers them brand new ways to solve their business problems. Public Cloud services are available for a wide range of solutions, including Communications and Collaboration, CRM, Contact Center,…

Read more

Tackling Cloud Security

Security is always top of mind with businesses migrating to the Cloud. Cloud Services are rapidly being adopted by most businesses today. According to IDC, the worldwide public cloud services market reached $45.7 billion in…

Read more

Tackling Cloud Security

Security is always top of mind with businesses migrating to the Cloud. Cloud Services are rapidly being adopted by most businesses today. According to IDC, the worldwide public cloud services market reached $45.7 billion in…

Read more

The Benefits of Fixed-Price IT Managed Services

More and more, we hear of security breaches that are derailing business’s activities, whether such problems are malicious software (“malware”) designed to grab privacy information from an employee, a computer crash or even a natural…

Read more

The Benefits of Fixed-Price IT Managed Services

More and more, we hear of security breaches that are derailing business’s activities, whether such problems are malicious software (“malware”) designed to grab privacy information from an employee, a computer crash or even a natural…

Read more

Is Your Network Ready for the Cloud?

Moving to the Cloud requires a fast, reliable network to ensure high availability to Cloud applications and their data. Critical systems including Cloud backup, SaaS, VDI, VoIP and other critical systems need consistent broadband access…

Read more

Is Your Network Ready for the Cloud?

Moving to the Cloud requires a fast, reliable network to ensure high availability to Cloud applications and their data. Critical systems including Cloud backup, SaaS, VDI, VoIP and other critical systems need consistent broadband access…

Read more

Five Tips on Password Protection

Should you care about how your employees protect their personal passwords? Depending on your password policy in the workplace, your employees may create passwords based on familiar passwords they use for personal use. Cybercriminals often…

Read more

Five Tips on Password Protection

Should you care about how your employees protect their personal passwords?  Depending on your password protection policy in the workplace, your employees may create passwords based on familiar passwords they use for personal use.  Cybercriminals…

Read more

Technology Outlook for 2016

What drivers will shape 2016 technology trends? Businesses using customer facing technology for competitive advantage will fuel demand for Cloud Computing, in particular, Software as a Service. The Internet of Everything will amplify the number…

Read more

Technology Outlook for 2016

What drivers will shape 2016 technology trends? Businesses using customer facing technology for competitive advantage will fuel demand for Cloud Computing, in particular, Software as a Service.  The Internet of Everything will amplify the number…

Read more

Is Your Business PCI Compliant?

Payment Card Industry Data Security Standard (PCI DSS) is a common sense standard based on good IT Security policy. The objective is to protect customer credit card information from compromise. With the holiday season upon…

Read more

Is Your Business PCI Compliant?

Payment Card Industry Data Security Standard (PCI DSS) is a common sense standard based on good IT Security policy. The objective is to protect customer credit card information from compromise. With the holiday season upon…

Read more

Mobile Hotspots – Is Your Business At Risk?

With almost one billion mobile connections in place, it is easy to understand why these devices are targeted by hackers. Employees connecting at Starbucks, in airports, on planes and in hotels open themselves up to…

Read more

Does Your Business Need Network Monitoring?

According to a recent Trends in Information Security report by CompTIA, malware, hacking, privacy and data loss/leakage top the list of serious concerns over security threats. Companies large and small have been victims of these…

Read more

Is Network Security Your Priority?

Everyday there are reports of businesses being targeted with security attacks. The list of large companies being hit is long. Small businesses are equally vulnerable to security hackers and may be less resilient. To say…

Read more

Is Your Network Ready for Windows 10?

Since the July release of Windows 10, the tech world has been talking about the latest update from Microsoft. According to Microsoft, within one day of its release, more than 14 million users had downloaded…

Read more

Is Your Head in the Cloud?

Are you ready to embrace the benefits of the Cloud? Whether your company is ready to acquire new software-as-a-service (SaaS) capabilities or in need of infrastructure upgrades via infrastructure-as-a-service (IaaS), Cloud has now reached new…

Read more

Wearables are Fashionable, But Are They Secure?

Wearable technology, especially Smartwatches, including the Apple Watch, the Samsung Gear, and the Microsoft Band, are all the rage and are expected to become even more popular over the coming years. According to the International…

Read more

Is Your Business Ready for a Disaster?

Disaster recovery and business continuity planning are processes that help organizations prepare for disruptive events—this might include a hurricane, an earthquake, a power outage caused by a fire or a cyber attack by hackers.

Read more

Windows 10 – Best Windows Ever?

The new Windows 10 operating system is purported to be the best Windows ever. The combination of ease of use for new users, automatic updates, and built in security features is causing small to medium…

Read more

Moving to the Cloud: The Advantages

According to the International Data Corporation (IDC), total public IT Cloud services (SaaS, PaaS, and IaaS) spending will reach $127 billion in 2018. Compared to the 4.1% compound annual growth rate the IT market will…

Read more

Protect Your Organization from Ransomware

It’s a moment every business owner dreads. A message appears on your organization’s computer screen alerting you that your files have been encrypted and the only way to access them is by paying a ransom.…

Read more

The Cloud: The 3rd Platform of Computing

Around 2008, the IT industry started to experience a massive shift in traditional computing. The International Data Corporation (IDC) began referring to this change as the “3rd platform.” The 3rd platform is built on the…

Read more

Beware of Cryptolocker

Imagine you are on your personal or work computer, and you receive a seemingly innocuous email from a trusted source, such as your bank, your tax office, or even a friend. The source asks you…

Read more

FCC Approves Net Neutrality Rules

After a landmark vote on February 26, The Federal Communications Commission officially classified Internet providers as public utilities. The new net neutrality rules were approved 3 to 2 among party lines. The rules ban high-speed…

Read more

Bandwidth Bottleneck Coming to an End?

It is predicted that by 2017, there will be around 268 billion app downloads. The average person already uses 26 different apps per month. This growth is clearly driven by the younger work force, who…

Read more

Bandwidth Bottleneck Coming to an End?

It is predicted that by 2017, there will be around 268 billion app downloads. The average person already uses 26 different apps per month. This growth is clearly driven by the younger work force, who…

Read more

Bandwidth Bottleneck Coming to an End?

It is predicted that that by 2017, there will be around 268 billion app downloads. The average person already uses 26 different apps per month. This growth is clearly driven by the younger work force,…

Read more

Why the Cloud Isn’t Going Away

Cloud Computing is only beginning its growth and progression; more than half of all businesses have already implemented Cloud Computing in some way or another into their day-to-day operations. Whether you need improved security, lowered…

Read more

Why the Cloud Isn’t Going Away

Cloud Computing is only beginning its growth and progression; more than half of all businesses have already implemented Cloud Computing in some way or another into their day-to-day operations. Whether you need improved security, lowered…

Read more

Why the Cloud Isn’t Going Away

Cloud Computing is only beginning its growth and progression; more than half of all businesses have already implemented Cloud Computing in some way or another into their day-to-day operations. Whether you need improved security, lowered…

Read more

The Growing Importance of Mobile Security

According to a report by CompTia, 28% of businesses view security as a significantly higher priority today compared to two years ago, and an even greater percentage of businesses expect the importance of security to…

Read more

Is Cloud Computing Secure?

In the early days of Cloud computing, the common perception was that the cloud automatically opens systems to new, catastrophic risks. When weighing the pros and cons of moving to the Cloud, business owners assumed…

Read more

How to Engage Future Customers

An effective marketing strategy can often make the difference between making prospects customers and driving them away. It is important to engage your customers early and gain their trust. The key to a strong marketing…

Read more

Technology Outlook for 2015

There are many things on our minds as we enter the New Year. For those of you running a business, a question on the forefront of your mind should be: What can we expect from…

Read more

Do You Fully Understand the Cloud?

In just the past few years, it has become evident that the topic of cloud computing has shifted from a potential game changer to an essential ingredient of modern IT. For those moving down the…

Read more

Is Your Free Website Really Free?

Is your free website delivering maximum marketing results, or is your company spending far too much time and money into developing and updating a website that doesn’t lead to new customers? Here are the most…

Read more

Do You Have an Effective BYOD Policy?

According to new IDC data, vendors shipped 327.6 million smartphones in the third quarter, an increase of 25.2%, when compared to the same quarter last year. This means that global smartphone shipments have topped 300…

Read more

Costs of Data Breaches Up 23% from Last Year

A new report from the Ponemon Institute, an organization that publishes the annual “Global Report on the Cost of Cyber Crime,” recently announced that the cost of a data breach has jumped 23% from last…

Read more

Steps to Follow When Migrating to the Cloud

Many small to medium sized businesses are migrating to the Cloud – backups, better security, regulations, security, and the Cloud ensure that your company is always up to date without having to continually invest more…

Read more

It’s Time to Take Cloud Security Seriously

While cloud security concerns are top of mind with many business owners, the benefits of the cloud far outweigh the risks. Nevertheless, as companies deploy cloud computing, taking cloud security seriously will ensure a smooth…

Read more

Mobile Device Management

The transition to the pervasive use of mobile devices in and outside of the workplace has been both an advantage and disadvantage for small to medium sized businesses. On the one hand, when employees use…

Read more

3 Things You Need to Know about Broadband Internet

Broadband Internet is all about speed and reliability. In a nutshell, “broadband” refers to a very fast and persistent connection to the Internet. For business – Cloud computing, web conferencing and hosted voice solutions –…

Read more

Bright Outlook for Cloud Computing

According to CompTIA’s IT Industry Outlook 2014, cloud computing is even more on the rise since last year. As Generation Y (20-34 years old) infiltrates the work force and members of the Baby Boomer generation…

Read more

Can You Survive a Network Security Attack

Businesses are under constant attack from a variety of network security threats. Cybercriminals hack databases for passwords for unauthorized access to your network. Undetected Malicious software (malware) can trap and forward passwords. Viruses can infect…

Read more

Is Your Network Ready for Cloud Computing?

Cloud-based computing adoption is increasing among many businesses. According to the Computing Technology Industry Association (CompTIA) Annual trends in Cloud Computing study, 60% of business owners reported having 30% or more of their IT Systems…

Read more

Will Smartphones and Tablets Kill the PC?

With Windows XP support ending soon for millions of PCs, many companies are considering a variety of replacement strategies. The adoption of smartphones and tablets is clearly on the rise. According to IDC, PC shipments…

Read more

Windows XP Updates to End on April 8

According to Microsoft, support is ending for Windows XP after April 8, 2014. Technical assistance, including automatic updates that help protect your PC, will no longer be available after this date. Microsoft will also stop…

Read more

Why You Need a Bullet Proof Computer Network

Your Computer Network is the information pipeline of your business. But what if your network goes down? If your computer network is not operating properly, you may lose access to critical applications and their data.…

Read more

Avoiding Pitfalls to Cloud Computing Migration

It seems a majority of companies are adopting Cloud Computing as a significant portion of their IT infrastructure. According the Computing Technology Industry Association (CompTIA) 4th Annual Trends in Cloud Computing, sixty percent of companies…

Read more

Mobile Security: Why Should I Care?

Mobile security is top of mind when it comes to concerns for IT Managers. According to the Computing Technology Industry Association (CompTIA) risk of loss is the number one concern related to Mobile security. For…

Read more

Target Privacy Data Breach: Part 2

Target Retailers were just involved in the second largest credit card data breach in United States history. Today Target announced the data breach that occurred over Thanksgiving weekend now exposes upwards of 70 million credit…

Read more

Cyber Attack Target

Target Retailers were just involved in the second largest credit card breach in United States history. A cyber security attack occurred over Thanksgiving weekend, which exposed upwards of 40 million credit and debit cards users.…

Read more

2013 Technology in Review

As always, a lot has changed in the Technology world in the past year. Systems are updating, while new technologies are becoming more prevalent. Windows XP, the operating system that 33 percent of personal computers…

Read more

2014 IT Trends

This time of year most organizations are looking at 2014.  Analyzing IT trends allows you to budget for the upcoming year, as well as, keep up with the competition.  Reviewing 2014 IT Trends can help…

Read more

Why Small Businesses Need Technology

Technology has become an integral part of most small businesses.  Email has replaced the fax machine.  An onslaught of mobile devices have replaced cash registers, binders and note pads.  Pencil and paper no longer keep…

Read more

Cyber Security Awareness

Did you know October is Cyber Security Awareness month?  This tradition was established ten years ago in the United States by the Department of Homeland Security in cooperation with the National Cyber Security Alliance and…

Read more

Do you Have a Strategy for Online Backup?

Online Backup is one of the more popular deployments of cloud computing. Online backup can be a cost effective part of your data protection strategy. Many businesses have achieved benefits by leveraging cloud computing for…

Read more

Upgrading from Windows XP to Windows 8.1

If you are running Windows XP on your computer, you are not alone.  It is estimated that 33% of all PCs still run on Windows XP.  Many businesses are considering upgrading from Windows XP to…

Read more

Cyber Attacks in the News (Again)

Cyber Attacks are in the news again. Last week domain registrar Network Solutions suffered a denial of service attempt impacting the websites of their customers. Cyber attacks like this are high profile and always in…

Read more

IT Service for Small Business

There are many factors driving the way IT Service for small business is delivered. Small to medium sized businesses have the same IT Service challenges of larger companies such as: cyber security threats, cloud deployments and…

Read more

Managing Mobility

Mobility and mobile applications in the workplace are being driven by a number of important trends including: a wide range of mobile applications, consumerization of IT and adoption of smart phones and tablets in the…

Read more

Why Achieve Network Compliance

Network compliance has many benefits for small to medium businesses. Companies processing credit card information may need to maintain PCI Compliance, while healthcare professionals may need to maintain HIPAA Compliance. Businesses recognize the need to…

Read more

Getting More From Your IT With Cloud Computing

Cloud Computing adoption is on the rise for businesses looking to reduce capital expenditure and avoid software licensing. According to the Computing Technology Industry Association (CompTIA) Annual Trends in Cloud Computing Survey forty two percent…

Read more

What is Malware and Why Should I Care?

Malicious Software or Malware is a serious concern to IT Security experts and business owners alike.  Malware is a category of Cyber Security threats that includes Viruses, Worms,Trojans and Botnets.  It is no surprise that…

Read more

Are You Ready for Mobility?

Mobility in the workforce is increasing productivity and driving savings for small to medium sized companies. Recent research from the Computer Technology Industry Association (CompTIA) uncovers 73% of small businesses surveyed cite they have a…

Read more

Should I Run my Business in the Cloud?

If you are still foggy about Cloud Technology, don’t feel too badly. According to a recent survey of one thousand adults by Wakefield Research over 50% of respondents believe that weather patterns have an impact…

Read more

Happy Data Privacy Day!

Data Privacy Day may not be a holiday for your IT Support Professional, however, it is an international holiday dedicated to education about Data Privacy. On this day many private, government and academic Data Privacy…

Read more

H1-B Visa Tips for Employers

Guest Blog by Mitch Wexler – Partner, Fragomen, Del Rey, Bernsen & Loewy, LLP H-1B visas are the mainstay of foreign nationals working in the US. There are only 85,000 new H-1B visas available per fiscal year.…

Read more

New iPad at work? Make sure it is secure.

New iPad at work?  Make sure it is secure. With the holiday season behind us,  as expected, many employees are coming to work with shiny new tablet computers including Android Tablets, Microsoft Windows RT Tablets…

Read more

Getting More From Your IT in 2013

Getting More From Your IT in 2013 There are plenty of ways to get more from your IT budget in 2013. Mobility, remote support and cloud backup are a few technologies that will make your…

Read more

2013 IT Trends

2013 IT Trends There are a number of driving factors that will influence 2013 IT trends. These trends include Mobility, Cloud Computing, Disaster Recovery and IT Security. These 2013 IT trends will influence IT budgets…

Read more

Can Cloud Computing Help your Business?

Can Cloud Computing Help your Business? Cloud computing has rapidly become mainstream technology for large and small businesses.  From online backup to virtual servers to Software as a Service (SaaS) there are many benefits to…

Read more

Apple to Begin Shipment of iPad Mini Tablets

Apple to Begin Shipment of iPad Mini Tablets Apple Computer announced their newest tablet computer, the Apple iPad Mini  on November 2nd. Expect the Apple iPad Mini with WiFi with Cellular LTE support to begin…

Read more

Upgrading to Windows 8?

Upgrading to Windows 8? Microsoft started shipping their newest version of their flagship product Windows 8. According to Microsoft , over 1,000 new devices have been designed to take advantage of Windows 8. But what…

Read more

IT Security Assessment

IT Security Assessment An IT Security Assessment is a great way to take an inventory of what your needs are in IT Security. Whether you must comply with regulatory requirements, including HIPAA and PCI, or…

Read more

Beyond Bring Your Own Device

Beyond Bring Your Own Device (BYOD) Many businesses have adopted an IT policy of Bring Your Own Device (BYOD) to save money and provide employees with the flexibility of staying connected when they travel, work…

Read more

Internet Browser Security Tips

Internet Browser Security Tips Left unprotected, Internet browsers including: Google Chrome, Microsoft Internet Explorer, Mozilla Firefox, and Apple Safari are increasingly vulnerable to software attacks and may be a place where malicious software, aka Malware…

Read more

Maintaining Network Security

Maintaining Network Security: For many companies, network security is necessary to achieve compliance for PCI, HIPAA and other regulatory requirements. Keeping your computer and wireless network secure is a good policy to protect your company’s…

Read more

Considering the Cloud For Backup

Considering the Cloud for Backup? Many small to medium business (SMB) owners are turning to online backup or remote backup, generally referred to as cloud backup, as a top way to take advantage of cloud…

Read more

Cloud Computing: Are you Ready for the Cloud?

Cloud Computing: Are you Ready for the Cloud? Most technology analysts agree Cloud Computing is a fast growing area of technology and is being widely adopted by small, medium and large businesses. According to Gartner…

Read more

Bring Your Own Device (BYOD)

Bring Your Own Device (BYOD) Bring your own device (BOYD) is a recent trend where employees use their personal mobile devices including: iPhones, iPads, tablets computers and smartphones to access company information including your network,…

Read more

What Has Your Backup Done For You Lately?

What Has Your Backup Done For You Lately? Businesses of all sizes rely on their data more than ever before. What’s more, businesses have more data to protect and backups to store than ever. Critical…

Read more

Data protection and security update LinkedIn

Data Protection and Password Security Update: LinkedIn On June 7, LinkedIn disclosed that “some LinkedIn member passwords were compromised.” Per LinkedIn disclosures on their blog https://blog.linkedin.com/2012/06/07/taking-steps-to-protect-our-members/ ”LinkedIn learned that approximately 6.5 million hashed LinkedIn passwords…

Read more

PC Repair Tips to Improve Performance

PC Repair Tips to Improve Performance Over time Windows Personal Computers and Laptops need ongoing repair to keep them running smoothly. Why waste time and office productivity when you can proactively repair and maintain your…

Read more

Cloud Computing: Your Pre Flight Check List

Cloud Computing: Your Pre Flight Checklist Cloud computing is more than a passing trend. Cloud computing is a way for small to medium businesses (SMBs) to tap enterprise class applications and infrastructure that once only…

Read more

Computer Repair vs. New Computer?

Are you ready to upgrade your desktop and laptop computers?  Expect lots of exciting new changes to come out later this year. Unless your needs are urgent, you may want to wait until the Fall.…

Read more

Is Your Network Safer Than The Titanic?

One hundred years ago the ship, called “unsinkable” had its hull breached by an iceberg and caused the death of over 1500 passengers. You may think your network is “invincible” like the Titanic, however, your…

Read more

Why you should audit your network.

Do you know what’s connected to your network? If not, you should! Auditing your network and creating an inventory of your IT assets catalogs all devices connected to your network including PCs, laptops, printers, routers…

Read more