Blog
  • Written technology plans are one of those things we rarely see when we visit clients for the first time. It is far more common for companies to simply incorporate a handful of technology needs into their business plan (if they have one) and have a single line item for IT inside their budget, to be […]
    In virtually every business environment, a wide variety of personal and ‘approved’ devices are used throughout the day. This includes computers, tablets, smartphones and other Wi-Fi enabled devices. Each piece of equipment puts your entire network at risk if it is not properly secured and managed. You have a responsibility to protect the private information […]
    Technology changes fast. Software upgrades are made available each year, often requiring companies to repurchase and reinstall each license. Plus, with the ever-growing amount of applications and data you need to access and archive, computers and servers frequently need to be added or upgraded, resulting in rising technology costs each year. Ask yourself: Are you […]
    Ensuring the right mix of IT support is important for every business, regardless of industry or size. For some, it means a full-time professional or even an entire department. For others, it may mean a part-time professional or tech-savvy staff member who provides support in addition to their other duties. Then there are the businesses […]
    The cost of hardware, software and accessories can quickly add up when you want to provide appropriate tools to every valuable player. We’ve talked with owners who acknowledge their employees share computers and passwords because they believe it is cost-prohibitive to upgrade their hardware and software. We’ve visited businesses that are using older computers and […]
    Do you know what your greatest vulnerability is? It’s your people. Employees unknowingly click on malicious links and download a host of viruses and malware every day. In fact, there is a hacker attack every 39 seconds and 63% of all network intrusions are due to compromised user credentials. Here are a few other disturbing […]
    For the past few years, there’s been a lot of buzz about migrating data to the cloud. For many, making the decision as to whether or not to rely on cloud computing and storage is not an easy one. It’s a bit like the renting vs. buying argument. When you upgrade your current on-site infrastructure […]
    Cloud Storage vs In-house Hosting

    Why Do Hackers Want My Data?

    Frank Riina
    By: David R. Herman – Director, Technical ServicesHacking has become so commonplace that many people have begun disregarding the potentially disastrous consequences of it. Why do hackers hack, anyway? Why are we burdened with the inconvenience and expense of firewalls, anti-virus programs, content filters, and having to sort through pages of spam selling you the […]
    Hackers Want Your Data
    How reliable is your current backup system? Would your business survive a technical disaster? When was the last time you tested your backup system?  These are some of the questions business owners should be asking themselves on a regular basis. Here are some of the answers we’ve heard through the years: I just bought my […]

    Ransomware Guide

    Frank Riina
    Ransomware has become an epidemic in today’s IT world. It has locked down hospitals, universities, small businesses, and individuals all over the world. Ransomware is malware that infects your computer by locking access to your files until you pay a ransom – usually in Bitcoin. The malware typically gets on your computer through a malicious […]