The most boring topic Ever

    Yes, today’s blog is about office phone systems. You have one. They are dull, necessary, and no one wants to deal with them. They need to be re-configured for new employees, they’re confusing, and the telco lines probably cost you more money than you’d like.Like everything else, office phone systems began transitioning to … Continue reading “The most boring topic Ever”

Humans cause so much trouble

    Have you been focusing on software packages and anti-virus tools to protect your data from hacking? That may not be enough, because it overlooks one of the biggest causes of security breaches. All of the security software and expertise in the world is useless if you or your employees don’t remain vigilant about … Continue reading “Humans cause so much trouble”

Your front door is talking

    If you’ve been following the news, the Internet of Things is getting increasing attention. You’re probably also thinking this is some Silicon Valley fancy thing that will take years to reach the rest of us.   Not really. You probably already have some items of your own tied into the Internet of Things. … Continue reading “Your front door is talking”

The Cloud: what do you get?

    The cloud refers to using off site computing resources and storage to supplement or even replace the use of on-site/in-house resources. Instead of buying hardware and software to support your business, you are basically outsourcing this set of tasks.There are 4 benefits for the small firm and today we will look at the … Continue reading “The Cloud: what do you get?”

Security and your sub-contractors

    So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid security errors in their day-to-day business ( a MAJOR source of security breaches, by the way.) However, you may be overlooking one area where you are exceptionally vulnerable. What protection do you … Continue reading “Security and your sub-contractors”

IT Defense in Depth Part II

    Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect of it, and network defenses. The human layer refers to the activities that your employees perform. 95% of … Continue reading “IT Defense in Depth Part II”

IT Defense In Depth Part I

    In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and fortifications at those places, you can rebuff any attack. The problem is, you can’t … Continue reading “IT Defense In Depth Part I”

What is Ransomware and How Can it Affect Your Business?

    This cyberattack scheme hasn’t garnered nearly as much attention as the usual “break-in-and-steal-data-to-sell-on-the-Internet version,” but it can be even more debilitating. Ransomware attacks have begun appearing in the last few years and its practitioners are so polished that in few cases they even have mini­call centers to handle your payments and questions.   … Continue reading “What is Ransomware and How Can it Affect Your Business?”

Penetration Testing vs. Vulnerability Testing Your Business Network

    Hearing “all of your confidential information is extremely vulnerable, we know this because…” is bad news, but whatever follows the ellipses determines just how bad. Consider two scenarios. “All of your confidential information is extremely vulnerable… we know this because a hacker took all of your customers’ credit card info and locked all … Continue reading “Penetration Testing vs. Vulnerability Testing Your Business Network”

Humans cause so much trouble

    Have you been focusing on software packages and anti-virus tools to protect your data from hacking? That may not be enough, because it overlooks one of the biggest causes of security breaches. All of the security software and expertise in the world is useless if you or your employees don’t remain vigilant about … Continue reading “Humans cause so much trouble”

The most boring topic Ever

    Yes, today’s blog is about office phone systems. You have one. They are dull, necessary, and no one wants to deal with them. They need to be re-configured for new employees, they’re confusing, and the telco lines probably cost you more money than you’d like.Like everything else, office phone systems began transitioning to … Continue reading “The most boring topic Ever”

The Cloud: what do you get?

    The cloud refers to using off site computing resources and storage to supplement or even replace the use of on-site/in-house resources. Instead of buying hardware and software to support your business, you are basically outsourcing this set of tasks.There are 4 benefits for the small firm and today we will look at the … Continue reading “The Cloud: what do you get?”

Your front door is talking

    If you’ve been following the news, the Internet of Things is getting increasing attention. You’re probably also thinking this is some Silicon Valley fancy thing that will take years to reach the rest of us.   Not really. You probably already have some items of your own tied into the Internet of Things. … Continue reading “Your front door is talking”

Security and your sub-contractors

    So you feel relatively comfortable that you have created cyber security around your data and your employees are trained to avoid security errors in their day-to-day business ( a MAJOR source of security breaches, by the way.) However, you may be overlooking one area where you are exceptionally vulnerable. What protection do you … Continue reading “Security and your sub-contractors”

Government regulations

     Any business that stores customer payment information must comply with a number of state and federal regulations. The legal, healthcare, and financial sectors have a number of laws tailored specifically for them (such as HIPAA or CISPA). If you run almost any kind of professional practice or agency you probably have very specific … Continue reading “Government regulations”

Higher goals get dragged down by Tech: The NPO story

    If you are a smaller Not-for-Profit, it is likely that your organization has been driven from its inception by individuals strongly motivated with a passion for their cause or humanitarian goal. As a result, it is also possible that the leadership has little interest in developing the administrative technology infrastructure that is necessary … Continue reading “Higher goals get dragged down by Tech: The NPO story”

Benefits of Using VoIP Technology

Benefits of Using VoIP Technology More and more businesses are implementing Voice over Internet Protocol or VoIP technology because of its versatility, flexibility and cost effectiveness. With new developments in this technology, the scope of its applications is widening. It is becoming more than just voice communications technology. That is why businesses of all sizes … Continue reading “Benefits of Using VoIP Technology”

Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans.

Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans. Entrepreneurs and small businesses, especially ones that are fairly new, often don’t think about making plans to recover in case of a disaster. However, it is the smallest business that most likely has the fewest resources to fall back on in case of disaster. Why does … Continue reading “Why Small Businesses Shouldn’t Avoid Making Disaster Recovery Plans.”

Outsourcing? Really. Its OK: How it can save time and money

Outsourcing? Really. Its OK: How it can save time and money Almost by definition, small business owners and entrepreneurs cringe at the concept of outsourcing. Those who start their own companies like the control and autonomy it provides them. Unfortunately, that preference for control and autonomy may have some bad side-effects when it comes to … Continue reading “Outsourcing? Really. Its OK: How it can save time and money”

Be Proactive: How to Avoid Potential Network Failures

Be Proactive: How to Avoid Potential Network Failures For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don’t have the resources of large corporations to bounce back from such disasters. Preparation against such devastation may be the only course for them to avoid failure and survive with the least … Continue reading “Be Proactive: How to Avoid Potential Network Failures”

Four Key Components of a Robust Security Plan Every SMB Must Know

Four Key Components of a Robust Security Plan Every SMB Must Know Most businesses are now technology dependent. This means security concerns aren’t just worrisome to large corporate enterprises anymore, but also the neighborhood sandwich shop, the main street tax advisor, and the local non-profit. Regardless of size or type, practically any organization has valuable … Continue reading “Four Key Components of a Robust Security Plan Every SMB Must Know”

Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe

Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe Not too long ago, the New York Times’ website experienced a well-publicized attack, which raises the question – how can this happen to such a world-renowned corporation? If this can happen to the New York Times, what does this bode for the security of … Continue reading “Just Because You’re Not a Big Target, Doesn’t Mean You’re Safe”

Why SMBs Must Proactively Address the Threat of Mobile Hacks

Why SMBs Must Proactively Address the Threat of Mobile Hacks More cyber criminals are targeting small-to-medium sized businesses. One reason for this is too many workplaces have insufficient bring-your-own-device (BYOD) policies in place. Some have none at all. Although firms are generally more knowledgeable about network security risks than in years past, they still woefully … Continue reading “Why SMBs Must Proactively Address the Threat of Mobile Hacks”

A Smarter Approach to Mobile Device Management

A Smarter Approach to Mobile Device Management More people today use personal mobile devices like smartphones and tablets for business purposes. Such devices, coupled with greater Wi-Fi accessibility and cloud services, have empowered us with the ability to access data and do business from practically anywhere at anytime. Needless to say, many small-to-medium sized business … Continue reading “A Smarter Approach to Mobile Device Management”

Click, Click, BOOM – You’re in Business But Is Your Technology Ready?

Click, Click, BOOM – You’re in Business But Is Your Technology Ready? It’s a fast business world. Brilliant business ideas can be conjured up at some hipster-filled vegan coffeehouse, a website is thrown together, and poof… in no time at all there is a living, breathing, small business venture accessible from anywhere in the world. … Continue reading “Click, Click, BOOM – You’re in Business But Is Your Technology Ready?”

Inquiring SMBs Want to Know… What’s the Difference Between a Help Desk and NOC?

Inquiring SMBs Want to Know… What’s the Difference Between a Help Desk and NOC? It’s no secret that any growing small-to-medium sized business must monitor and manage its business technology in the most cost-efficient way. The tricky part is figuring out how to do this without sacrificing the overall experience of the end-user. End-users can … Continue reading “Inquiring SMBs Want to Know… What’s the Difference Between a Help Desk and NOC?”

Is That A Business Continuity Plan in Your Pocket…Or A Bunch of Jargon?

Is That a Business Continuity Plan in Your Pocket or a Bunch of Jargon? Technology is full of difficult jargon. To further complicate things, certain terms are often used in a different context between one publication or service provider and the next. An example of this is the usage of backup, disaster recovery, and business … Continue reading “Is That A Business Continuity Plan in Your Pocket…Or A Bunch of Jargon?”

8 Hard Truths for SMBs not Worried About Data Recovery and Business Continuity

8 Cold Hard Truths for SMBs Not Worried About Disaster Recovery and Business Continuity The foundation of any successful business continuity solution is the ability to retrieve data from any point in time from anywhere. When the topic of data recovery and business continuity comes up, you get the feeling that many decision makers at … Continue reading “8 Hard Truths for SMBs not Worried About Data Recovery and Business Continuity”

Mitigate Costly New Technology Risks for Continued Stability and Profitability

Partnering with a managed service provider (MSP) is one new approach being used by many companies like yours. Experienced MSPs have access to newer tools that reduce costs by automating many routine in-house labor intensive processes. Break-fix is labor intensive, and labor is one of the most expensive operating costs within your IT infrastructure. The … Continue reading “Mitigate Costly New Technology Risks for Continued Stability and Profitability”

Is That Email a Phishing Scheme?

Research has revealed that over half of all users end up opening fraudulent emails and often even fall for them. Phishing is done with the aim of gathering personal information about you, generally related to your finances. The most common reason for the large number of people falling for fraudulent emails is that the phishing … Continue reading “Is That Email a Phishing Scheme?”

Data Loss Can Cause You to Shut Down

Small and medium sized businesses today are relying more than ever on IT systems to efficiently run their business, support customers and optimize productivity. These systems house sensitive digital data ranging from employee and customer information, to internal emails, documents and financial records, sales orders and transaction histories. This is in addition to applications and … Continue reading “Data Loss Can Cause You to Shut Down”

Nulla facilisis mauris ut est viverra

Aenean tempor sit amet lectus a faucibus. Sed id ante sit amet nisl fermentum imperdiet. Nulla malesuada odio et ex efficitur ornare. Aenean imperdiet volutpat quam, sed ornare enim lobortis quis. Class aptent taciti sociosqu ad litora torquent per conubia nostra, per inceptos himenaeos. Nulla ultrices vel ligula sit amet volutpat. Nam sollicitudin efficitur nulla, … Continue reading “Nulla facilisis mauris ut est viverra”

Pellentesque vitae lectus pharetra

Vivamus venenatis dictum nulla porta auctor. Etiam vel diam auctor, luctus nisl at, laoreet lacus. Morbi mollis ante fermentum euismod varius. Donec non eleifend nibh. Vivamus ex nibh, venenatis sit amet luctus non, bibendum ac felis. Suspendisse efficitur consequat ex in bibendum. Cras purus nisl, congue vel ante maximus, imperdiet vehicula sapien. Vestibulum ante ipsum … Continue reading “Pellentesque vitae lectus pharetra”