Posts
Latest Posts from Our Blog
With all the data breaches we see on the news these days, it can sometimes be scary to trust companies with your sensitive information. However, in many cases, sensitive data is gained by an attacker taking advantage of users implementing weak passwords. Today, we will look at some examples of weak/strong passwords and what you…
Read MoreAs we’ve spoken with current customers and new prospects about Managed IT Services for their computers, servers, and networks, occasionally, someone will ask, “Can I just put my server and a couple of the most important PCs on a Managed IT Services plan. Our response is always (politely and diplomatically), “No, all of your computers,…
Read MoreYou probably can recall the recent story of when Mark Zuckerberg had to testify before Congress regarding the Cambridge Analytica Data Leak. In comparison to a data breach, such as the Marriott International incident, there are some slight differences to be aware of. We’ll briefly cover these differences, how you should treat each of the…
Read MoreOne of the most crucial things to business, from small to large, is IT (information technology) security. As more companies than ever open up to remote offices, keeping all of your employees and information safe is paramount. In this blog post, we’ll discuss some of the best practices for IT Security Risk Management. Analyze and…
Read More2021Why is Wi-Fi security so important? Wi-Fi is a point of entry that attackers can use to gain access to your network without ever being physically inside your building. In this post, we’ll be going over a few things you can do to lock down your Wi-Fi for a more secure network. The best part…
Read MoreAccording to Spiceworks, 98% of companies depend on on-premise server hardware. While Cloud-based solutions are all the rage these days, most businesses just aren’t buying into it. They prefer to continue using on-site hardware. In today’s blog post, we’ll be discussing the questions you should ask before buying a server. Whether you’re in the market…
Read MoreMost companies believe that they are in complete control of their security online and that they could never be the target of a cyber criminal. Sorry to be the bearer of bad news, but cyber attacks aren’t just for the big companies. Symantec, a leading security software company, states that 36 percent of all targeted…
Read MoreWireless routers should be set in such a location that they maximize availability, signal strength, and speeds. But how do you know where to set a router to best suit your needs? While there is no clear-cut answer, I’m here to help you in determining the best location for your device. Where to put it?…
Read MoreMost people have used or experienced Voice-over-Internet Protocol (VoIP) Phone Systems. The latest VoIP technology is leaps and bounds ahead of analog telephones and older PBX’s. But even if you know the basics of VoIP technology, there are some incredible features that you might not know about yet. In today’s blog post, we’ll go over…
Read More