Should your company upgrade to Microsoft Office 2016?

By | November 1st, 2016|Cloud computing, Desktop Computer, Laptops, Network, Servers|

Microsoft Office 2016 is evolutionary and not revolutionary like Office 2013 was. As software becomes more advanced and ends up doing so much already, it becomes harder to make revolutionary apps. However, a few upgrades and minor tweaks sometimes justify the cost of an upgrade. Since upgrading your main office program can affect your business [...]

What is the cloud and should my company be using it?

By | October 20th, 2016|Backup and Disaster Recovery, Cloud computing, Information Security, Network, Remote Desktop Connection, Servers|

The “cloud” is a popular term and you hear about it everywhere. But what is the cloud and what is cloud computing? The term “cloud” comes from the drawing of a cloud (used in project management) that surrounds all technology items that are supposed to work together to share data (see the picture attached to [...]

Why hackers concentrate on small businesses

By | October 7th, 2016|Backup and Disaster Recovery, Cloud computing, Information Security, Network, Uncategorized|

It’s all over the news on a regular basis — a large company gets hacked into and sensitive customer and employee data is stolen and then sold on the digital black market. Although the large companies (Home Depot, Neiman Marcus, Target, etc.) get all the attention in the press, it is actually companies with fewer [...]

How can we make our computers last longer?

By | September 29th, 2016|Backup and Disaster Recovery, Desktop Computer, Laptops, Network, Servers|

Your computers are a large investment for your company and do have a regular cleaning and upgrade schedule that should become part of your company routine. There are several factors that can shorten the life of your computer, causing a greater-than-needed investment in technology. Here are the items that provide the greatest predictors of how [...]

Are you uploading a virus to your Dropbox account

By | September 29th, 2016|Backup and Disaster Recovery, Desktop Computer, Information Security, Network, Servers|

On-line file sharing and upload site such as Dropbox are great for easy access to your files from anywhere, but they are also one of the fastest way to infect your entire company with a virus or malware. Since most people use the "desktop connector" for Dropbox, all files that anyone uploads will almost instantly [...]

How does your business become HIPAA compliant?

By | September 20th, 2016|Backup and Disaster Recovery, Cloud computing, Information Security, Network, Servers|

Becoming and staying HIPAA compliant has become a daunting task and affects more than just medical offices and healthcare providers. Vendors of those healthcare companies must learn and implement policies when dealing with any aspect of patient or pharmaceutical data. HIPAA compliance has become more focused on the technology component as so much of what [...]

How can we track and protect our mobile devices?

By | September 19th, 2016|Backup and Disaster Recovery, Information Security, Network, Servers|

We have become quite addicted to our mobile devices. And why not? They have become essential tools for productivity, remote connections and instant access to information. However, mobile devices, including smart phones, tablets and laptops, are notorious for being easy to steal and easy to hack into, especially when you are on a Wi-Fi network. [...]

New Ransomware acts like a Windows Update

By | August 30th, 2016|Backup and Disaster Recovery, Information Security, Network|

Hackers are getting more bold and more creative in an effort to get your money. A researcher at AVG (the anti-virus company) has discovered a new strain of Ransomware (a term given to malicious software that encrypts all your files and demands a ransom to get your files back) named Fantom. If you don't pay [...]

Don’t use free public Wi-Fi

By | July 30th, 2016|Information Security, Laptops, Network|

More and more restaurants, cafes and other retail businesses are offering free wireless access for your mobile device. Although it is a nice gesture to give their loyal customers free Internet access, it has become a hotbed for hackers to gain access to your laptop, phone or tablet. So why shouldn't you use free public [...]