Blog

  • April 27, 2018

    The “Not Me!” Problem…And Why This Is Almost Guaranteed To Happen To You

    Security this, password that – now they want a password with 14 characters with two symbols? And I have to change it every three months? As difficult as it is to remember 24 different passwords, four PIN numbers and a slew of new cyber security processes, we still manage to instantly recall most of the […]

    Full Article.....
  • April 20, 2018

    Wire Transfer Scam

    Recently there’s been a pretty sophisticated wire transfer scam that is going on. In many cases, when they receive the email, the domain name can be very convincing. Often times, it has the right domain name, the name of the controller, the operations person or owner. They know exactly who they are sending it to, […]

    Full Article.....
  • April 13, 2018

    Turn the Ship Around! By L. David Marquet

    At an industry event in Phoenix, AZ, Mr. Marquet was a featured speaker, sharing his first-hand experience on the USS Santa Fe, a nuclear submarine. He finds himself taking over a crew that had trouble getting underway on time and the worst retention record in the submarine force. The challenge was to use the same […]

    Full Article.....
  • April 06, 2018

    Cybercrime: Size Does NOT Matter

    Though we’re in the midst of an unprecedented rise in high-profile cybercrime incidents, it’s easy to assume that our own much smaller businesses are safe. Sure, we think, hacking into the data stores of J.P. Morgan, the U.S. Government, or Virgin America can net hackers millions and millions of dollars. Why would they bother with […]

    Full Article.....
  • April 03, 2018

    3 Important Reminders for Sage 100 Contractor Users

    The Data is NOT in the MB7 folder any more – On a recent call with a new client, we asked about how they were handling their backups. They told us they copy the MB7 folder to a separate drive as a backup. Now there are a couple of things wrong with this process, but […]

    Full Article.....
  • March 29, 2018

    5 Ways Your Employees Will Invite Hackers Into Your Network

    Whether they’re criminals or heroes, hackers in the movies are always portrayed as a glamorous group. When it comes down to the wire, these are the individuals who crack into the ominous megacorporation or hostile foreign government database, hitting the right key just in the nick of time. They either save the day or bring […]

    Full Article.....
  • March 23, 2018

    So Your Copier Company Wants to Get Into Managed Services…

    Copiers – don’t know what any of our offices would do without these machines! They scan, they fax, make copies of course; they collate; some of the big ones can staple and even bind. These are amazing and we love doing our part to keep them working over your network. But, the copier companies and […]

    Full Article.....
  • March 15, 2018

    New Security Measures for Our Hosted Clients

    It seems some people with good computer skills have entirely too much time on their hands. We regularly see attempts to hack into our servers, our client servers, and our hosting environment. An example: a hacker bombards a server with automated log on attempts using guessed passwords, sometimes referred to as a dictionary attack, or […]

    Full Article.....
  • March 09, 2018

    Changes that Heal by Dr. Henry Cloud

    This is the type of book that makes you reach for a pencil or highlighter so you don’t forget the nuggets you just read. Building on his previous, and awesome books on Boundaries, Dr. Cloud reminds us that change isn’t something we wait to have happen; we can dig in and get started. He identifies […]

    Full Article.....
  • March 02, 2018

    Bringing Home The Prodigals by Rob Parsons

    Most people are familiar with the story of the prodigal son. He demands his half of his father’s inheritance, leaves home, squanders everything, and decides it would be better to be a hired hand on dad’s farm than to starve to death. When he shows up with his speech, how does the dad respond? How […]

    Full Article.....