Whether they’re criminals or heroes, hackers in the movies are always portrayed as a glamorous group. When it comes down to the wire, these are the individuals who crack into the ominous megacorporation or hostile foreign government database, hitting the right key just in the nick of time. They either save the day or bring […]
Full Article.....Copiers – don’t know what any of our offices would do without these machines! They scan, they fax, make copies of course; they collate; some of the big ones can staple and even bind. These are amazing and we love doing our part to keep them working over your network. But, the copier companies and […]
Full Article.....It seems some people with good computer skills have entirely too much time on their hands. We regularly see attempts to hack into our servers, our client servers, and our hosting environment. An example: a hacker bombards a server with automated log on attempts using guessed passwords, sometimes referred to as a dictionary attack, or […]
Full Article.....This is the type of book that makes you reach for a pencil or highlighter so you don’t forget the nuggets you just read. Building on his previous, and awesome books on Boundaries, Dr. Cloud reminds us that change isn’t something we wait to have happen; we can dig in and get started. He identifies […]
Full Article.....Most people are familiar with the story of the prodigal son. He demands his half of his father’s inheritance, leaves home, squanders everything, and decides it would be better to be a hired hand on dad’s farm than to starve to death. When he shows up with his speech, how does the dad respond? How […]
Full Article.....We’ve been ASA Chicago members since 2002 and we LOVE this annual Expo. Come by our booth #907 to say ‘hi’ to our techs and win prizes with our fun games; Drury Lane in Oak Brook, 9am-4pm, Tuesday March 6th. Here’s a link for more information on the ASA Chicago Expo -CMW
Full Article.....Many of our clients ask us about what equipment they need to replace and when they should plan to get it done. So why should you replace the server, the firewall, the workstations, and the laptops, and when? On one such client call, the owner said they’d had their server for eight (8) years, so […]
Full Article.....We’ve had a great response to a new service we began offering last Fall. Now available for small to medium-size businesses, this service monitors the Dark Web for breaches involving your company domain name and associated email. You’d be surprised as to what data is available for sale on the Dark Web. We’ve seen passwords […]
Full Article.....‘In the Cloud’ is something we hear all the time. There are public clouds and private clouds, and they’re different. In Part I, we talked about the Public Cloud, what it is, how it works, and the pro’s and con’s of using the Public Cloud for business needs. What about the Private Cloud? A Private […]
Full Article.....‘In the Cloud’ is something we hear all the time. There are public clouds and private clouds, and they’re different. An example of a Public Cloud is gmail, yahoo, and other free email services. Other examples include SalesForce.com, a cloud-based CRM that is available through the internet; QuickBooks is available in the cloud and allows […]
Full Article.....