Sage has some changes coming for the Sage 100 Contractor users. Here are three (3) things you’ll need to know: First, as of May 1st, there is a price increase. This seems to be an annual occurrence, so not a surprise. Second, and more interesting, is the change beginning May 7th. If you reach out […]
Full Article.....Security this, password that – now they want a password with 14 characters with two symbols? And I have to change it every three months? As difficult as it is to remember 24 different passwords, four PIN numbers and a slew of new cyber security processes, we still manage to instantly recall most of the […]
Full Article.....Recently there’s been a pretty sophisticated wire transfer scam that is going on. In many cases, when they receive the email, the domain name can be very convincing. Often times, it has the right domain name, the name of the controller, the operations person or owner. They know exactly who they are sending it to, […]
Full Article.....At an industry event in Phoenix, AZ, Mr. Marquet was a featured speaker, sharing his first-hand experience on the USS Santa Fe, a nuclear submarine. He finds himself taking over a crew that had trouble getting underway on time and the worst retention record in the submarine force. The challenge was to use the same […]
Full Article.....Though we’re in the midst of an unprecedented rise in high-profile cybercrime incidents, it’s easy to assume that our own much smaller businesses are safe. Sure, we think, hacking into the data stores of J.P. Morgan, the U.S. Government, or Virgin America can net hackers millions and millions of dollars. Why would they bother with […]
Full Article.....The Data is NOT in the MB7 folder any more – On a recent call with a new client, we asked about how they were handling their backups. They told us they copy the MB7 folder to a separate drive as a backup. Now there are a couple of things wrong with this process, but […]
Full Article.....Whether they’re criminals or heroes, hackers in the movies are always portrayed as a glamorous group. When it comes down to the wire, these are the individuals who crack into the ominous megacorporation or hostile foreign government database, hitting the right key just in the nick of time. They either save the day or bring […]
Full Article.....Copiers – don’t know what any of our offices would do without these machines! They scan, they fax, make copies of course; they collate; some of the big ones can staple and even bind. These are amazing and we love doing our part to keep them working over your network. But, the copier companies and […]
Full Article.....It seems some people with good computer skills have entirely too much time on their hands. We regularly see attempts to hack into our servers, our client servers, and our hosting environment. An example: a hacker bombards a server with automated log on attempts using guessed passwords, sometimes referred to as a dictionary attack, or […]
Full Article.....This is the type of book that makes you reach for a pencil or highlighter so you don’t forget the nuggets you just read. Building on his previous, and awesome books on Boundaries, Dr. Cloud reminds us that change isn’t something we wait to have happen; we can dig in and get started. He identifies […]
Full Article.....