Earlier this year, I had the chance to hear and see Sean Stephenson. The first thing he does is address the elephant in the room—he’s confined to a wheel chair, has a rare brittle bone syndrome, needs assistance for everyday tasks, and has a fulfilling and blessed life! It’s really hard to listen to Sean […]
Full Article.....We started working with an out-of-state client and they said they’ve paid the ransom twice so far. Another recent client had a good backup, but it took 3 weeks to restore their data from the cloud. Add it up – if your office had to be down for just one full day, how many man-hours […]
Full Article.....On a recent flight back from a client on-site training out of state, I had a chance to catch up on some of my reading. I’ve been a member of the CFMA (Construction Financial Managers Association) for a while, most recently with the Valley of the Sun (VoS) chapter after many years with the Chicago […]
Full Article.....There’s a growing trend that has some great benefits for the employer and the employee – everyone uses their own personal device at work. This is less expensive for the company and cuts down on tracking equipment; employees get to pick equipment based on their own preferences and personal desires. Before you jump on board, […]
Full Article.....This is the latest ‘buzz word’ in the IT industry – the Dark Web. It’s an underground world that is making a TON of money tricking you into giving up your passwords, holding your data for ransom, using your credit cards to buy things, and stealing money out of your bank accounts. This is not […]
Full Article.....Did you know that business-class firewalls allow country blocking? We’ve seen a HUGE increase in hacking attempts from other countries, always a concern, but a very big increase of late. Blocking specific countries through a firewall is a great way to severely limit hacking attempts. Your firewall uses a lot of resources to ward off […]
Full Article.....Sorry to interrupt your late-summer fun, but this scam has our techs calling me asking for an email blast! The email looks like it’s from Microsoft and says that there’s an attached voicemail. The actual attachment is a Word document camouflaged as a PDF. As of this writing, the anti-virus engines and VirusTotal software do […]
Full Article.....Cyber Security is the latest IT-related buzz word. As is often the case, this covers a huge range of topics, but our focus is always the small-to medium-sized business and their IT needs, so that’s where I’ll start.
Full Article.....Summer is upon us. Time for a stroll in the park; softball; fishing; a few rounds of golf. So how can you relax during this year’s getaway time and still have confidence your company’s computer data is safe and secure? Here’s a quick nine-step checklist you can use to ensure that your company’s computer network, […]
Full Article.....The number one recommendation from our techs is that you lock your workstation or laptop when you walk away! By leaving the computer unlocked, anyone can sit down and have access to anything and everything you have rights to see and do on that machine, on the network, on the internet, remembered passwords, etc. This […]
Full Article.....