It’s Time to Graduate to REAL IT Support

See if this scenario comes close to your situation: You are a few years past your company’s ‘startup’ point. You’ve been hiring, and you’ve grown from two computers in your home to ten in an office. ...

Is It Time to Move from Windows 10 to 11?

Many companies have made the switch already, but quite a few are still on Windows 10. With technology, there is always a good reason for a ‘wait and see’ attitude – to see what bugs they have to shake out of the system. ...

Failing to Plan = Planning to Fail

Benjamin Franklin provided us with that priceless truth, which has no logical argument against it. Nothing that lasts and has value was created without a plan. ...

Are Your Backups Any Good?

How do you know if your local or cloud-based data backups are reliable? Maybe they were yesterday -but are they today? ...

How 5G Will Affect your Network

Cyber criminals tend to follow the path of least resistance. The easier it is to hurt businesses and take their money, the more businesses they can attack. ...

Protect your email in a Cybercrime World

Cyber criminals tend to follow the path of least resistance. The easier it is to hurt businesses and take their money, the more businesses they can attack. ...

How to Stay Master of Your Domain

This is not exactly what Jerry and his friends were talking about on that old ‘Seinfeld’ episode. This is about what happens when an organization loses control of their Domain Name by letting it expire. ...

Network Policies & Procedures: Do You Practice What You Preach?

Every organization has important rules. Even more importantly, they must be in writing and stringently enforced – and not on a case-by-case basis. ...

Think Twice Before Hiring an In-house IT Person

The top cyber threats that challenge businesses worldwide do not vary much from year to year. All the Usual Suspects are there, with maybe minor changes in ‘pole position.’ Usually topping the list: Phishing, Malware, Ransomware etc. ...

Beware the Insider Threat

The top cyber threats that challenge businesses worldwide do not vary much from year to year. All the Usual Suspects are there, with maybe minor changes in ‘pole position.’ Usually topping the list: Phishing, Malware, Ransomware etc. ...