How Do You Know What Your IT Department is Really Doing?

How do you know that the decisions they make and the actions they take are in the best interest of your business? Are you often uncomfortable with answers you get from your IT staff or not quite sure you buy in to what they are telling you and feel like there might be a better…
Read More


Does Your Company Have Maintenance Agreement Headaches?

It is very likely that the products you purchase today will come with some sort of maintenance agreement attached. The agreements can be attached to hardware, software, or both.  From time to time customers get comfortable with the solution they have and fail to see the many benefits of maintaining their support contract. Firmware upgrades,…
Read More


Are Your Vendors Putting You at Risk?

There are numerous security risks that come from giving third-party vendors access to your network and data. According to the Ponemon Institute, 49% of companies had a data breach caused by a third-party vendor. In fact, hackers themselves admit that contractors are often their primary target. Some of the most devastating breaches in the past…
Read More


Disaster Recovery: Are You Prepared?

Hardware failures, bad patches, virus infections, malicious attacks, security vulnerabilities, and ransomware attacks are only a few of the many examples of outside forces that can interrupt IT functions. Unfortunately, many businesses find themselves caught off guard when an event happens, and they realize too late that they should have been more prepared. Ransomware alone…
Read More


Revitalize Meetings and Boost Productivity with Cisco WebEx

Do you frequently walk out of a meetings frustrated because it was a waste of time?  You keep thinking If you didn’t attend the meeting you would have accomplished so much more. To add insult to injury, you had to get up leave your work space to attend said meetings right?  What about the people…
Read More


The Importance of Compliance in Your Business

In recent years, regulators and lawmakers have been enacting a growing number of regulations across numerous industries that companies need to comply with. Most of these regulations are imposed to help ensure client or consumer data is kept secure and confidential, as well as to protect critical infrastructures. Examples of such compliance include HIPAA, PCI,…
Read More


Is Your Anti-Virus Providing You The Best Protection?

It has always been best practice to have Anti-Virus (AV) on your machine although, historically, AV has been resource hungry and often a day late and a dollar short on protection. As new threats emerge, it can take weeks for a fix to be engineered, tested, and then pushed out to clients. During this time,…
Read More


Beware: Business Email Compromises are on the Rise

There are many forms of fraud in the world today, yet email continues to prove itself as the most inexpensive and popular method for distributing fraudulent messages to potential victims. Studies show that approximately 90% of all email sent worldwide are spam, spoofing or phishing attempts. Business Email Compromise (BEC) is a sophisticated form of…
Read More


Social Engineering: Attacking Victims with Kindness

Have you ever encountered someone that you have never met, but they treat you as if they were your best friend? You know, the kind of encounter that makes you think to yourself, “Should I remember this person from somewhere?” Have you ever found a complete stranger striking up a conversation with you on a…
Read More


Do You Have a Good Plan for Your IT Initiatives in 2017?

The end of the year and holidays spell a busy time for many. Like most people, you probably just wanted to survive and get through it. Now that it is 2017, you can get back to business and think about a few things you may want to include in your IT plans for 2017. Information…
Read More