New & Exciting Hardware from Cisco!

New hardware releases are common in the technology field, but very few of these new hardware releases get me as excited as a couple of the products that Cisco has recently announced! Similar to other vendors, Cisco has released a variety of new technologies and solutions to kick off the new year. However, I’m most…
Read More


How Secure Will You Be Shopping This Holiday Season?

It’s almost that time of year again! The two busiest shopping days of the year are upon us, and while you’re out looking for the best deals, identity thieves are just as busy trying to steal your financial information. To help yourself stay secure, keep the following tips in mind while shopping both online or in…
Read More


OpenDNS: A Cloud-Based Security Solution for Your Business

  Cisco Umbrella, also know as OpenDNS, is a cloud based security solution that is designed to protect users while they are browsing the web.  While being filtered through the Cisco Umbrella cloud, users can surf the net with confidence knowing that they are being protected by one of the most comprehensive web security solutions…
Read More


Third Party Apps – How Secure Are They?

Third-party apps—we all use them, but do you really know the security concerns surrounding them? Many of them request access to your personal information. This includes access to your location, photos, contacts and messages. What’s worrisome is that these apps can be vulnerable to digital snoops, data breaches, and real-world thieves. The recent trend towards…
Read More


Meraki Makes It Possible to Do More with Less

When speaking to other professionals in the information technology business, it seems everyone has the same problem. They are expected to do more with less.  Be more productive with less time. Provide better computing environments with less of a budget.  Service more employees with less staff. I’m sure everyone who has been in this situation…
Read More


Can We Hack Your Password?

Passwords are the touchstone for securing access to sensitive data—both personal and professional. They are the main defense against computer hackers, protecting our identities on websites, e-mail accounts and more. They are also used for bank transactions and making secure purchases. With all of this sensitive data at stake, creating good passwords is extremely important….
Read More


Dangers of USB Devices… Securing Your Company’s Data

  USB drives, also known as thumb drives, have become a popular form for storing and transporting files from one computer to another. Their appeal lies in the fact that they are small, readily available, inexpensive, and extremely portable. However, these same characteristics make them attractive to attackers. Just look at some of the most…
Read More


How Do You Know What Your IT Department is Really Doing?

How do you know that the decisions they make and the actions they take are in the best interest of your business? Are you often uncomfortable with answers you get from your IT staff or not quite sure you buy in to what they are telling you and feel like there might be a better…
Read More


Does Your Company Have Maintenance Agreement Headaches?

It is very likely that the products you purchase today will come with some sort of maintenance agreement attached. The agreements can be attached to hardware, software, or both.  From time to time customers get comfortable with the solution they have and fail to see the many benefits of maintaining their support contract. Firmware upgrades,…
Read More


Disaster Recovery: Are You Prepared?

Hardware failures, bad patches, virus infections, malicious attacks, security vulnerabilities, and ransomware attacks are only a few of the many examples of outside forces that can interrupt IT functions. Unfortunately, many businesses find themselves caught off guard when an event happens, and they realize too late that they should have been more prepared. Ransomware alone…
Read More