Meraki Makes It Possible to Do More with Less

When speaking to other professionals in the information technology business, it seems everyone has the same problem. They are expected to do more with less.  Be more productive with less time. Provide better computing environments with less of a budget.  Service more employees with less staff. I’m sure everyone who has been in this situation…
Read More


Can We Hack Your Password?

Passwords are the touchstone for securing access to sensitive data—both personal and professional. They are the main defense against computer hackers, protecting our identities on websites, e-mail accounts and more. They are also used for bank transactions and making secure purchases. With all of this sensitive data at stake, creating good passwords is extremely important….
Read More


Dangers of USB Devices… Securing Your Company’s Data

  USB drives, also known as thumb drives, have become a popular form for storing and transporting files from one computer to another. Their appeal lies in the fact that they are small, readily available, inexpensive, and extremely portable. However, these same characteristics make them attractive to attackers. Just look at some of the most…
Read More


How Do You Know What Your IT Department is Really Doing?

How do you know that the decisions they make and the actions they take are in the best interest of your business? Are you often uncomfortable with answers you get from your IT staff or not quite sure you buy in to what they are telling you and feel like there might be a better…
Read More


Does Your Company Have Maintenance Agreement Headaches?

It is very likely that the products you purchase today will come with some sort of maintenance agreement attached. The agreements can be attached to hardware, software, or both.  From time to time customers get comfortable with the solution they have and fail to see the many benefits of maintaining their support contract. Firmware upgrades,…
Read More


Disaster Recovery: Are You Prepared?

Hardware failures, bad patches, virus infections, malicious attacks, security vulnerabilities, and ransomware attacks are only a few of the many examples of outside forces that can interrupt IT functions. Unfortunately, many businesses find themselves caught off guard when an event happens, and they realize too late that they should have been more prepared. Ransomware alone…
Read More


Revitalize Meetings and Boost Productivity with Cisco WebEx

Do you frequently walk out of a meetings frustrated because it was a waste of time?  You keep thinking If you didn’t attend the meeting you would have accomplished so much more. To add insult to injury, you had to get up leave your work space to attend said meetings right?  What about the people…
Read More


The Importance of Compliance in Your Business

In recent years, regulators and lawmakers have been enacting a growing number of regulations across numerous industries that companies need to comply with. Most of these regulations are imposed to help ensure client or consumer data is kept secure and confidential, as well as to protect critical infrastructures. Examples of such compliance include HIPAA, PCI,…
Read More


Is Your Anti-Virus Providing You The Best Protection?

It has always been best practice to have Anti-Virus (AV) on your machine although, historically, AV has been resource hungry and often a day late and a dollar short on protection. As new threats emerge, it can take weeks for a fix to be engineered, tested, and then pushed out to clients. During this time,…
Read More


Beware: Business Email Compromises are on the Rise

There are many forms of fraud in the world today, yet email continues to prove itself as the most inexpensive and popular method for distributing fraudulent messages to potential victims. Studies show that approximately 90% of all email sent worldwide are spam, spoofing or phishing attempts. Business Email Compromise (BEC) is a sophisticated form of…
Read More