Blog
Bring Your Own Device (BYOD)
Bring Your Own Device (BYOD) Bring your own device (BOYD) is a recent trend where employees use their personal mobile devices including: iPhones, iPads, tablets computers and smartphones to access company information including your network, email, files and critical...
What Has Your Backup Done For You Lately?
What Has Your Backup Done For You Lately? Businesses of all sizes rely on their data more than ever before. What’s more, businesses have more data to protect and backups to store than ever. Critical files, customer data, email archives and other application data run...
Data protection and security update LinkedIn
On June 7, LinkedIn disclosed that “some LinkedIn member passwords were compromised.” Per LinkedIn disclosures on their blog, LinkedIn learned that approximately 6.5 million hashed LinkedIn passwords were posted on a hacker site.
PC Repair Tips to Improve Performance
PC Repair Tips to Improve Performance Over time Windows Personal Computers and Laptops need ongoing repair to keep them running smoothly. Why waste time and office productivity when you can proactively repair and maintain your PCs for optimal performance? Here are...
Cloud Computing: Your Pre Flight Check List
Cloud Computing: Your Pre Flight Checklist Cloud computing is more than a passing trend. Cloud computing is a way for small to medium businesses (SMBs) to tap enterprise class applications and infrastructure that once only large companies could afford. Cloud Computing...
Computer Repair vs. New Computer?
Are you ready to upgrade your desktop and laptop computers? Expect lots of exciting new changes to come out later this year. Unless your needs are urgent, you may want to wait until the Fall. Here is what to expect in the new computer market, along with tips to help...
Computer Repair vs. New Computer?
Are you ready to upgrade your desktop and laptop computers? Expect lots of exciting new changes to come out later this year. Unless your needs are urgent, you may want to wait until the Fall. Here is what to expect in the new computer market, along with tips to help you squeeze the most out […]
Is Your Network Safer Than The Titanic?
One hundred years ago the ship, called “unsinkable” had its hull breached by an iceberg and caused the death of over 1500 passengers. You may think your network is “invincible” like the Titanic, however, your network security policies may cause vulnerability putting...
Why you should audit your network.
Do you know what’s connected to your network? If not, you should! Auditing your network and creating an inventory of your IT assets catalogs all devices connected to your network including PCs, laptops, printers, routers and switches. In some cases, assets discovered...
Sometimes it is easy being green.
Today is St. Patrick’s Day. Everybody is Irish for 24 hours and the color green is top of mind. Green Computing or sustainable computing is a way to use your IT Assets such as computers, printers, monitors, servers, routers and storage devices efficiently, effectively...