When you’re disappointed with the service and results that you’re getting from your IT services company, it’s hard to pinpoint exactly why but one reason could be that they’re understaffed and overworked. The decline may have happened over a period of years or perhaps you’re a year into your relationship and it’s become apparent that the IT company can’t deliver what they promised. Either way, when your IT services company is understaffed, it shows up in your business as frustration, recurring problems, and plain incompetence. Is this happening to you? Let’s take a deeper look at what you might be […]
Read MoreInfographic: 8 Cybersecurity Work From Home Tips
Work from home is the new normal. For many, it is likely to continue to some degree long after the COVID-19 crisis. Here are 8 cybersecurity work from home tips to protect yourself digitally. Feel free to download and distribute this infographic. Click to Download
Read More5 Things Your IT Department Should Be Doing Right Now
COVID-19 has presented your IT department with a great opportunity After spending the last few weeks managing work-from-home requests, it is time for IT departments to take advantage of empty offices and quiet networks. Often times, important items are overlooked or put off, because of concerns over user impact. Here are 5 things your IT department should be doing right now. 1. Virtual Cleanup Review user accounts, group policy objects and Active Directory. Get current on all software, firmware, and bios technologies. Perform any maintenance that was postponed because it would require a device to be rebooted. Review configurations. Test […]
Read MoreThe Mobile Device Security Risk
What’s your business’ policy for dealing with mobile device security? The immense popularity of mobile devices is inescapable, yet most small businesses have given little real thought to how best to manage them. Until recently, I shared the opinion that there often isn’t much to worry about. The amount of corporate data on mobile devices was limited (most of it to email) and we can usually remotely erase a lost device, thereby dealing with the most obvious threat. But as the usage of mobile devices has grown, so have the amount and types of sensitive information that they contain. Cloud-file […]
Read More