Is your IT person holding the network hostage?

Problems with your PC Support and IT staff “Step 1: Change all the passwords…” This is an inside joke for IT professionals.  It refers to job security.  If you are the only person who has the keys, your management will think twice before they fire you.  With that level of job security, you can close …Read More…

4 mistakes people make when hiring a computer services company

  Mistake #1: After choosing an IT support provider, you no longer need to be involved in the management of them. As with any department you manage, your IT support provider will need oversight as well as clear and consistent communication. When you stop being involved with your IT support provider, expectations are not clearly …Read More…

What you should know about Cloud Computing and Office 365

Traditionally, if you needed a new server for your business, you bought an expensive piece of equipment, screwed it into a rack, turned it on, and installed the software. Now we have cloud computing, which makes the server software independent from the equipment.  You could have ten servers worth of software running on one piece …Read More…

The Ultimate Way to Protect Against Computer Theft

Over the last five years, hard drive encryption has become mainstream for enterprise-size businesses. I recommend encryption for any business or personal computer which holds critical information, but it is important to understand that it only protects computers that have been physically accessed – it doesn’t help against viruses or attacks against the software. How it …Read More…

Small / medium business security concerns

I recommend reading over this CNBC article about the latest trends in small business malware attacks. This is becoming more of a threat over time, and should concern all business owners. cnbc.com: A wave of new viruses is targeting small businesses   The article unfortunately doesn’t discuss defense tactics that the average small business can …Read More…

Approaches to security policy

Here are common strategies for security policy, for better or worse. Plug the Holes This approach is used by enterprises and big business – those with a $10,000,000+ budget for their IT department. Enterprises need a full-functioned network.  They need ten different versions of Microsoft servers and desktops, Office, Adobe, Internet Explorer, File sharing, Websites, and …Read More…