Tech

  • Centralize Your Security: Windows 10 Pro & Domains

    For more intents and purposes, Windows 10 effectively comes in two flavors: Home and Professional. Home is for what it sounds like it’s for—home use. Windows 10 Professional, then, is for business use. Although they are the same operating system, applying a Professional license key to a copy of Windows 10 unlocks a variety of […]

    Read more

  • Microsoft Windows 7 – End of Life Series

    Things aren’t quite so gloomy however, as long as you take steps to ensure that you’re not caught unaware of the change in Windows 7 support. Consider yourself on the way, as you’re about to complete Step 1: find out what “end of life” means and what to do about it! Throughout the life of […]

    Read more

  • Not All Email is Created Equal

    Perhaps you responded to a message on your phone yesterday, but it still shows as unread in your inbox on your laptop. Maybe your coworker sent you a calendar invite that you accepted on your computer, but it’s not showing at all when you double-check the meeting time. So much of modern business runs on […]

    Read more

  • Insider IT Threats – It’s not Just the Bad Guys Trying to Gain Access

    Insiders pose one of the biggest threats to any business IT environment—they have access to the infrastructure, understand its layout, and might even be the most motivated to inflict damage. This probably seems counterintuitive. Depending upon your place of employment, you’ve probably heard about hardware or software firewalls, multi-factor authentication, and the need for ever […]

    Read more

  • Is the Darkweb Really Dark?

    IT professionals have many loves: cable management, acronyms, mechanical keyboards—and buzzwords. In fact, much of the time, your interaction with “things IT” comes in the form of buzzwords intruding into the wider lexicon. I don’t believe many of our readers would know that SCSI is pronounced “scuzzy,” but if I were you ask you about […]

    Read more

  • Microsoft Server 2008 R2 – End of Support Series

    This month we are covering the same topic, but from the server side of things—End of Support for Windows Server 2008, 2008 R2, and SQL Server 2008. What does all that mean for you? Potentially—quite a lot! To recap—End of Support means that Microsoft is going to stop “supporting” the operating systems listed above. What […]

    Read more

  • Microsoft Windows 7 – End of Life Series

    Things aren’t quite so gloomy however, as long as you take steps to ensure that you’re not caught unaware of the change in Windows 7 support. Consider yourself on the way, as you’re about to complete Step 1: find out what “end of life” means and what to do about it! Throughout the life of […]

    Read more

  • Not All Email is Created Equal

    The beauty and curse of today’s bring-your-own-device environment is that you are constantly connected to your coworkers and clients. Having a single mail account spread across multiple devices poses a unique set of challenges. Perhaps you responded to a message on your phone yesterday, but it still shows as unread in your inbox on your […]

    Read more

  • Search Engines: 1 + 2 = 6

    Many of you reading this article remember a time before Google—when sites like Altavista, DogPile, and AskJeeves all competed to provide search results to content hungry users. Many others of you reading this article have no idea what any of those companies were—which shows the power and associated market share that Google now commands. With […]

    Read more

  • Technology Gifts to Buy for 2019

    Technology seems to be built into every common household device in one form or another. Gifts to help make a house “smarter” are a favorite. It starts at the entry way as the video doorbell allows one to view and respond to whoever is looking for their attention by connecting to a smart phone whether […]

    Read more

  • Social Engineering: More than Just Phishing

    Social engineering is the act of manipulating people by appealing to some angle of their human psyche. Phishing is the most talked about one, but other top tactics include: pretexting, baiting, quid pro quo and tailgating. Pretexting involves a scammer who has presented some sort of back story or pretense for speaking to you that sounds […]

    Read more

  • Getting the Most from Your Tablet

    So, what are all these people doing with these tablets? Some are playing games, while others are managing lives and businesses. Readers keep up with the latest information by turning to online media or new books. These are common but how about some uses that are easily overlooked. Here are a few. TV/Entertainment – Apps […]

    Read more

  • Windows 10 – Have we Mentioned that there’s an Update Available?

    For those of you familiar with Windows 10, Microsoft’s latest and greatest version of the Windows Operating System, its proclivity for installing updates (or in IT parlance, “patches”) can seem downright pernicious. Windows 10 doesn’t seem to mind if you’re in the middle of working on something—at times it feels as if it has a […]

    Read more

  • Understanding Your Data Usage for Companies like Google, Facebook

    The aphorism amongst technical people regarding companies like Facebook is that “if the service is free, YOU are the product.” Indeed, many people in the Information Technology field seemed somewhat perplexed at the outrage Facebook faced when it became clear that they were selling the data they collected on users of their services to data […]

    Read more

  • Outsourcing Your IT is Just the First Step

    Before engaging with an IT vendor you must clearly define your needs and goals. You may be savvy enough to have this information on your own but a professional company will be able to walk you through the evaluation process and present their ideas and solutions in terminology that makes sense to you. The intricacies […]

    Read more

  • An Update to Our Terms & Conditions – What is GDPR?

    Depending on your world view, you may have an enthusiastic or a rather dim view of the European Union. One area that the EU considers itself to be on the forefront of are privacy regulations, especially those concerning the Internet. At this moment, the EU covers some 508 million people, giving it the world’s third […]

    Read more

  • Protecting Your Phone

    For some it’s just a phone and easily replaced but for many it’s a tool that manages their life. A handheld device can store personal information that includes credit cards, passwords and calendars to remind the owner where to be at a given time. And even though the tool is in our possession most of […]

    Read more

  • Maximizing Employee Efficiency Through Technology

    For most SMB owners, IT is seen as a cost-center—something that doesn’t drive profits, but a bottomless pit to be filled with capital expenditure. Although this mentality had changed somewhat as technology has become more and more integrated into the day to day operations of almost any business, many people struggle to see their technology […]

    Read more

  • Understanding Your Data Usage for Companies like Google, Facebook.

    The aphorism amongst technical people regarding companies like Facebook is that “if the service is free, YOU are the product.” Indeed, many people in the Information Technology field seemed somewhat perplexed at the outrage Facebook faced when it became clear that they were selling the data they collected on users of their services to data […]

    Read more

  • 2018 Technology Trends

    In January CompTIA, the preeminent information technology trade organization, released their annual IT Industry Outlook 2018 report. Within the report I found a write up titled Small Businesses Embrace Technology, But Gaps Remain really interesting. Based on their survey of SMB’s perception of their overall IT spend they found 12% believe they are spending much […]

    Read more

  • Technology Trends – CryptoCurrency

    Many of you reading this are probably asking yourselves a similar question: what is Bitcoin? Bitcoin is what is known as cryptocurrency. The concept is a relatively simple one, but the practical implementation is anything but. Essentially, the idea behind cryptocurrency is that it provides an anonymous method of payment for digital transactions. This system […]

    Read more

  • How Reliable is Your Backup?

    In the last 3 months we have had 2 new customers come to us with significant data loss. We’re talking shut the business down loss. Thankfully in both situations we were able to recover the data but what these 2 companies also have in common is they thought they had a sufficient backup solution in […]

    Read more

  • 2017 Holiday Tech Gift Ideas

    Very popular again with additional features are devices such as Google Home and Amazon Echo to allow among other things control of music, finding information and checking weather simply by voice command. If you like to listen to your music by or in the pool, there are a number of waterproof speakers fed by Bluetooth […]

    Read more