by Tom | May 2, 2016 | Blog
Are you familiar with the protections in place that ensure that your digital communications remain private? What’s keeping an entity like the government from going through your emails? In the United States, the government uses a loophole in an outdated law to access...
by Tom | Apr 18, 2016 | Alerts, Blog
Do you know which database management system is used by your company’s servers? Obviously your end users aren’t expected to know the answer to this question, but this is something that you, as a business owner, need to be aware of. If you don’t keep track of which...
by Tom | Mar 20, 2016 | Blog
Saving a little on your technology can go a long ways, but cutting too many corners can lead to additional problems and expensive downtime. Here are a few ways you can cut costs without creating long term issues. Don’t be Afraid to Replace Got an older PC...
by Tom | Mar 14, 2016 | Blog
When you mention the term ‘disaster recovery,’ most people think about the big ground-shattering events like earthquakes, fires, floods, tropical storms, etc. While these natural events are certainly disasters and devastating in their own right, smaller...
by Tom | Mar 12, 2016 | Blog
Your identity has quite a lot of value, especially in the wrong hands. Security firm ZoneAlarm put together some numbers in 2011 concerning identity fraud, and it even shocked us. Let’s talk about a few of these statistics and what it means. First of all, what...