How To Protect Your Data
I gave a presentation on cybersecurity recently and an attendee stated that their IT Team told him their firewall would protect them from ransomware. “FALSE!” I explained, and could see that they didn’t really believe that…
I gave a presentation on cybersecurity recently and an attendee stated that their IT Team told him their firewall would protect them from ransomware. “FALSE!” I explained, and could see that they didn’t really believe that…
There has been a large shift in technology since Windows Server 2008 was released. In 2008, virtualization was new to most organizations there was a shift from 32bit to 64bit operating systems. Now, in 2018 80%…
Website compliance has taken the spotlight lately with an increasing amount of lawsuits being filed in regards to accessibility for people with disabilities. The Americans with Disabilities Act (ADA) is a comprehensive civil rights law that…
My schedule had been overbooked and I knew that there wasn’t a moment to waste in the day. Imagine my surprise when our power company called and stated that our schedule for disconnect had been received.…
A family member recently joined an organization and was told that they would need a Gmail account since that is what the business uses. They contacted me asking if that was good business practice and my…
"What do you do again Tom?" That is the question I get from many people who I’ve met in the last few years. They are aware that we help companies with their computers, but that is…
In a session at the Orlando conference last year, Microsoft wanted to ensure that customers are on track to replace Windows 7 by January 14, 2020. Now is the time to inventory your infrastructure to determine…