News Release September 27, 2016 TITAN DATA SERVICES AND GREAT LAKES COMPUTER CORPORATION ANNOUNCE PARTNERSHIP TO DELIVER BEST-IN-CLASS IT SERVICES Firms Look to Deliver Unmatched, Comprehensive Managed, Backup, and Restore Services to Ohio Clients Cleveland, OH –...
Great Lakes Computer Corporation
Printer Problems: HP Firmware Update Rejects Third-Party Ink
[vc_row][vc_column][vc_column_text]Printing can be costly. There have been theories that printer manufacturers don't utilize the full ink tank, and cause you to replace your ink prematurely. From this, stemmed a new business, ink cartridge production and refilling....
Data Backup and Recovery Best Practices for SMBs
The amount of digital data that small and medium-sized businesses must process and store continues to increase exponentially, and the need for proper backup and recovery procedures is more pronounced than ever. In order to avoid expensive downtime and ruinous data...
Tired of Juggling? More Businesses Shift to Managed Services
[vc_row][vc_column][vc_column_text] 'Managed Services' as a term is often confused with the much aligned term 'outsourcing'. We're not talking about shifting your operations overseas just to cut costs or firing your trained, in-house staff for cheap labor. We're...
Smartphone Malware Infections Rapidly Rising – Protect Your Network
[vc_row][vc_column][vc_column_text]You've heard about the Bring-Your-Own-Device (BYOD) revolution in the work place. It certainly has its benefits. We are on our smartphones at home and at work and use them everywhere else we go. It makes life so easy! All of our work...
Google Amps Up Internet Security For Everyone
[vc_row][vc_column][vc_column_text] There are lots of ways that hackers can get to you. They can find you on public wifi, access data through your smartphones, and send you infected emails. But the easiest route they can take is the internet, via simple web surfing....
EMV Everywhere: All About the Chip Card Revolution
[vc_row][vc_column][vc_column_text]All of the major credit card schemes and card issuing banks have been transitioning to payment by chip card, also known as EMV. It's an older but highly secure technology that is almost impossible to hack. The move to this type of...
3 Ways Dear Aunt Sally is a Potential Data Security Victim
[vc_row][vc_column][vc_column_text]Most of our readers are computer savvy. They know the basics of how their IT works and are mindful of cyber threats and data security risks. But, we all have that relative or friend who is a late adopter of computers, networks,...
5 Signs It’s Time to Consider IT Outsourcing
[vc_row][vc_column][vc_column_text]Many business leaders assume that by handling Information Technology (IT) management in-house and having greater control over the process, they’ll be able to minimize costs and inefficiencies. It’s actually a fallacy, and here are...
4 Ways Server Monitoring Can Save You Money
[vc_row][vc_column][vc_column_text]Monitoring your company's server is critical to the smooth day-to-day operations of your business as well as maintaining satisfied clients. Unfortunately, some companies only casually observe daily issues involving the server, often...