[vc_row][vc_column][vc_column_text] New kid on the malware block teaches SMBs old lesson Stealing account numbers and access passwords to financial resources is almost par for the course for today's malware, but according to Trend Micro, there really is something new...
Data Backup
New IT Security Threat Tactics Proliferate During First Half of 2013
[vc_row][vc_column][vc_column_text] US is most prevalent spam producing nation in 2013 The midpoint of the calendar year provides businesses with a chance to evaluate their progress so far so that they can make more accurate predictions about the six months to come,...
Cyber Criminals Targeting SMB Websites – IT Support More Critical
[vc_row][vc_column][vc_column_text] Data Backup and Disaster Recovery Growing in Importance to Small Business Survival I am continually getting phone calls and emails from colleagues and customers with stories of how they know an SMB whose website was targetted by...
Were You Surprised About The NSA?
M. Ursula Herrmann is Great Lakes Computer's guest blogger on Government IT Security. You may also recognize her from her work on Crain's Cleveland Business as a guest blogger on Network Security. Ms. Herrmann is a Network Security Analyst living in Juneau, Alaska. ...
Why Instituting Data Backup Regulations Will Pay Off in the End
[vc_row][vc_column][vc_column_text] SMB's should avoid being penny wise and pound foolish on data security and IT support According to one of the latest studies in the data security field, businesses that decry the cost of following new regulations may well be putting...
A Lesson on IT Security – We are Under Attack!
[vc_row][vc_column][vc_column_text] Proper IT Security is the way to fight off attack. Came across this article on ComputerWorld.com and found it compelling for a number of reasons. Firstly, the message is on target. We are under attack. As the article states, last...
BYOD Forcing Creative Ways to Tackle Network Security
[vc_row][vc_column][vc_column_text] BYOD has company IT departments on edge about network security Bring Your Own Device, or BYOD, is increasingly becoming a common issue when companies address their network security needs. Whether it is laptops, smartphones, or...
New Dell AppAssure Whitepaper on Disaster Recovery
[vc_row][vc_column][vc_column_text] Download the latest Dell AppAssure Whitepaper to ensure you are disaster ready Most disasters strike when you least expect them. Some – like hurricanes – give you more warning. But in either case, it’s a real problem if disaster...
Regulations Complicate Data Backup Practices
[vc_row][vc_column][vc_column_text] Cloud backup adoption in today's regulatory environment In the 21st century marketplace, information is the lifeblood of a growing number of businesses both large and small. Although this has made the need for adequate data backup...
Data Protection Case Study for Educators and Government Agencies
Great Lakes Computer is proud to call ourselves a member of Dell's PartnerAssure Program. Dell AppAssure is the industry's leading software for backup and replication for voicemail, physical and cloud comuting environments. We also have a number of government...