[vc_row][vc_column][vc_column_text] Case Study for using AppAssure for City Government's Data Backup *The Following is a case study from Dell AppAssure. Great Lakes Computer is an Authorized Partner for AppAssure Software and Solutions. Just five miles from the Texas...
Disaster Recovery
Avoiding the Black Swan – a Guide to Disaster Recovery
[vc_row][vc_column][vc_column_text] The Black Swan Event - ready to take down your IT Systems According to our good friends on Wikipedia, a Black Swan Event is a metaphor that describes an event that comes as a surprise, has a major effect, and is often...
Taking a Proactive Stance on Cybercrime with the Right Antivirus
[vc_row][vc_column][vc_column_text] Why SMB's need to go beyond pre-installed antivirus In a climate where cyber attacks are becoming a reality for every level of business, choosing the right antivirus and antimalware is a vital part of maintaining consumer confidence...
New IT Security Threat Tactics Proliferate During First Half of 2013
[vc_row][vc_column][vc_column_text] US is most prevalent spam producing nation in 2013 The midpoint of the calendar year provides businesses with a chance to evaluate their progress so far so that they can make more accurate predictions about the six months to come,...
Cyber Criminals Targeting SMB Websites – IT Support More Critical
[vc_row][vc_column][vc_column_text] Data Backup and Disaster Recovery Growing in Importance to Small Business Survival I am continually getting phone calls and emails from colleagues and customers with stories of how they know an SMB whose website was targetted by...
Were You Surprised About The NSA?
M. Ursula Herrmann is Great Lakes Computer's guest blogger on Government IT Security. You may also recognize her from her work on Crain's Cleveland Business as a guest blogger on Network Security. Ms. Herrmann is a Network Security Analyst living in Juneau, Alaska. ...
A Lesson on IT Security – We are Under Attack!
[vc_row][vc_column][vc_column_text] Proper IT Security is the way to fight off attack. Came across this article on ComputerWorld.com and found it compelling for a number of reasons. Firstly, the message is on target. We are under attack. As the article states, last...
BYOD Forcing Creative Ways to Tackle Network Security
[vc_row][vc_column][vc_column_text] BYOD has company IT departments on edge about network security Bring Your Own Device, or BYOD, is increasingly becoming a common issue when companies address their network security needs. Whether it is laptops, smartphones, or...
IT Security: You Can Teach an Old Dog New Tricks
IT Security and cyber threats surpass terrorism as top national security concern Providing small businesses with adequate data protection is like chasing a quickly moving target, and in the past few years, the pace of that chase has only been increasing. In March of...
New Dell AppAssure Whitepaper on Disaster Recovery
[vc_row][vc_column][vc_column_text] Download the latest Dell AppAssure Whitepaper to ensure you are disaster ready Most disasters strike when you least expect them. Some – like hurricanes – give you more warning. But in either case, it’s a real problem if disaster...