IT Insights & Trends

IT Insights & Trends

Simple Steps to Improve Your Company’s Cybersecurity

As a general rule, digital security—for companies and web-connected organizations of all types—is subject to all sorts of potential threats. These could come from online organized crime, hostile foreign governments, individual hackers, and fraudsters with a penchant for stealing data or funds.

Now In Sandusky! Broader Reach, Same Great Service.

Great Lakes Computer is opening a convenient new location! While the headquarters will remain in Avon, Ohio, we are adding a satellite office near downtown Sandusky. This prime spot will enable us to better serve our traditional business customers in Northwestern Ohio. This will also allow us to expand our new consumer offerings in the […]

GLC Partner, SentinelOne, Acquires Attivo Networks

It’s common knowledge that standard antivirus and firewalls are no longer enough to properly protect your business in today’s tech savvy world. As hackers and viruses become smarter, your protection needs to be stronger. So to bring our clients the best Endpoint Detection and Response program to protect their networks, we partner with SentinelOne. They are one of the best innovators when it comes cybersecurity solutions.

What to Look For in an IT Outsourcing Provider

Many small to medium sized businesses today at some point or another consider IT outsourcing. Gaining access to enterprise level IT support at SMB prices makes a lot of business sense. But, as with any vendor, it’s important to find the right Managed Services Provider for your business’ particular needs. Here are some criteria to […]

Transferring Cybersecurity Risk is About to Get Complicated

Many organizations have historically made decisions to transfer cybersecurity risk by purchasing a cybersecurity liability insurance policy from an insurance carrier. Transferring risk has become popular because the magnitude and variety of cybersecurity risk that organizations are attempting to manage is overwhelming and resources to mitigate or eliminate the risks are scarce. Obtaining insurance takes […]

Penetration Testing? What Is It and Why Do You Need It?

Risk associated with cybersecurity threats and exposures motivate organizations to implement protective controls intended to keep their digital assets safe from malicious computer hackers. Firewalls are installed at the network perimeter to keep unauthorized users from accessing the private network. Anti-virus software is installed on computers and servers to enhance overall endpoint security. Sensitive data […]

3 Reasons SMBs Need Managed Service Providers

Managed Service Providers (MSPs) are often brought in to handle specific IT tasks that small-and-medium-sized businesses no longer want their IT guy doing in-house, because they aren’t the best use of a salaried employee’s time. Projects like repetitive monitoring and maintenance tasks that can be automated are easy to hand off. But MSPs can completely […]

Why Business Cybersecurity is a Huge Problem for 2022

In an increasingly digitized world, cybersecurity is becoming an ever-growing, vitally necessary burden–and problem–for thousands of organizations. This applies to government bodies, institutions and businesses of all sizes. This isn’t just a flippant conclusion either. The World Economic Forum (WEF) recently released its “Global Risks Report 2022” and guess what subject ranked as one of […]

How to Expose (or Uncover) Your IT Security Risks

Conducting a vulnerability assessment is important because the exercise will identify security flaws that exist in your information technology environment before they are discovered by a malicious computer hacker. Once the vulnerabilities are discovered, you can correct them and lower your risk of becoming a victim of a successful cybersecurity attack.

Guest Wi-Fi – A Necessary Evil

The more windows and doors you put into a house, the more points of access a would-be intruder has. Your internet connection, your servers, your employees smartphones and laptops, and your WiFi controlled thermostat are all windows into your data infrastructure. You do your best to control who can access these and inform them of […]

Crucial Managed IT Services Benefits for Your Business

IT maintenance is fundamental for just about every business in today’s world. It’s important for the most basic reason that IT is an inescapable part of managing even a tiny company, and also for the sake of firm security. The security angle is especially vital due to the increasingly rampant expansion of cybercrime. In fact, […]

Why the NIST Cybersecurity Framework Matters for Your Business

Cybercrime is only increasing in today’s world. During the COVID-19 pandemic alone, the number of cyberattack cases has risen by a whopping 600%. The consequences of these hacks and data thefts especially affect small to medium-sized businesses since they often don’t have robust internal IT resources to fight off all possible threats. But despite internal […]

Proactive vs. Reactive IT Management

When it comes to small businesses, we see plenty of reactive IT management. There are obvious cost concerns when it comes to owning a small business, so owners wait until a problem arises before putting resources toward solving it. However, savvy business owners recognize that a proactive approach to IT maintenance can lead to greater […]

Your Essential Guide to Phishing Email Scams

Phishing is alive and kicking as one of the methods most widely used by cybercriminals for penetrating the IT networks of organizations and businesses both small and large. The reason why is simple: It works.

A Basic Guide to Cybersecurity Penetration Testing

We get asked this question all the time: What’s the best way to confirm that your business’ IT security is firmly protected? Sure, you can implement all kinds of security measures, or have someone else with plenty of professional experience do it for you. But to be even more certain, there’s another trick to try: […]

5 Ways Managed Print Benefits Your Business

When you have existing printers you’ve already bought and paid for, it’s tempting to think that maintaining your existing fleet will cost less than purchasing new printers or signing up with a managed print services (MPS) provider. Why replace them if it’s not absolutely necessary?

The Top 4 Cyberattacks of 2021 (So Far!)

Cybercrime evolves at least as rapidly as the wider digital landscapes it targets. Arguably, it’s sometimes even the faster, more agile player in the race. Key evidence of this is the simple fact that instead of shrinking, cyberattacks have only become larger and more brazen in recent years. Far from being an exception to these […]

SOC-as-a-Service: What You Need to Know

Today’s cyber criminals are clever, sophisticated, organized and typically determined to profit from the theft of sensitive data–by selling it on the dark web or by extorting organizations with ransomware and distributed denial-of-service bombardments.

Why Your Business Needs a Managed Services Provider

How secure is your business from cyber threats? Take a look at some of these latest cybersecurity statistics: As of late 2021, the number of malware infections against individual computers and business networks has increased by over 2000% since a decade ago. Roughly 93% of these are delivered via email, and neither of these stats […]

Build a Human Firewall for Your Business

Establishing a human firewall in your business is more important than you think. Consider your employees. On one hand, they are your single most important business asset. The diligence and know-how of your staff can make or break not only your bottom line, but also your company’s ability to serve its customers securely. On the […]

Simple Solutions to Productivity Blockers

Technology makes our lives easier… most of the time.  But sometimes, getting that technology to work the way it should when it should takes more work than we’d like it to. How often have you been held up because your office printer is giving you error messages or failing to sync with your laptop? Ever […]

How to Protect From Threats While Using Microsoft Office 365

Microsoft Office 365 is used by thousands of organizations and individuals through its Consumer, Small Business and Enterprise versions, and cyber criminals have taken notice of this. Consequently, just as these hackers have attempted data breaches through other cloud services, they’ve done the same with Office 365 products. One example of this is the fact […]

15 Must-Dos to Protect Your Business from a Cyber Attack

Cybersecurity is more critical now than ever. Those seeking to access your information are constantly upping their game. Whether they slip in through the backdoor with a simple malware-laden phishing email or they quietly enter through your network and encrypt your data, you need to be prepared. What can you do to prevent data loss […]

The Ransomware Tide is Rising

Ransomware has been a problem for businesses, individuals and organizations for years, but it has reached endemic proportions in the last couple of years. According to U.N. Findings, since the COVID-19 pandemic, email-based malicious attempts on organizations have risen by a whopping 600% or more.

What are Managed IT Services?

Managed IT services are growing at a rapid rate, with a recent survey estimating that almost 69% of small to medium-sized businesses (SMBs) hire at least one type of IT service provider. So what are managed IT services, how do they work, and why would companies consider using them?

3 Tips to Circumnavigate a Skills Deficit and Improve Your Security

Despite the fact that cyberthreats have never been more prolific or problematic, the majority of organizations believe they lack the cybersecurity talent needed to stem the flow of cyberattacks. In fact, 70 percent of IT professionals think there is a shortage of cybersecurity expertise.

Focus on Business Development By Hiring a Managed Services Provider

Professional IT services definitely have a niche for themselves in the U.S. small business landscape: Of the roughly 3.7 million small businesses operating in the United States currently, over 57% of them feel a strong need to improve their existing IT infrastructure. This means improvements to the quality of their security infrastructure, IT staffing and […]

7 Tips to Keep Your IT Cool in the Heat

Don’t be fooled by brisk morning temperature drops–there are still many hot days to come this summer. Your IT hardware wants to stay as cool as you do and a spike in temps can lead to overheating, which can cause a lot of issues for your business network and data. We’ve put together seven simple […]

Reduce Costs With Managed Print Services

Saving money on budgetary expenses is something that any business needs to stay competitive and keep profitability as high as possible. This applies especially when cost savings can be achieved without biting into the quality of product or service that customers receive. There are many ways to pull this off, but one of the more […]

Simple Tips to Keep Your Business Data Safe

Business data is vital to keep safe given increasing threats in the marketplace, such as identity theft and various forms of financial fraud. Fortunately, there are simple controls you can implement to mitigate risks to your business and clients’ confidential information. Here are some tips to help you establish strong data security.

Should Your Business Outsource IT?

At least 83% of corporate IT leaders are either already outsourcing or planning to outsource their IT to professional external management services in 2021. There are more than a couple of good reasons for this. As the post-COVID economy increasingly moves towards the streamlined digitization of de-localized offices, companies worldwide are being forced to cut back […]

Small Business Security Tips

The dangers associated with email and web security continue to grow, even more so now due to the pandemic. According to one study, though 71% of Americans are still working from home today, when business returns to normal, 54% of them want to continue that. If you’re a small business considering allowing your employees to […]

The Increasingly Risky Web

It’s important for your business to have strong internet security in place, ensuring your employees are working safely and mitigating the risks.

Increase in Email Threats

Businesses face all kinds of threats every day—competitors, the economy, laws and regulations, and increasing employee benefit costs to name a few. But cyber threats are increasingly becoming one of the more common threats that companies regularly face. In fact, the FBI estimates that more than $5 billion has been lost worldwide to email scams. […]

Improving Work-From-Home Security

According to research from security software provider Malwarebytes, roughly 20% of organizations may have suffered a security breach caused by remote workers since the beginning of the COVID pandemic. This is a worrying but predictable statistic and one that could have been easily mitigated by improved security in these companies. Here are six key work […]

Email Security Event from Mimecast

We cannot stress enough the importance of protecting your company’s email accounts from spam, phishing attacks and malware. Cyber criminals continue to become more creative in their attacks, and so it’s crucial that you have proper email security measures in place to keep your business safe.

The Importance of Email Security

Email security is so crucial for businesses and organizations. It closes a gaping door to fraud, theft and network hijacking.

Phishing Email Attacks on the Rise

Since the COVID-19 pandemic heavily shifted work patterns for millions of people around the world, one of the biggest changes, particularly among white collar workers, has been a move towards working from home wherever possible. As a result, millions of employees are accessing sensitive corporate networks from outside secure office settings. Naturally enough, this creates […]

Cloud Computing in 2021

Though it launched in the late 1990s, the popularity in Cloud Computing has grown exponentially due to a little thing called COVID-19. With many employees working remotely, the need to access data and continue work operations from their homes was (and continues to be) critical to the survival of many businesses. In fact, research companies […]

Why Government Services are Turning to Managed IT Services

Today’s economic environment requires state and local government agencies to leverage IT resources if they intend to effectively control costs and streamline their services. Unfortunately, the government’s IT system faces many challenges. They include a lack of transparency due to the use of outdated technology solutions, insufficient staffing, and slow changes due to bureaucracy. To […]

The 6 Keys to an Effective SOC

Every 11 seconds. That is how often experts predict a ransomware attack on a business will occur by the end of 2021. With that in mind, businesses can no longer push cybersecurity to the side, or just put up a basic firewall. Protecting your business’s data is crucial for the safety of everyone involved, and […]

Benefits of a Managed Print Provider

Even with the digital revolution, printing is still a significant part of almost all businesses today. Nevertheless, many companies do not have a clear picture of their overall print costs. According to a white paper published by Xerox, most companies spend approximately 1 to 3% of their total annual revenue on printing. As such, print costs […]

Digital Risk: Protecting Your Most Important Asset Webinar

Data breaches are a real threat that should be taken seriously, and SMBs have a higher susceptibility of suffering a breach. It’s important to understand the potential threats, how they can affect your business, and what you can do to reduce the risks.

Understanding POS Cash Registers

Retailers handle various transactions daily, so it’s key for those businesses to be equipped with the necessary hardware and software to smoothly, seamlessly, and quickly handle large volumes of daily transactions. But which transaction-processing solution is best for your business?

Technology Preparations for an Office Move

Moving is stressful—especially when it comes to an office move. It requires careful planning and preparation, otherwise it can result in major work disruptions, sometimes halt productivity entirely for your business, resulting in income losses. Taking the time to specifically focus on, think through and plan out your company’s technology move can help avoid catastrophe.

The Changing State of Backup

Traditional backup tools have become obsolete and unable to offer reliable backup data security. Technological advancements have led to more efficient backup systems that protect businesses’ IT assets while supporting growth.

Disinfecting Your Workstation

As we continue to face the coronavirus pandemic, everyone’s safety remains a top priority. Therefore, washing our hands regularly, keeping a safe distance from one another and wearing masks is extremely important since the primary way COVID-19 spreads is through respiratory droplets in the air. However, the jury is still out in terms of if […]

Keeping Up with Your Office Printer

As the pandemic continues in this country, so does working from home for many Americans. In fact, one study shows that roughly 42% still work from home. For business owners, it presents multiple problems and required adjustments, but what many don’t think about is what does that mean for your office technology, just sitting there […]

Why IT Support Is More Critical with a Remote Workforce

According to a survey conducted by the Bureau of Labor Statistics, only around 7% of U.S. employees had access to remote work benefits as of 2019. Then the COVID-19 pandemic swept the world—and the nation. Suddenly, many companies were scrambling to support remote work forces as a way to remain economically viable during shutdowns. According to Statista, […]

2 Keys to Successful Team Collaboration Post-COVID

As the COVID-19 pandemic continues to impact the economy, companies across the globe have been forced to seek digital reforms to protect their employees and consumers. Businesses have no choice but to review and modify their operational strategies to find new ways to function.

Working from Home = Virtual Private Networking

With all that’s happening in the world right now, home is becoming the workplace for many of us. However, depending on your area of employment, that can present a number of problems.

2020 Technology Trends to Watch For

When it comes to computer technology, it’s important for business owners to stay on top of the trends—ahead even. Not only to make sure they’ve updated their software and replaced equipment with the latest releases, but to keep an eye on the bigger technology evolutions ahead to avoid being left behind.

The Trouble with People

A standard practice for businesses today is to invest in cybersecurity. However, data breaches still continue to happen daily, and compromised data is becoming more and more common. And unfortunately, it’s got very little to do with your security investment, and everything to do with the people that work for you. In fact, a recent […]

What Does EOSL Mean for Your Hardware?

End-of-service-life (EOSL) announcements can lead to concern for IT managers. Each year, IT hardware manufacturers decide they will no longer support certain models of storage, servers, or network hardware. In the wake of this, IT folks are left with some tough choices like whether they will be forced to upgrade or if they want to […]

Top 3 Ways MSPs Can Help Your Business

Old technology, backup issues, millions of cables…. The list goes on and on of all the common IT problems businesses face. And often, owners don’t have time to deal with them. They just need the problem quickly fixed so work can continue. For small businesses who don’t have an IT department, what’s the solution? A […]

Windows 7 End of Life is January 14th, 2020

On January 14, 2020, Windows 7 will reach end-of-life (EOL) and will no longer be supported by Microsoft. If you haven’t started mapping out your migration to Windows 10, it’s time to act. Once a product reaches its end-of-life, no new features or fixes are released for it – however Microsoft did announce in September it […]

The Newest Malware – Fake Windows 10 Update

Great Lakes Computer is always on top of the latest cyber attacks and there’s a new one to beware of – the fake Windows 10 update. Portrayed as a critical update, this ransomware will install an executable .NET file that will infect your computer and request that you make a payment to recover your data. […]

The Zero Trust Model for SMB IT Security

Protecting your business from cyberattacks is something to take seriously—especially for small businesses. With the speed of their growth and their often-limited budgets, small companies often have to prioritize items and sometimes, having a strong cybersecurity system can feel less important—but that kind of thinking couldn’t be more wrong. Smaller businesses make up almost half […]

Office Space: Modern Trends in Workplace Layout

There are many decisions to be made when running a business – branding, staffing, marketing and operations are all important. But you need a place to operate and you want to choose the office arrangement that best fits your requirements. Will you lease a traditional office space? Or perhaps it’s a shared office or a […]

The Dark Web: What is it and why should you care?

When you hear about the Dark Web, you may think the very idea is based on fiction, innuendo and fear-mongering. After all, how could it be so bad? It’s as though the boogeyman joined forces with the worst cyber stalker and decided to let loose their evil machinations by deploying thousands of malicious attacks and […]

Break Fix or Managed Services – Which makes sense for you?

If you run a business, you probably use some variation of IT hardware to do it. To keep that equipment running smoothly, you’ll run across the need for maintenance, which can come in a couple forms. Managed IT Service contracts are proactive and include ongoing maintenance, monitoring and support, while the break fix model is […]

Small Businesses Looking for Security Use Managed Services

Robust security is no longer a “luxury” that only enterprises can afford. Small businesses are at greater risk for both their limited security resources as well as their reputation for being lax in valuing strong defenses. It’s a critical weakness that cyber criminals will exploit and they know SMBs are likely low hanging fruit. A […]

Learn How to Prevent Phishing by Spotting It [An Infographic]

It’s time to get serious about thwarting phishing attempts.  While these attacks are increasing in frequency, we can decrease their success rate with just an ounce of prevention. It doesn’t matter how new the approach is, the trick is the same. It’s all about duping just that one person into clicking on a link or […]

Are Managed IT Services Right for You?

Technology plays a central role in business, making it a key component of almost every company. Staying on top of your business’s IT game can be a real challenge, as the technological environment is always changing. Overwhelmed with choices and a lack of expertise, many companies often overspend on IT without understanding which technology expenses […]

10 Questions Law Firms Should Ask Their MSP

Managed IT services for law firms has evolved from its early days of providing offshore support services, data center space and outsourced IT hardware. The strategy of managed IT services has now emerged as a valuable approach for law firms who choose to partner with an expert services provider.

Raising the Bar: How to Modernize Cybersecurity in the Legal Industry

Fifteen years ago, the Harvard Business Review asked its readers, “Can you trust your law firm?” The question then referred to whether corporate lawyers were providing sound advice to their clients. Today, it would also have to account for their approach to cybersecurity. The entire legal industry faces unique challenges in ensuring proper stewardship of […]

The Latest Ransomware Attack – SamSam

We keep abreast of the latest cyber attacks and here’s one that we’re seeing a lot of coverage on we think you should know about–SamSam.

You Hire a Mechanic for Your Car, Why not an MSP for Your IT?

For most people, owning a vehicle means you occasionally need to take your car to the shop for maintenance or repair because you simply lack the expertise–and most people don’t think twice about doing so. But, those same people are using the internet to operate their business and choosing to handle the complex management of […]

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCSAM). NCSAM is a collaborative effort between DHS and its public and private partners – including the National Cyber Security Alliance (NCSA) – to raise awareness about the vital role cybersecurity plays in the lives of U.S. citizens. At Great Lakes Computer, we understand the value of effective cybersecurity and […]

Hurricanes and Hackers – Are You Disaster Ready?

Threats to your business come in many forms, from Hurricane Florence threatening the East coast to Harvey in Accounting opening an infected email. While there are many steps you can take to reduce your exposure, it’s almost impossible to prevent disaster completely. Your best move is to have a response plan in place to help […]

What the Three Little Pigs Can Teach Us about Cybersecurity

Last night, as I was putting my kids to bed, I read them the classic children’s story, “The Three Little Pigs”. And you know what it got me thinking about—cybersecurity. Probably everyone in the audience is familiar with the tale, but I’ll lay out the basics just so that we’re all on the same page. […]

Ohio Data Protection Act Just Passed. What Does It Mean for You?

Ohio legislatures just passed the Ohio Data Protection Act, which gives companies a safe harbor in the case of a data breach.  Companies that adhere to the NIST Cybersecurity Framework will be entitled to an affirmative defense to any cause of action sounding in tort that is brought under the laws of Ohio or in […]

Legal Industry Late to the Cloud, But They’re Coming.

In the early years, cloud computing was taken on by the innovators and early stage adopters. Then, as with any new tech, it spread to the mainstream. But, there are always the old guard. The ones distrustful of change. Those with the most to lose if adoption fails somehow. The legal, medical, and financial sectors […]

How to Add a Second Monitor to Your PC

We are a world of multi-taskers. At any given time, you might have more than 10 windows open on a single screen. Maybe it’s time to give your eyes a little breathing room. Here’s how from an article on PC World: Step 1 The first part is easy. Simply connect your second monitor to a […]

Beware the Costs of “Free” POS Systems

Everyone loves to get a deal, especially when you’re a business owner. Money you’re not spending is money that goes back into your business. However, some deals are too good to be true. Always be wary of “free” as it’s rarely true. For example, the true cost of “free wifi“. Free POS systems come at […]

Valuable, and True, Lessons Learned During an Office Relocation

Moving offices can be a daunting, but energizing, undertaking. Planning is an integral part of success, as is hiring vendors that you trust to be there for you before, during, and after the move. During the transition, there are plenty of “wish we had done X earlier” moments that are realized too late. I recently […]

Ready for a New Location? Set These Goals for a Successful Move.

Is 2017 the year you admitted you may need a bigger office? It’s easy to ignore how tight or ill-fitting your current space is when faced with the daunting task of office relocation. Moving can be full of unseen expenses and headaches. But, it can also be vital to the health of your profit to […]

Managed IT Service Trends We Expect in 2018

While there is no crystal ball we can find that can accurately predict the future, we’ve learned enough in 2017 to know what we can expect in 2018. Here we review some trends and issues we expect to arise for businesses and their Managed IT Service Providers. Cyber Attack Battlefront Moves to the SMBs The […]

Is BYOD a Threat to Your I.T. Security?

Bring Your Own Device (BYOD) is jokingly referred to in some IT circles as “Bring Your Own Disaster”.  While it offers a great opportunity to reduce costs and make employees happy, it’s still crucial to protect your organization’s data. GROWING IN POPULARITY BYOD had its genesis probably about 10 years ago with the advent of […]

How to Get Back to the Core Strength of Your Business in 2018

You got into business to do a specific thing, but there are so many other tasks that go along with operations, it’s easy to get dragged off course – IT management is a big one. Answer these questions about the last year: Did you experience downtime or data loss? Did you spend time tinkering with […]

Holiday Travel Tip for Workers on the Go: Protect Your Data

Whether you’re traveling for business or pleasure, it’s likely you’re logging in for work while on the move. Whether it’s on your smartphone or laptop, you need to be extra cautious with your internet access during the holidays. Hackers know there are terminals full to the brim with potential targets. Don’t be one of them […]

5 Ways IT Managed Services Benefit Your Business

As a Managed Services Provider, we are clearly a little biased when it comes to IT outsourcing. We know we can help alleviate the stress and burden that IT management can create for business owners. But, in case you need a more convincing argument, we’re sharing these five benefits from Tech Guru Daily. 1. Easier […]

The Latest & Greatest in WiFi Routers for Your Home

Whether you’re dealing with slow speeds or WiFi dead zones, a new router can improve your internet experience. Reviews.com spoke with networking experts and WiFi geeks to get to the root of what matters.Their top picks come with the latest protocols and recommended frequencies, have been independently tested for speed and range, and boast a […]

Heard of Fog Computing? You Will.

We’ve talked a lot about cloud computing in the past couple of years. It continues to become more prevalent in our daily lives. But, there’s a new term being added to the mix when it comes to the cloud, “fog computing”. Here’s a quick run down of just what that term means. Where the cloud […]

7 Reasons to Outsource Your IT and 3 Potential Risks

As a business owner, you’ve certainly considered outsourcing some of your business functions because you simply don’t have bandwidth to handle them all. This is a simple call for things like accounting and contracts. But, your IT management can always be a little intimidating to release control over. Here are seven reasons you should consider […]

Cloud Computing’s Most Important Benefit

There are many benefits that come with operating in the cloud – increased uptime, automated backup, automatically updated software – to name a few. But, the most important one is the hardest to actually quantify. Cloud computing’s biggest boon to your business is productivity. It’s the streamlining of your communications and data flow. Here are […]

5 Characteristics of Best-in-Class IT Support

Smart SMB owners are learning a valuable lesson that is leading to increased productivity and cost savings. It is simply this – do what you have expertise doing, and allow others to do the same. You hire an accountant for your taxes. You hire an attorney for your contracts. Doesn’t it make sense then to […]

Evaluate Efficiency when Making Plans for 2018

We’re almost to the halfway mark in the fourth quarter of our business year. This is a great time to assess your business operations and make plans for the upcoming year. Here are some tips on how you can become more efficient in the new year. Identifying wasteful or inefficient processes is a great place […]

5 Must-Dos for an Easier Office Relocation

While reasons for office relocation can be exciting, the actual moving can be a major headache. But, there are plenty of ways you can make the whole process a little smoother. Here are five simple tips to help. 1. Label everything. Every box needs a label that outlines the contents and where it should go […]

Step One in Gaining Control of Your Print Expenses

You’ve identified that you are potentially pouring money down the drain when it comes to your printing, be it documents, labels, or any other ink to paper medium. You can’t just tell everyone to reduce what they print. You need a plan. Here is step one. Assess Your Current Print Environment. From BizTechMagazine.com: The first […]

The Seamless Future of Mobile POS Systems

There have been plenty of blockbuster movies that have shown us what the future of retail shopping could look like. In the Minority Report, eye scanners identified customers walking through the door and projected holograms of sales catered to the shopper. In Wall-E, shoppers never have to leave their hover chairs as they simply request […]

Outsourcing Your Printing Makes Smart Business Sense

If your business is reliant on printers, for documents, labels, blueprints, or anything else, you know how much time and money can be wasted on print. You can potentially benefit from Managed Print Services (MPS). These services include a wide range of activity and supply management that can save you money. Here we make the […]

How to Determine the Lifespan of Your Server

When you buy a car, you have a number in your head of the miles you expect to get out of it before the parts start to fail. You use that number to weigh the price of the vehicle. When investing in server equipment, you may be tempted to try a similar tact, replacing miles […]

Create a Culture of Security in Your Office

Even with the most robust security measures available, one uninformed employee can open the door to catastrophic data loss with the click of a mouse. In our current threat environment, you need more than strong software, you need smart practices and trained people. Creating a culture that values data security in all aspects of your […]

Choosing the Best POS System for Your Business

There are no shortage of options when it comes to Point-of-Sale systems, which is good because every business has its own needs. While there are many differences, there are some commonalities that any user should expect in today’s market. We’ll outline the features you should demand as well as share some top picks based on […]

The Latest News in Ransomware

Ransomware is a hot topic these days. We’re seeing it in the headlines far more than we’d like. The trick about digital attacks like this, and most malware attacks in general, is the ever-changing nature of them. The ransomware attacks we saw a year ago aren’t the same as they are today. Here’s an update […]

Cyber Security Awareness Month: 7 Simple Steps to keep You Cyber Safe

Hooray! October is here and that means it’s National Cyber Security Awareness Month. You may not be as excited as us, but you should still do your part and be aware of how you interact online. The more interconnected we become online, the more windows of opportunity created for cybercriminals. So let’s do our part […]

Hackers Build Backdoor into CCleaner App

A new hack has been announced and it’s affecting over 2 million users. The infected application is called CCleaner and it’s one that even we have mentioned in the past because it’s free and works well to run file clean up to remove clutter from your hard drive. But, as with so many other breaches, […]

The Why, What, When, & Who of Preventative Maintenance

We are all guilty of losing track of the last time we cleaned our printer jets or dusted our PC fans. Preventative maintenance is one of those tasks that quickly gets lost in the shuffle. When we get a new piece of hardware, we vow this time will be different, but it never is. Preventative […]

The Obvious and Unseen Savings of Managed Print

If you leave kids alone in a kitchen to make themselves dinner, there is likely to be some unexpected use of food and utensils and plenty of unnecessary waste. When it comes to printing, if left unsupervised, your staff will do the exact same. It’s easy to be wasteful when it’s not you footing the bill, which […]

Why the Manufacturing Industry Wins with Managed Services

Manufacturing operations rely on IT for just about everything. When you have machines doing your work, you rely on other machines to control them. IT is part of production, logisitics, supply chain, customer interaction, and more. If it’s a large organization, as manufacturing companies tend to be, there will likely be multiple locations as well […]

What to Do in the Wake of the Equifax Security Breach

The Equifax breach is a big one. The company holds the credit reports of over 143 million US consumers, and those reports have all our most valuable information. They are suggesting that you should not wait to determine if your information was breached to take action to prevent identity fraud. You should start with the […]

5 Tips on How to Choose a Managed Print Provider

You give your business the most value by sticking with your core competencies. Eliminating some of the other business functions through outsourcing can be a great way to free up your schedule to focus on the important parts. One commonly identified bottleneck in any business owner’s day is dealing with print-related issues. But, how do […]

How to Make More Money While Doing Less

We’ve certainly got your attention with that headline, right? Too good to be true? Not at all. Entrepreneurs are known for having great ideas, but they are equally notorious for thinking they can do it all. Many SMB owners are the first to admit that they “wear many hats”. They tend to hold the reigns, from […]

Data Security Warning: Hurricanes Bring Out the Scammers

In the wake of Hurricane Harvey, and with the predictions for Irma, we want to remind our readers to keep vigilant about protecting their data. Hackers use the confusion and swell of donation requests as a window of opportunity to send phishing emails. Want to learn how to protect yourself from these attacks? Read our blog […]

Lenovo Innovations Making Sci-Fi a Reality – An Augmented Reality

Lenovo makes computing equipment that is best-in-class. That’s why we are a certified supplier of their hardware. The Lenovo brand has the industries lowest failure rates, the best end-user experience, and a commitment to cutting edge technology and innovation. The latest out of Lenovo, using Augmented Reality (AR), may not be useful for your business, but it […]

Ransomware: A HIPAA Compliance Nightmare

We’ve written a lot about ransomware in the last year. It’s a serious data security risk and can cause complete data loss, even if you pay the ransom. Dealing with any data loss takes a toll on a business in terms of customer trust, downtime, lost revenue, and security. But, combine that loss with personal […]

HIPAA and the CLOUD

If you’re in the healthcare industry and thinking about the pros and cons of switching over to the cloud, then one of your top concerns is following HIPAA regulation, or ensuring the confidentiality of your patient information. So the question becomes: is it more secure switching to the cloud? This depends on a number of […]

Free Your PC from Malware with These Simple Steps

Malware is a major problem these days. It just takes one click on the wrong link or email and your PC is infected with a virus, spyware, or even ransomware. The tricky part lies in the fact that these infections may sit undetected in your machine for over three months. Maybe you’ve noticed some funnky […]

5 Things You Should Do to Your Laptop Once a Month

We have it easy. We carry supercomputers in our pockets and data processing powerhouses in our shoulder bags. We are no longer tethered to a desk, or an internet cable, or even a power cord. Our freedom has made us more productive, but too often we neglect the basic maintenance these high-powered machines need to […]

Forget Everything You Know about “Strong” Passwords

How many passwords would you guess you have? In 2007, the average was 17. It’s estimated that by 2020 we will have 207 unique logins… each!* As cybersecurity continues to be a growing concern, more password rules have been created. But, one of the men responsible for all those rules is telling us he was […]

Top Criteria for Choosing an IT Managed Service Provider

Trust is hard, especially when it comes to business because everyone has their own skin in the game. Choosing to outsource functions of your business is never a decision to take lightly. You are granting access to an outsider under the assumption they will protect your interests as well as you would yourself. Some of […]

The Upside of Office Moves

Office moves are a real glass half empty situation most of the time. There are plenty of articles on how hard relocating your offices can be. It certainly isn’t a picnic, but it’s not all schlepping and headaches. Here are a few ways to see your move as a glass half full. A Chance to […]

Lenovo Included in Gartner’s Top 25 Supply Chain Leaders

As a licensed supplier of Lenovo IT hardware, we are always proud when they receive an award. This year they climbed from the 25 spot to the 24th in the Gartner Supply Chain Leaders. We support the Lenovo brand because it has the industries lowest failure rates, the best end user experience, and their commitment […]

A Modern Office and the Integration of the Cloud

Business IT is more interconnected than ever and it’s certainly a boon to our productivity. We have talked about the many ways you can use the cloud to grow your business, but it’s mostly been in reference to your computing power and data processing. There are several ways a business can integrate the cloud from […]

5 Ways a POS System Can Enable You to Work Smarter

Retailers have it tough. They need to be open when customers aren’t at work and that means weekends, nights, and holidays. They need to manage schedules, monitor inventory, analyze sales, and simultaneously meet and exceed the expectations of the customer. If they want any type of personal life, they need to do all these tasks […]

6 Biggest Concerns of IT Experts Today

Security is one of the biggest issues IT professionals deal with. Regardless of how perfectly constructed your network architecture is, if your security is weak, it’s all for naught. With all of the headlines about ransomware and major breaches, cybersecurity is certainly at the top of the list, but it’s not our only concern. According […]

Invasion of the IoT: Your Kid’s Toys Can Spy On You

The Internet of Things is intended to make life easier by getting all of our devices interacting and working as a team. Our devices even collect data to learn our preferences so they can better suit our needs. It’s a wonderful, magical symbiotic interaction in a perfect world environment. But our world isn’t perfect and […]

Restaurant POS Terminal Business Continues to Boom Globally

Restaurant Point-of-Sale (POS) Systems are no longer the simple registers of days old. The new systems integrate mobile devices, assist with inventory and staff management, and operate in the cloud. McDonald’s is even introducing a POS with a customer facing interface allowing customers to input their own orders. With the new trend towards quick service […]

Move Over Ransomware, Wiperware Is Coming to Town

We’ve talked a lot about ransomware this year. The WannaCry attack was certainly the most notable, recently. Ransomware is a nasty piece of code that takes your system hostage until you pay the hacker whatever they demand. Then, most people assume, you get the pass key and regain control. However, it’s often advised to not […]

5 Principles of Protection for Your SMB

Small to Mid-Sized Businesses (SMBs) are natural targets for the criminally minded. SMBs have limited resources and are more likely to have gaps in their security because there just aren’t enough funds to spread around. The flip side of that issue, though, is that these smaller operations often represent the entirety of the owner’s assets, […]

Digital Forensics Finds Criminal Evidence in Auto-Correct

We live in a world where almost everything we do leaves a digital footprint. We use our phones to help us find where we’re going, pick a restaurant for dinner, find a doctor, read the news, shop online, and a million other things. Then we tell our friends about those things via text, email, and […]

Ransomware Attacks on Hospitals becoming an Epidemic

Ransomware is not a new thing. The first newsworthy attack occured almost 30 years ago, shockingly. So why is it making headlines now? The greatest strength of hackers is their ability to evolve. Every time we figure out how to prevent a data breach, they come up with a new twist on an old scam. […]

Hubs and Switches and Routers – Oh My!

The world of office IT can be a scary and intimidating one if you don’t understand the terminology. There is no shortage of complex machinery involved in the simple act of connecting people to the internet and to each other. But don’t be overwhelmed! Here’s a simple explanation of what each is and what functions […]

The Single Most Effective Deterrent to Ransomware

Are you tired of hearing the warning bells about ransomware yet? It’s in the headlines everyday, it seems. But, this isn’t just some internet hoax or overinflated issue gabbed about for the sake of news. It’s a legitimate and growing problem that is proliferating, despite the fact that internet and email users should know better […]

FBI Urges Businesses to Be Vigilant Against Cyber Threats

Ransomware and cybersecurity are big news right now, and not without cause. There have been several major breaches in the last few months that have set everyone on edge, and there’s zero likelihood we’ve seen the worst of it. In response, major agencies are publishing articles to help educate businesses and citizens on what to […]

How to Choose an Online Backup and Recovery Solution

Your company’s data is your most valuable asset, and it is in constant peril. Whether the threat comes from malware or a negliglent employee, the resulting impact of data loss is the same: lost information, lost time, lost money, and lost customers. There are many ways to protect your data, but the most effective one […]

Is Your Open Office Setup Hurting Your Productivity?

As the 90’s ended and the internet (and tech startups) exploded, the limitations of the cubicle-filled office were decidedly outdated. The walls came down and the age of “open space” work environments was born. No more walls to separate us, no more doors to keep us out, now simply a community of employees working together, […]

The 3 Most Common Plotter Problems

Plotters are complex pieces of machinery used for complicated jobs. The more complex a machine is, the more likely that issues will arise. While there are many models of plotters available, most wide-format printers run into the same main issues. Most require an expert to address, but some you may be able to take on […]

Thermal Printer Maintenance Tips You Can Use

Thermal /TTR Printers are leading the growth of print in areas such as manufacturing, distribution, and retail sectors, mainly for labels, barcodes, and tags of all types. The healthcare industry, an industry that will only continue to grow as populations increase and people are living longer, have also found that thermal printers are a great […]

Helpful Tips for Setting Up a Small Office Network

Whether you’re starting a new business, or your current one is in a growth period, a well-constructed office network is going to be a boon to your productivity. Your computer network needs to be built with your particular requirements in mind. There isn’t a great one-size-fits-all solution. Best practices for SMB network setup say you […]

Affordable & Effective Data Backup Options for SMBs

In business, your data is just as valuable as your income. In small to medium-sized businesses, this is just as true for you as big business, if not more so. Customers are trusting you over larger operations that have more resources. But, just because you don’t have a huge budget, doesn’t mean you need to […]

5 Tips for Buying Your Next Laser Printer

Buying office equipment is never fun or glamorous. But, it’s an investment that needs careful consideration nonetheless. While electronic documents and email have greatly reduced the need for physical printers, they are still a necessary piece of hardware for most office environments. There are many options available in the laser printer category and you need […]

3 Simple Reasons SMBs Need MSPs

Small-to-Mid-Sized Businesses (SMBs) are like the little engine that could. While they may be outgunned in terms of financial resources compared to larger competitors, they keep chugging along and making it work. SMB owners are, more often than not, jacks of all trades. If they want something done in their operation, they do it. That’s […]

FTC Publishes New Resource to Help SMBs with Cybersecurity

We’re seeing increasing reports of data breaches on businesses of all size. Big businesses can afford to hire their own IT security professionals and dedicate resources to prevention, detection, and remediation. But, according to the National Small Business Association, more than half of SMBs are victims of cyber attacks. The Federal Trade Commission is seeing […]

Outdated Windows Platforms at Risk for “WeCry” Ransomware

Last Friday, yet another large scale cyber attack made headlines. Known as “WeCry”, “WannaCrypt”, “WeCrypt0r”, or “WannaCrypt0r”, this latest attack was aimed primarily at enterprises, not the general public (like the Google Docs phishing attack a few weeks ago). How did the attack occur so quickly and what can be done to prevent it from […]

VPNs – Are They the Natural Next Step in Cybersecurity?

Since the beginning of time, humans have sought out new ways to make their lives easier. Early man invented simple tools to help him survive. Modern man invented the internet. It is arguably one of the most useful tools ever created because it can be used for practically every aspect of our lives and we […]

Death, Taxes, & Data Breaches? How to Manage Cybersecurity Risk.

There used to be two certainties in life: death and taxes. We think it’s time to update the saying and include cybersecurity breaches. While computers and the internet have undoubtedly improved our productivity, they have also made us more vulnerable to data theft. Here are some suggestions on how to best mitigate those risks. AntiVirus […]

Cybersecurity News: Google Doc Phishing Issue Follow Up

Yesterday was a bad day for some Google users. News spread quickly about a phishing attack within the Google system. Estimates now say only 0.1% of users were affected. But, at a billion users, that still equates to a million people that had their data security violated. Phishing attacks are nothing new, why is this […]

May the Fourth Protect You – It’s World Password Day

The 4th of May has been celebrated by Star Wars geeks for several decades. When spoken, the date bears a strong resemblance to the saying, “May the Force be with you.” This year, there’s another holiday worth geeky celebration occuring on the same date – World Password Day.  Cybersecurity is a global issue. One of […]

What Is Cyber Liability Insurance? Do I Need It?

Cyber Liability Insurance is a service more and more insurers are offering, but is it just a waste of money? The word insurance makes people cringe. It presents the age old dilemma: Are you risk averse enough to pay for something you’re not sure you’ll ever actually need? Is it a scam? Or is it […]

HIPAA Breach Leads to $400,000 Settlement

In the 2017 Experian Data Breach Industry Forecast*, healthcare is highlighted as one of the top 5 data breach trends for 2017. “Healthcare organizations will be the most targeted sector with new, sophisticated attacks emerging.” They emphasize the need to act: “Healthcare organizations of all sizes and types need to ensure they have proper, up to […]

Earth Day 2017: Sustainability Tips for the Workplace

In honor of Earth Day, we’d like to share some tips on how to ensure your workplace is operating in an eco-friendly and sustainable way. We’ve taken a few of our favorite tips from our blog posts and the web and compiled them here for you. Use the “hibernate” feature on all PCs and turn […]

Top 5 Questions About EMV Chip Cards Answered

EMV use in the US has finally taken over. We are behind many countries in adoption, but we’re getting close to catching up. Almost every POS system now has a chip reader, although they aren’t all functional yet. There has been a huge merchant and customer learning curve, but we’re getting the hang of it. […]

Fake Emails to Ignore to Protect Your Cybersecurity

Hackers can be very clever, there’s no doubt. They prey on uninformed email and internet users in the hopes of getting their malware into your network. Savvy users can spot the majority of spam emails and pop-ups pretty easily. But, sometimes we all get tricked. Here is a sample of the most recent email scams we’ve […]

4 Key Benefits of Remote Server Monitoring

As your business grows, it becomes harder to stay involved and active in every aspect of your operations. The functions that generate the most income will get the most attention. Unfortunately, if you neglect to monitor certain aspects of your business, like your server and network performance, they can fail unexpectedly and drain that income. Remote […]

An Easter Malware Warning from Homeland Security

The United States Computer Emergency Readiness Team (US-CERT), a division of Homeland Security, published an important warning this morning regarding the upcoming holiday weekend and cybersecurity: As the Easter holiday approaches, US-CERT reminds users to stay aware of holiday scams and cyber campaigns, which may include: unsolicited shipping notifications that may actually be scams by […]

EMV Adoption Leads to Surge in E-Commerce Fraud

EMV chip cards and readers were only introduced in the US in October of 2015. Yet, you already have chip cards in your wallet and use them daily. You also know, all too well, the growing pains associated with introducing this new POS technology. It has been plagued by slow processing and a slow learning […]

The Key to Preventing Costly Network Downtime

The phrase “downtime” should bring one image to mind: a pile of money burning to ash. That’s what network downtime does to your profits, destroys them. It’s difficult to fully grasp the total cost of downtime because it’s so muliti-faceted. In 2015, downtime was estimated to cost US businesses $700 Billion, that’s with a B. […]

The Ups and Downs of Contract Maintenance Agreements

If you run an office, school, lab or any other establishment that requires a sizable number of servers, computers and printers, you might be wondering about the best way to keep your equipment running smoothly for as long as possible. That equipment is no small investment! The two standard options are to sign a contract maintenance […]

6 Essential Server Maintenance Tips You Can’t Ignore

If you’re executing a good deal of programs from your server instead of the cloud, you’re going to have to provide extensive regular maintenance for your server.  Even if you don’t have to use your server much, it’s still wise to provide consistent maintenance and oversight to keep it operating smoothly. A preventative approach always […]

It’s Your Fault That Employees Are Largest Data Security Threat

Security breaches are becoming more of a promise than a threat. It is not a matter of if, it’s a matter of when. According to the Identity Theft Resource report, there have already been 300+ breaches that involved a total of over 1.3 million records in 2017. Last year they reported 980 breaches, meaning we […]

Do These BEFORE Getting Online with a New PC to Keep Data Secure

Getting a new PC or laptop is a blessing and a curse. It’s a blessing in that you get a clean slate, a fresh start. None of the old junk cluttering up your shiny new hard drive. It works at its absolute best. The curse comes when you realize nothing is set up the way […]

What Are Managed Print Services and Why Do I Need Them?

The business owner is notorious for being a “jack of all trades”. When you decide to start a business, you may not feel comfortable outsourcing tasks that you can handle yourself. But, as business grows, demands on the owner grow as well. It starts to become necessary to hand off some of the everyday maintenance […]

The High Cost of Mobility: Why Laptop Repair Costs More

It has been proven again and again, enabling a mobile workforce can be a boom to the success of all types of businesses. Business owners see increased productivity, efficiency, and employee satisfaction (and thus higher retention). All of these add up to cost savings. However, the lifeblood of a mobile workforce is the laptop and the […]

4 Best Practices for Server Documentation

Servers are complex pieces of machinery that very few people in a business generally understand. Because of this, it’s critical to have thorough server documentation in the event of an emergency. If a problem occurs with your server, you want to be able to act quickly and a well-organized manual is critical to reducing recovery […]

Staff Must Be Included In HIPAA Risk Assessment, Not Just EHR

With the proliferation of mobile and cloud computing, data security threats are a constant state of things, especially in health care. Cloud storage of electronic health records (EHR) has helped to improve quality and efficiency of care by allowing all of your doctors and specialists to seamlessly access your records and medical history. It has […]

Does Cloud Computing Violate HIPAA Compliance?

Every day more businesses are shifting some or all of their operations to the cloud, but what if your business requires HIPAA (Health Insurance Portability and Accountability Act ) compliance? Is using a cloud service provider (CSP) off the table for you because you’re now transmitting data outside your walls? The U.S. Department of Health & […]

[Infographic] The Beastly IT Security Threats – A MUST READ

Data and IT Security are at the forefront of everyone’s concerns these days. The news is overrun with headlines about breaches of corporations that you’d imagine would have tremendous security measures in place, but still fall victim to cyberattack. Then there are the cautionary tales of identity theft you hear from friends and co-workers. We need […]

5 Keys for DIY SMB Server Room Setup Success

With all the network security threats and potential government monitoring discussed in the news today, some business owners may prefer to take on their own computing management. Whether you have a small in-house IT staff or you alone represent the entirety of your IT team, setting up a server room is no easy task. Here […]

Don’t Just Pitch Your Old Computer, Protect Your Data Security

There is a never ending, revolving door of new technology these days. In with the new and out with the old happens a lot quicker than it used to when it comes to IT hardware. When you get a new PC, do you just throw the old one in the trash? Absolutely not. It’s bad for […]

How Do You Know if the Cloud is Right for You?

Let’s begin with this false statement, “Moving your IT functions to the cloud may not be right for you.” I say it’s false because moving to the cloud is inevitable. But, by adding one little word, we can make this statement true. “Moving your IT functions to the cloud may not be right for you, yet.” Fail to […]

4 Reasons You Need Managed IT Services in 2017

Maybe you’ve overlooked managed services in the past because you weren’t ready… ready to pay someone to do what you felt you could… ready to outsource control of critical business functions… ready to trust anyone other than yourself to protect your business. But, now that you’re running full-steam ahead with your 2017 plans, you realize […]

Make the Most of Your Shadow… Shadow IT That Is

Today, shadows are very front of mind. Unfortunately, Punxsutawney Phil saw his, meaning six more weeks of winter. But there’s another shadow that we’ll be seeing a lot more of in 2017… Shadow IT. Shadow IT refers to IT systems and solutions that are managed outside of the IT department in an enterprise, and often […]

Is Your Data Security Budget a Waste of Money?

When you look at your total IT budget, how much is dedicated to data security? Have you increased that budget in the last couple of years? Most companies have in response to the growing number of cybersecurity threats that have cropped up in the last few years. More threats should be fought – and won […]

Data Security Tip: January 28th is National Data Privacy Day

In a very interconnected world, it’s imperative that we remember to safeguard our data security. The National Cyber Security Alliance (NCSA), the organization that heads Cyber Security Awareness month each October, has been leading an effort to raise awareness to this issue since 2011, but the history of it goes back to 1981. Data Privacy Day […]

5 Reasons You Need Contract Maintenance for Your Hardware

When we buy new electronics, we’re faced with the decision: Do I buy the extended warranty or insurance plan? Plenty of people immediately think, “This is where they’re trying to trick me.” I get it. That extra expense wasn’t what you intended to pay out of the gate. And it’s possible you’ll never need it, and […]

Tips on Telling Your Clients You’re Moving Your Office

Making the decision to move your company is the first step in a very long and complicated process. It takes careful planning and organization to eliminate downtime and minimize impact on your business operations. Any time you are closed, you are losing money, and no one wants to do that! One of the crucial tasks […]

Ransomware: To Pay or Not To Pay?

We’ve talked a lot about ransomware in the last year. Frankly, the whole world has been talking about it as it becomes one of the leading global cybersecurity threats. The biggest problem with this type of malware is the urgency it creates. Because of an impending threat of data loss and being locked out of […]

Digital Forensics Is the New Cybersecurity CSI

You’ve certainly heard the term ‘cybersecurity’ plenty in the last year. Between the high profile cyber attacks on big box retailers to the newsworthy ransomware attacks on hospitals, if you haven’t heard it, you must be intentionally living off the grid, and we don’t blame you. Getting in front of cybersecurity issues is front of […]

Stay On Point with Proper Point-of-Sale System Maintenance

All types of businesses use Point-of-Sale systems, but each uses them a little differently. Where an automotive repair shop may just have a single, fixed terminal, a popular restaurant may have several fixed terminals as well as a series of handheld units that are constantly on the move. No matter what type of system you […]

Cybersecurity Tip: Voice-Activated Smart Hubs Are Listening

Did you get an Amazon Echo or Google Home for Christmas? They may be really nifty gadgets that make hands-free operation fun, but they’re listening to more than just your music requests. These devices have become increasingly popular for their ability to make to-do lists, play music, turn electric appliances on and off, and provide […]

Is 2017 the Year to Replace Your Server?

Every IT Manager will need to face this costly decision at some point in their careers. Some see the warning signs and put in the due diligence to research their options. Some see the warning signs but wait to take action until there is a critical failure. Some are blind-sided and have to act on […]

New Year’s Resolution: Grow Your Business with Managed Services

As we get ready to enter 2017, we think ahead to our plans for the new year. If you’re a business owner, you are hoping and planning for growth. But how do you find time to focus on the where, when, why and how to get that growth happening? You need to free up some […]

Prevent Laser Printer Jams With These 5 Tips

Paper jams can bring your productivity to a screeching halt. By taking some simple steps, you can significantly reduce the number of laser printer paper jams you experience on a regular basis. Depending on the printer, you might even go years at a time without having to fight another paper jam while processing print jobs. Use […]

Malware Alert: Mobile Banking Trojan on Android Phones

Every day new cybersecurity threats are being found. Most recently, there’s been an uptick in malware related to mobile banking. The trojan program clones your mobile banking login page and collects your login information when you enter it. And the newest variant includes a ransomware package that will then lock you out of your data as […]

7 Reasons Managers Love Managed Print

Managed Services are becoming more prolific than ever. Smart business people understand that they are the most successful when they can focus on their strengths and leave the administrative work to others. The market is responding and we are seeing a huge spike in enterprise-related managed services being offered for every business function. This is […]

Online Shoppers Beware of Malware in Fake Delivery Notifications

Online shopping is a great gift to those who prefer to skip the lines and the parking hunt, or even the need to leave home. We can get all of our holiday gifts from our smartphones. While it’s great for shoppers, it’s great for hackers too. They are constantly looking for new ways to get into […]

Malware Tip: Protecting Yourself from Phishing Hacks

Phishing is one of the most prevalent cyber attacks currently. Phishing scams are generally fake email messages appearing to come from legitimate companies, like utility companies, a bank, or the IRS. They direct you to a fake website or ask for personal information, especially account related info. Phishing attacks tend to be panic-inducing in tone to catch […]

POS Systems are Experiencing an Evolution in 2017

We’ve seen some major changes in the last couple of years to how consumers can pay for goods or services. We have moved to a credit-based society as less and less cash exchanges hands. Historically, we’ve used a credit card magnetic swipe to transmit payments. As a result of security breaches, we’ve moved to the […]

5 Ransomware Stats That Will Scare You

We’ve talked about ransomware a lot in 2016. It’s a growing, ever-evolving threat to your data security that you may not be paying enough attention to. Preventing this form of cybercrime takes a combination of robust security, in-depth education of staff, and thorough back up. If you need more convincing that it’s a threat you […]

Are You Still Afraid of the Cloud? It’s Time to Get Over It.

In the beginning of any major technology introduction, there are always plenty of hiccups. The first on board, the early adopters, tend to help weed out the kinks. As the mass market adopts the technology, they feel a greater comfort that there will be less bumps in the road. Cloud computing is proving to be an […]

SMBs Struggle with Cyber Security During the Holidays

In retail environments, 4th quarter earnings can make or break you. Business owners focus on ensuring they have enough stock to cover the demand, without creating surplus inventory. But, are they taking stock of their cyber security measures too? A blogger from ITBusinessEdge doesn’t think so. According to a study by IBM’s Resilient and the Ponemon […]

5 Common Laptop Problems and How to Repair Them

A huge chunk of the corporate world is mobile, and they need computing power that can accommodate that. Over the years laptops have gone from bulky and heavy to slim and lightweight. But, even with all the upgrades in power, size, capacity and memory, laptop problems still arise pretty regularly. Here is a quick list of five […]

Printer Problems After Windows 10 Upgrade? Let’s Fix It.

You finally made the switch to Windows 10. After the initial learning curve, you think you have a pretty good handle on it, then you try to print. Where is your printer? Why isn’t it working? You’re not the only one that’s had this happen. Here are some troubleshooting tips to help get your printer […]

Tech Tips to Reduce Energy Waste at the Office

Reducing energy waste in your office does not have to equate to a sacrifice in personal comfort or quality of workmanship. With the availability of cloud computing, many new options for minimizing energy consumption have opened up that will simultaneously increase the level of freedom enjoyed by team members. Minor changes translate into significant savings […]

Top 5 Reasons SMBs are Hiring Managed Service Providers

The Managed Service industry is experiencing a major growth trend. More and more, SMBs are realizing that in order to stay competitive with the big guys, they may need to outsource some of their functions to experts, so they can focus on their own expertise. Here are 5 good reasons to consider Managed Services, from MSPblog: […]

Tech News: Microsoft Making It Easier to Get Windows 10 Updates

There are always bumps in the road when new operating systems launch. One of the biggest complaints about Windows 10 stems from trouble users are having with updates. They require too much processing, and thus eat up battery life and space on the hard drive; there is also no control on the timing of them. This could […]

Insider Tips to Make Your Office Move Easy… Easier

Moving an office is a big job. Not only do you have to pack, move, and unpack all of of your furniture and equipment, but you have to do it fast enough to limit the downtime to your customers. Every minute you’re not open, you’re losing money. When preparing for an office move, you need […]

3 Tips to Prevent Malware in Your POS System

We talk a lot about malware and protecting your computers and servers from intrusion. But, your Point-of-Sale systems are another window of weakness where cyber attacks can occur. We all remember the Target attack. More recently, Eddie Bauer found itself a victim as well. Think about it. POS Systems are ripe with valuable payment data […]

8 Ways a Complete Cloud Solution Wins

Many businesses have already recognized the value of including cloud services within their IT setup, yet one of the newest developments in the world of hosted computing is the complete cloud solution. In this model, all servers, backups, updates and even PCs themselves are hosted on the cloud, freeing your company from the need to maintain […]

Digital Ghosts Can Be a Nightmare For Data Security

As Halloween nears, we thought a ghost story would be a good idea. But, this isn’t about Casper or ghosts in the traditional sense at all. This is a new kind of haunting, one that can linger long after death if not exorcised properly. But, before you run off to the nearest Holy Water supply, let me […]

Why Law Firms Love Managed Print

Law firms are full of busy people who are heavily reliant on technology to accomplish their daily tasks. While laser printers, copy and fax machines and more are present in nearly every law office, most of these same offices lack a full-time printer technician or an IT specialist. This opens the door for potential downtime […]

Be Cyber Safe: October Is National Cyber Security Month

Since 2004, October has been observed as National Cyber Security Awareness Month (NCSAM) and was created in a collaborative manner between the U.S. government and industry in the hopes of increasing awareness regarding cyber security in general. Do you know how to protect your cyber security, and why it’s important for everyone? President Obama has […]

Ransomware Attacks Now Top Threat to Financial Industry

There have been plenty of reports of ransomware attacks over the last two years. It’s clearly on the rise. New reports show that ransomware is now the top cyber security threat to the financial industry, which tends to be the most security conscience sector. Darknews tells us more with some alarming stats. Some 55% of […]

US Gov’t Issues Malware Warning Tied to Hurricane Matthew

Weather isn’t the only threat to fear in a hurricane. Cyber criminals are using the chaos and destruction following Hurricane Matthew to take advantage of unsuspecting web users using malware and phishing scams. The US Computer Emergency Readiness Team (US-CERT) issued a press release tuesday with six preventative measures to take. US-CERT warns users to remain […]

Tips to Keep Your Thermal Printers Up & Running

Thermal printers are innovative, technological products that can provide amazing benefits for many businesses. Some companies rely heavily on their use, and extended downtime due to maintenance issues can prove very costly. In order to get the most out of your thermal printer and keep it in optimal condition for as long as possible, there […]

Easier Office Moves: Tips for Relocating Office Technology

Planning for office moves involves much more than just calling a moving truck to haul out the furniture and desks. Relocating office technology includes moving computers and servers and is perhaps one of the most critical aspects of shifting locations, as your company is almost certainly dependent on technology. Minimizing downtime is the key to […]

Tech Tips: [Infographic] Tips & Tricks for Windows 10

At Great Lakes Computer Corporation, we want our customers to feel like they are getting the most out of their computers, printers, servers, and other office technology. In that spirit, we created this quick guide for new Windows 10 users, to help readers understand all the new platform offers. We also provide some quick tech […]

5 Must Have Features of a Managed Service Provider

You’ve thought about the benefits of IT outsourcing and believe that it could be an excellent way to save money and help your business run smoothly. Great! However, did you realize that not every MSP (managed service provider) is alike? We’ve put together five must-have features of a managed provider to help you determine if […]

GLC Announces New Partnership with Backup and Recovery Experts

News Release September 27, 2016   TITAN DATA SERVICES AND GREAT LAKES COMPUTER CORPORATION ANNOUNCE PARTNERSHIP TO DELIVER BEST-IN-CLASS IT SERVICES Firms Look to Deliver Unmatched, Comprehensive Managed, Backup, and Restore Services to Ohio Clients Cleveland, OH – Today Titan Data Services and Great Lakes Computer Corporation announced a strategic partnership. The arrangement capitalizes on […]

Printer Problems: HP Firmware Update Rejects Third-Party Ink

Printing can be costly. There have been theories that printer manufacturers don’t utilize the full ink tank, and cause you to replace your ink prematurely. From this, stemmed a new business, ink cartridge production and refilling. People willing to risk using non-branded ink cartridges have been doing so for years, much to the printer companies […]

Data Backup and Recovery Best Practices for SMBs

The amount of digital data that small and medium-sized businesses must process and store continues to increase exponentially, and the need for proper backup and recovery procedures is more pronounced than ever. In order to avoid expensive downtime and ruinous data loss in the event of an emergency, take some time to review your data […]

Tired of Juggling? More Businesses Shift to Managed Services

‘Managed Services’ as a term is often confused with the much aligned term ‘outsourcing’. We’re not talking about shifting your operations overseas just to cut costs or firing your trained, in-house staff for cheap labor. We’re talking about hiring a specialist to help manage the many moving pieces of your IT infrastructure so you can […]

Smartphone Malware Infections Rapidly Rising – Protect Your Network

You’ve heard about the Bring-Your-Own-Device (BYOD) revolution in the work place. It certainly has its benefits. We are on our smartphones at home and at work and use them everywhere else we go. It makes life so easy! All of our work and our play all in the palm of our hands. But there’s major trouble […]

Google Amps Up Internet Security For Everyone

There are lots of ways that hackers can get to you. They can find you on public wifi, access data through your smartphones, and send you infected emails. But the easiest route they can take is the internet, via simple web surfing. With one click of a mouse, you can end up on an infected […]

EMV Everywhere: All About the Chip Card Revolution

All of the major credit card schemes and card issuing banks have been transitioning to payment by chip card, also known as EMV. It’s an older but highly secure technology that is almost impossible to hack. The move to this type of credit card is in direct response to major database hacks of retailers and […]

3 Ways Dear Aunt Sally is a Potential Data Security Victim

Most of our readers are computer savvy. They know the basics of how their IT works and are mindful of cyber threats and data security risks. But, we all have that relative or friend who is a late adopter of computers, networks, smartphones and the internet. They may not really understand the risks they create […]

5 Signs It’s Time to Consider IT Outsourcing

Many business leaders assume that by handling Information Technology (IT) management in-house and having greater control over the process, they’ll be able to minimize costs and inefficiencies. It’s actually a fallacy, and here are five signs you need to watch out for. 1. Your IT spending budget is unpredictable, and you need to get it […]

4 Ways Server Monitoring Can Save You Money

Monitoring your company’s server is critical to the smooth day-to-day operations of your business as well as maintaining satisfied clients. Unfortunately, some companies only casually observe daily issues involving the server, often allowing small, correctable problems to develop into major ones. Outsourcing server monitoring, which can be completed remotely with the help of advanced software […]

Tips to Transfer Files from an Old PC to a New One

Your old computer is outdated and it’s time to upgrade. You spend time researching the right machine and finally, you find just the right one. You open up the box and breathe in the scent of unused hard drives, empty caches, and perfect processing speed. But, new computers don’t stay without baggage very long. All […]

Working in the Cloud: The Pros and Cons of Office 365

Lots of people still don’t really understand cloud computing as a term. Whether you think you understand the cloud or not, you are already using it – Google, Twitter, Facebook, DropBox – all cloud software. One of the biggest cloud apps is Office 365. Many companies are singing its praises for giving their teams tremendous mobility, […]

Red Flags Warning You It’s Time For Server Maintenance

After years of providing server monitoring services, we learned to spot some common red flags. Some signs might seem subtle, but others are fairly obvious. If your business relies upon your company’s computer server for daily work, you might want to pay attention to what your machines are telling you. Consider these common signs that […]

5 Ways Managed Print Services Can Save You Money

Can you imagine how much smoother your business could run if you never had to worry about printer trouble or printing costs again? Managed Print Services (MPS) help manage every aspect of business printing, from using printers more efficiently to ensuring that machines get proactively serviced and supplied. Consider five ways that Managed Print Services […]

Cloud Covered: A Quick Guide to Cloud Computing Models

IT experts have predicted cloud computing will impact over $1 Trillion in IT spending in the next 4 years. Leading up to this announcement, you’ve undoubtedly heard a lot about cloud applications and  companies that move their entire IT infrastructure to the cloud. But it’s important to understand people use terms like cloud and cloud […]

4 Tips for POS System Maintenance

Many businesses are heavily dependent upon the performance of their POS system, which makes it paramount for them to take all possible steps to ensure that it is always operating in good condition. When POS systems fail due to misuse or malfunction it often results in frustrated customers leaving without a purchase, employee productivity plummeting, […]

How To Defend Your Network Security from 5 Wi-Fi Attacks

Network Security is serious business. There are many ways intruders can get into your network. Strong passwords are a great place to start defending your network, but you need to take it to the next level. Here are five ways Wi-Fi attacks occur and how to prevent them from NetworkWorld. 1. Lost or stolen device […]

5 Tips for a Smoother Office Move

You’ve been successful in business and your company is growing. But with growth comes expansion. Increases in staff and equipment can quickly turn your current office space from roomy to congested. Once you find a new office space, you are faced with the daunting task of relocation. Moving is never easy, and there are bound […]

Which Printer Is Right For You?: A Printer Primer.

Although sophisticated mobile technology and the development of the cloud have reduced the need for printers in many situations, most companies still need high-quality printers to power their core business processes. Printers still occupy an important place in the corporate world, and many of the new models are incorporating helpful new features that would have […]

5 Must-Have Features of Antivirus Software

Since consumers and businesses first started connecting their computers to the internet decades ago, antivirus software has been one of the most important segments of the tech industry. It’s become so ubiquitous in fact, that many people assume all antivirus software offers a similar level of protection and features, and they don’t actually pay much […]

Network Security Tip: 3 Reasons to Update Your Internet Browser

In our fast-paced technological world, updates are a necessary evil. They take up time, and sometimes they can change things we like, or change the way our apps work. Those can all lead to frustration. Does that mean we should just keep ignoring update requests? Absolutely not! Developers make these updates to improve performance and […]

6 Ways to Drastically Reduce Your Printing Costs

Printing costs can take a surprisingly heavy toll on a business, but there is much that can be done to drastically reduce the overall expense. The following six ideas will help reduce your company’s printing expenses dramatically by implementing some simple changes in your daily activities. Six Ideas to Slash Printing Costs Utilize draft quality […]

Top 4 Ways Cloud Computing Is Greener Than You Think

There are lots of benefits that come with the switch to cloud computing – reduced costs, increased data redundancy, scalability, and mobility to name just a few. But there is an often overlooked ecological benefit as well. The positive environmental effects of using the cloud can be one more reason to make the switch. Here […]

The Beauty & the Beast in the Internet of Things – Part 2: The Beast

The Internet of Things (IoT) might sound like another useless buzz word, but it’s a very real concept that is becoming a bigger part of your life every day. The interconnectivity between a huge range of objects has the power to change our society for the better, but it also presents many risks from connected […]

The Beauty & the Beast in the Internet of Things – Part 1: The Beauty

Something funny happened to the internet as we transitioned into the 21st century. It untethered itself from our desktops and laptops and found a home in everyday objects, where it began to revolutionize the capabilities of formerly disconnected devices. In Part 1 of our 2 Part blog, we tell you about the beauty created by […]

5 Ways SMBs Can Use the Cloud

Do you think cloud computing is too high tech for your small to medium sized business? If so, you are wrong. Cloud computing is useful for businesses of all sizes. It can reduce your IT costs, improve your Disaster Recovery, and be scaled to fit your needs. Here are a few ways you might consider […]

Data Security Warning: The True Cost Of Free WiFi

When you’re out and about and running up against your cellular data limit, there’s nothing quite as inviting as a sign indicating that free WiFi is available. In the age of ubiquitous broadband internet everyone is expected to be constantly connected for both personal and business communications, and public WiFi can be exceedingly convenient when […]

2 Fundamentals of Small Business Disaster Recovery

Small businesses need to prepare for disaster as much as big ones. It may be even more crucial because the statistics on small business survival after a disaster are daunting. Only 35% of small businesses have a Disaster Recovery Plan (DRP). 90% of small businesses fail within 2 years after experiencing a disaster. The experts […]

Virtual Currency: A Primer and Security Warning

Bitcoin is now so ubiquitous that you’ll frequently hear stories about the world’s most popular virtual currency on the local evening news. Bitcoin and other virtual currencies have exploded in popularity in recent years, yet many people still don’t know much about their foundations and are unaware of the dangers involved in using them. Virtual […]

7 Security Mistakes You’re Making in the Cloud

People fear what they don’t understand, and cloud computing is no exception. You may understand the general concept but don’t really understand if you need it and if it’s secure. But you are already using the cloud whether you realize it or not – Facebook, Gmail, Instagram, LinkedIn – all data stored in the cloud. […]

8 Helpful Tips to Increase Data Security in the IoT

The Internet of Things (IoT) is a marvelous idea, conceptually. All our personal and work devices talking to each other to enhance data collection and exchange, to improve how they respond to our needs and make our lives more streamlined and more efficient. Companies are looking for any way they can get their new product […]

Data Security Tip: Don’t Just Delete Spam, Teach It to Go Away

Spammers rely on catchy headlines and enticing offers to get users to click their emails. While not all spam messages contain malicious content, many do. Most email users are aware of the data security dangers of spam, but don’t give it much thought. Our email clients can generally detect most of it and automatically sweep […]

Tech Tip: Your Likes Could Be Giving the Thumbs Up to Malware

Facebook has created a currency of ‘Likes.’ They are given and received by the millions every day. Some users are stingy with their likes, some give them freely to every post they see. But, be wary of those viral posts requesting you to ‘copy and share’ or type ‘Amen!’ Not all likes or re-posts are […]

8 Network Security Practices Your Staff Needs To Know

Almost every business now stores at least some of its data digitally, with many organizations attempting to move entirely to paperless record keeping. This is allowing businesses to be leaner and more thorough in their data management, but this proliferation of digital data is also very appealing to cybercriminals. You can purchase the best available […]

Network Security Tip: Quit Changing Your Password!

Passwords are incredibly important, which is why almost EVERYTHING you access requires them. They are the first line of defense to your data. Best practices for password creation tell us to include a combination of lower and upper case letters, numbers, and special symbols, and the more random, the better. If you value your company’s […]

6 Trends in Cloud Computing You Need to Know

Companies are now realizing that adopting cloud technologies can benefit any type of organization: small or large, traditional or tech-savvy, new or established. As more and more businesses become familiar with cloud services, there is naturally going to be more curiosity about the industry. 2016 is already shaping up to be another eventful year for […]

IT Insider Tip: Beware the Windows 10 Upgrade

More times than not, we readily click “OK” on any Windows related pop up just to get rid of it. However, there’s a new pop up to be wary of. Our Help Desk Experts have gotten several calls regarding issues related to this “update” and want us to spread the word. Below are the details […]

The Multiple Manifestations of Malware

Not all malware is created equal, and the security of your data may rest on being able to recognize the various types that can infect your network. Some of this malicious code does little more than cloud the screen with popups, while other types can result in data theft and severe damage to the operating […]

6 Easy Ways to Prevent POS Touch Screen Damage

Touch screens are quickly becoming the interface of choice. They take up less space. They’re more intuitive. They speed up your work. But, they have one great weakness – humans. We’re messy, impatient, and tend to use force when we’re frustrated. Here are 6 tips from a Florida POS repair company to help keep your touch […]

Broken Pipe Leads to GLC’s Own Disaster Recovery

At Great Lakes Computer, we agree with Ben Franklin when he said “If you fail to plan, then you are planning to fail.” A thorough plan is the cornerstone of effective Disaster Recovery.  We write about it in our blog all the time. We offer Disaster Recovery backup, replication, and recovery services. We believe in […]

7 Server Maintenance Tips Crucial to Effective Operation

Servers form a crucial backbone of your company, allowing you to serve clients, store data and run your business seamlessly. In order to keep your server working well, you’ve got to forge a reliable routine that minimizes potential error and breakdown and routinizes crucial maintenance tasks. After all, prevention of common issues through a good […]

5 Simple Solutions to Your Biggest Printer Problems

Printers can be a real pain. They often don’t work quite how you’d expect and fixing them can seem daunting. Before your frustration overwhelms your better judgement,  read these 5 common printer problems and how to fix them from PCRepair.com. Problem: Printing is too slow. Solution: Rev up printer performance–and save ink in the process–by […]

Top 5 Ways to Extend the Life of Your POS System

Your point-of-sale (POS) system is crucial. When it’s working well, life is easy, but without it, business comes to a grinding halt, and you can’t even perform the simplest tasks. Don’t let that happen to you by allowing your POS to break down earlier than it’s supposed to. Here are 5 tips for extending its […]

POS Repair Tips: 5 Helpful Hints to Keep You Up and Running

POS systems are the lifeblood of many businesses, but with finicky parts such as touchscreens and printer ribbons, they are also prone to malfunctions. Having to break out the manual credit card imprint machines is the bane of both your customers and your employees, but some simple steps can help you get the most out […]

Medium Sized Businesses Targeted Due to Poor Network Security

Hackers, like the viruses they create, adapt at alarming rates. The newest adaptation involves a focus shift to medium sized businesses for cyber attacks. Big companies have the budget to install top line security measures and full IT staffs to oversee them. Medium sized businesses have a hard time keeping up, and that weakness is […]

**Data Security Alert** PC Users Told to Uninstall Quicktime ASAP

The Department of Homeland Security issued a warning to all PC owners on April 14th; Uninstall Quicktime immediately. There are known vulnerablilities in the software, and Apple has discontinued updates for it. This leaves your PC at risk to hackers. Forbes.com tells us more of the story: This alert stems from a recent call to […]

BYOD Policies Attract Younger Talent, But At What Cost?

Today’s graduates aren’t seeking out the classic 9 to 5 cubicle gig. They are looking for a flexible schedule with a greater focus on work-life balance, but they understand the price of that may be working at sporadic hours and on weekends. In order to attract this fresh talent, companies need to consider a fresh […]

Big Telecom Providers Dropping SMBs – Tech Concierge to the Rescue

In the past year, several major telecommunication providers have decided that SMBs just don’t generate enough money to keep as clients. In December of 2015, Windstream announced it would be phasing out all its SMB clients that generate less than $1,500 in monthly revenue. The customers would either have to pay a rate almost double […]

10 Items Your Disaster Recovery Plan is Worthless Without

Your disaster recovery plan is a crucial aspect of business risk management. If you want to ensure you can maintain business continuity in the face of disaster, you need a good plan in place to help see you through the rough times. Here are 10 items your disaster recovery plan needs to have, or else […]

Top 5 Best Practices for Network Security

The web we create with the introduction of newer, better technology is a tangled one. In a business setting, we not only have internal servers, but we operate on the cloud as well. We have BYOD (Bring Your Own Device) work environments where our staff are using their mobile phones and personal devices to conduct […]

Printer Maintenance Tip: Spring Clean Your Plotter

Laser plotters can be indispensable to the types of companies that use them. They can also be quite costly to purchase. This is why proper plotter and printer maintenance is crucial.  No CIO wants to be in the position of constantly calling for plotter service, let alone facing the need to replace a unit long […]

IT Forecast: Cloud Covered

It’s no secret that the growth of cloud computing has been one of the most significant stories in the tech world for several years now. At this point, even the people who would consider themselves the opposite of early adopters have at least heard of the cloud, and have some idea of how businesses are […]

Disaster Recovery Planning: Where to Start?

There’s often a great deal of cognitive dissonance on the part of business owners when it comes to disaster recovery. They think they don’t need to plan for an emergency because they doubt it will ever happen to them, despite the fact that serious data losses occur relatively frequently. Network emergencies can result in lost […]

Second Hospital Network Security Breach by Ransomware in Just Two Months

Data Backup and Recovery Saved this Hospital from Paying the Ransom A Hospital in Henderson, Kentucky is the second victim of a ransomware attack in the last two months. The first attack using the same ransomware, called Locky, took place in California several weeks ago. The hospital was locked out of its network for 7 […]

Cloud Computing, Is it as Safe as You Think?

Cloud computing isn’t just a buzz word anymore. It is where the majority of data processing and storage is headed, if it’s not already there. The cloud offers many advantages over premise-based hosting, the most important of which is Agility. The cloud is scalable and adaptable and in a fast-paced business environment, that is key. […]

4 Data Security Hacks that Hurt in 2015

The world is constantly becoming more interconnected. Modern broadband technology has brought cheap and reliable communication, increased the efficiency of many processes, and changed entrepreneurship as we know it. It has also opened the door for tech criminals to feast on the ever-expanding availability of sensitive data, and despite the many noteworthy hacking scandals that […]

Printer Repair Tip: Spring Clean that Printer!

Even the highest quality printers suffer from wear and tear and experience the buildup of dirt and grime through repeated use. These conditions occur very slowly and they can cause your printer to experience diminished performance or even render it unusable. Regular printer maintenance and cleaning is the key to extending the life of your […]

Computer Repair Tip: 10 Ways to Speed Up Your PC

There is nothing more agonizing than waiting for your computer to catch up with you. It gives bad flashbacks to using dial up modems. Are you willing to try your hand at some basic computer maintenance? The folks at Small Business Trends Magazine outline 10 ways to help you give that PC speed a little […]

5 IT Solutions That Will Increase Business Productivity

Regardless of the industry, you are in the business of business. You have customers to answer to. You have data to store that is the lifeblood of your business. Are you taking advantage of the IT solutions available to you? They can save you both money and time. Our partners at Avatara share their top […]

9 Ways to Protect Your Data Security BEFORE Connecting Your New PC

Whether you are managing your business, or your home, you probably use a computer. You use it for searching the internet, paying bills, and storing important records. Computers make our lives more efficient, but also very vulnerable. All of these invaluable pieces of information can be accessed through your network if you’re not properly protected. […]

DIY IT Support: 6 Tips To Troubleshoot Your WiFi

Ubiquitous WiFi connectivity is one of the true marvels of modern life, except when you can’t connect. Few things are more frustrating than computer problems like losing your WiFi connection, especially if you are in the middle of an important task. Instead of reaching for the phone to call IT Support immediately or waiting on hold […]

Hospital Pays Ransom to Hackers in Network Security Breach

Earlier this month, A California hospital’s IT systems were taken hostage for an entire week. The hackers inserted ransomware into the hospital’s network causing them to lose control of all of their IT systems and demanded $17,000 in bitcoin to release control. The hospital was forced to pay to regain control as quickly as possible. […]

Managed Services: The Answer to Predicting Your IT TCO?

For small business owners, budgeting for IT expenditures often proves to be one of the most frustrating tasks of running the company. You know you have to spend on essential tech that will put you in a position to succeed, but you find that unforeseen costs can mount over time, busting your original budget and […]

Computer Maintenance Tip: Clean That Case!

Computer users fret about keeping a clean hard drive to keep things running smoothly. You clean out files, run de-frag, and empty your recycling bin faithfully. But there’s physical cleaning to be done in addition to all your digital cleaning. Your PC tower generates static electricity when it runs. This static sucks in dust and […]

POS Systems; Past, Present and the Future

Point-of-sale (POS) systems are one of the most common pieces of technology in modern life, yet we don’t often stop to think about just how thoroughly they changed the nature of business transactions. What once required detailed ledger entries and mountains of paper records quickly became a streamlined operation thanks to the introduction of cash […]

3 IT Security Failings of the Internet of Things

The seamless synchronization of our multitude of network enabled devices is incredible. They “talk” to each other, sharing and gathering information to help us better understand and control the systems around us. It is the Internet of Things. To put it simply, The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings […]

The Blue Screen of Death! A Good Lesson in Data Backup.

Ack! There is nothing more frustrating, and scary, to a Windows user than the error to beat all errors—the Blue Screen of Death (BSoD for short). This error can cause major data loss for any application that hasn’t saved recently if you don’t actively use data backup. However, even though it is a major, system-wide […]

Terrorist Hackers Violate DHS Data Security, Releasing Staff Info

This week, the U.S. Department of Homeland Security suffered a major data security breach. A hacker released the names, contact info, and job titles of over 9,000 DHS employees. And they said they plan to release the same critical information of 20,000 FBI employees next. Here are the details according to an article published yesterday […]

How to Save Money on POS Repair

As much as any technological system you rely on, your POS system is the lifeblood of your organization. By facilitating sales, logging crucial data, and communicating with the bank for credit card transactions, a functioning and versatile POS system is an integral part of almost every company’s success. Like any digital platform, eventually your POS […]

8 Ways Your Computer Problems May Start With YOU!

We all complain about glitchy computers. It’s too old, it never worked right, it keeps crashing. Sometimes it is faulty or outdated machinery. But most of the times the source of our computer problems is good, old fashioned Operator Error. We found a great article from about.com sharing the many ways people screw up their […]

10 Undeniable Reasons People Hate Maintenance Contracts, But Shouldn’t

Service Maintenance contracts can feel like car insurance. You can’t say for sure when or if you’ll need the service and you mentally justify why you don’t want to waste money on what ifs. But this isn’t your car. This is your business, your livelihood. Any number of failures in your IT infrastructure can result […]

6 Tips to Make More Space in Your Hard Drive

Despite exponential growth in memory size and processing speed in computers, we still manage to fill up those hard drives faster than we’d like. The fuller your hard drive, the slower it runs. Here are 7 easy ways to free up space on your hard drive using Windows from HowtoGeek.com: Run Disk Cleanup Windows includes […]

How EMV Will Impact Your POS System

With the EMV Chargeback Liability Shift Regulations in full swing, many US merchants are still scrambling to figure out exactly how the introduction of EMV will affect their POS operations. Chargebacks have become an expensive problem for both the merchants and credit card providers, and these regulations represent an effort to reduce fraud and save […]

Tech Talk: How to Describe Your Tech Issues to a Service Professional

“It’s making a weird thump.” Your mechanic looks at you and resists the urge to slap his forehead. He has to start at square one and figure out this problem without your help, and on your dime. He’ll figure it out eventually, repair it, and then hit you with a giant bill for the time […]

The Biggest Problems With Printer And PC Maintenance … And How You Can Fix Them

We often go through the work day without thinking about the thousands of ways that technology makes doing business easier, cheaper, and more productive. The times we do tend to notice the tech around us is when something fails, causing us to curse the hardware or software error that led to the shutdown. It’s tempting […]

Questions to Ask When Choosing a Cloud Service Provider

Moving your business to the cloud can reduce costs, streamline your business’ workflow and eliminate the need for an in-house IT support staff. The cloud also makes it easy for employees to work remotely and access information from anywhere with Internet access. Although moving to the cloud is a no-brainer, choosing the right cloud service provider for your […]

Java: Innocent Plug-In or Data Security Risk

Java, a pre-installed plug-in on many pc’s, is causing data security concerns for users. Like so many programs, Java requests to be updated on a regular basis; which many people ignore. As reported by the BBC, research by the FTC has found older versions had a flaw in the update tool that “allowed hackers to […]

Common Computer Problems You Can Fix Yourself

Any time your computer breaks down, panic sets in and many different thoughts run through your head. And to make matters worse, computers always break down at the worst possible times. Before you get frustrated, the first question to ask yourself is, “can I fix this on my own?” Here’s an article from USA Today about common […]

5 Tips for Ensuring Your Data is Secure in the Cloud

Moving to the cloud is a big decision for any business, and security is an important factor to consider before making the switch. In fact, one of the biggest reasons businesses avoid making the switch is due to security concerns. However, it’s important to remember that cloud security has improved dramatically over the past several […]

Tips for Migrating to the Cloud

Migrating to the cloud is often overwhelming for business owners. Do I need to enlist outside help? What is the first step I need to take? Will my employees be on board? These are just some of the questions running through every business owner’s head before making the leap to cloud computing. If you’re wondering […]

5 Benefits Of A Contract Maintenance Agreement

Modern businesses across all industries rely on IT infrastructure, whether it be servers, desktops, printers, etc. These systems are vital to your core processes, which is why an inopportune failure of any one of them is a cause for concern. Rather than being left to improvise when your critical support systems aren’t working when you need […]

How to Effectively Work in the Cloud

Moving to the cloud is “the thing” to do in the business world, but that doesn’t mean it’s always easy. Migrating your business’ operations to the cloud may seem like a daunting task. How do you get your employees on board? What programs do you use? Should I outsource to a third-party service provider? These are […]

Up and Coming Trends in Cloud Computing

It often seems like trends in the cloud computing industry change overnight. As enterprises increasingly embrace the cloud for a variety of core processes, the industry is shaped by new entrants and forced to adapt to what clients are looking for. Here are some of the trends driving cloud computing right now. Renewed emphasis on […]

How Managed Print Services Can Help Your Business

As a business owner, you try to do it all. But even the most successful business owners know when it’s time to call in the experts. Something like printing may seem like an easy thing to do on your own, but when you rely heavily on paperwork to run your business, it can be overwhelming […]

EMV And Your POS System: Repair It Or Replace It?

The recent legislation regarding Payment Networks Liability Shift and EMV microchips is designed to reduce credit card fraud, which has been a serious problem for many U.S. merchants for decades. While it remains to be seen what effects it will have on fraud rates, this policy shift has sent many businesses scrambling to update their […]

Computer Repair: Are Music and Pictures Slowing Down Your Computer?

Every once in awhile, you notice your computer running slower than usual. Applications won’t load, it takes forever to open a document, and programs close unexpectedly. When you have a large quantity of music and pictures on your computer, it’s easy to think, “well, that must be the culprit!” But are music and pictures really […]

The Pros and Cons of Contract Maintenance Agreements

If you run an office, school, lab or any other establishment that requires a sizable number of servers, computers and printers, you might be wondering about the best way to keep your equipment up and running. The two main approaches are to sign a contract maintenance agreement with a provider who will routinely service your […]

Why EMV May Not be Reason Enough to Upgrade your POS System

Now that October 2015 is behind us, many merchants with POS systems who didn’t jump on the EMV bandwagon are feeling the pressure to upgrade. Aging Point of Sale systems that cause constant headaches are not fun and could be a good reason to upgrade, aside from the other benefits of security and chargeback liability […]

The Most Common Complaints About Cloud Computing (And The Truth Behind Them)

As cloud computing grows in popularity, many managers who are resistant to change are trotting out tired, old excuses for why they advocate sticking with the old ways of doing business. Adopting a cloud-based platform results in a period of change for an organization, as is true when any transition is undertaken. However, the numerous […]

How to Choose the Right Cloud Service for Your Small Business

Cloud computing is arguably the fastest growing trend in the IT and technology industries. By now, you likely know the benefits of the cloud and how your business could benefit from the switch, but there’s still a lot of confusion about how it works. If you still find yourself feeling a little bit confused, you’re not […]

8 Things Your Boss Wishes You Knew About Cloud Computing

Over the last decade, the way we do business has changed dramatically. So why are so many managers ties to the old methods of getting things done? People have been tied to the traditional server and PC methods of IT infrastructure for so long that sometimes it’s difficult for them to see the benefits of […]

Is Your Small Business Making These 5 Technology Mistakes?

As a small business owner, you wear many hats. From IT director to marketing coordinator to lead accountant, your job requires you to do it all. But when it comes to technology, a lack of experience can lead to pitfalls or setbacks in your day-to-day business operations, resulting in lost revenue, downtime, or even lost […]

What’s Holding Back The IT Support Industry?

Few industries have experienced greater periods of rapid change than IT support. Even as recently as twenty years ago, most employees didn’t have access to a computer, and data security was seen as storing and destroying paper documents correctly. Now, almost every user has a mobile device, and terabytes of sensitive data need to be protected […]

5 Surprising Statistics About Thermal Printers

For many industries, thermal printing has ushered in a new wave of productivity and reliability. For sectors that rely on the mass printing of labels and barcodes, such as manufacturing, retail, and shipping, thermal printers have allowed them to print better quality images faster and more efficiently. Many companies are starting to take notice, as […]

IT Support Question of the Day: Should You Shut Down Your PC at Night?

It used to be, many moons ago, that as you left for work, you shut down your big desktop computer as you were leaving, then allowed it to reboot as you waited for the coffee to brew.  With the advent of such innovations as the laptop and the Keurig, your evening and morning work routines have […]

Manufacturing IT Support: Why You Need to Embrace Technology

Today’s Manufacturing IT Support guest blog is shared from our partner at Informs: One thing is becoming clear to the modern manufacturer: if they want to continue to succeed, they must develop and execute strategies that embrace technological innovations. Increasingly, manufacturers are leveraging digital technologies, the Internet of Things, and other advances to build better […]

Considering Managed Print? 4 Things NOT To Do When Your Printer Breaks

These days, most people are moving much of their important data and documents to the cloud or other sources of secure, digital storage. It’s likely that you will still need to rely on your printer though for many crucial applications, so the frustration that comes when it’s not working when you need it most can […]

The 9 Most Commonly Misunderstood Facts About Cloud Computing

By now everyone has heard of “the cloud,” but most people tend to associate it with its namesake: i.e. a puffy white ball of nothingness that’s far away and impossible to grasp. Well, folks, the cloud is real, and it could be the answer to your computing frustrations. But not if you don’t understand it, […]

Top 5 Ways A Move to the Cloud Makes Your Business More Productive

This is a shared post courtesy of our partner, Avatara, LLC and their CompleteCloud blog, and presents 5 ways to make your SMB more productive using new technology: 1. Move to the cloud – based infrastructure.  Ok, so you saw this one coming. But don’t just take our word for it; every day, more and […]

5 Fun Facts About Cloud Computing

Cloud computing is everywhere, but surprisingly few people understand exactly what it is, or the incredible power it has to continue to revolutionize our digital landscape. Whether or not you get the gist of cloud computing, there’s always more to learn. Here are five fun facts you probably don’t know, which may just make you […]

SMB Best Practices: 7 Key Practices to Sales Success

According to Pipeline Deals, “If you’re in a small or medium-sized business, you’re always looking for an edge to maximize your sales success.”  No doubt for every SMB we encounter, especially when we are providing IT support to mission critical applications in the sales cycle. Pipeline recently hosted the Accelerate Sales Conference to bring together the top […]

5 Things People Don’t Know about Thermal Printers

Unlike traditional printing mechanisms, which use a ribbon to apply ink to surfaces, direct thermal printing uses heat sensitive paper that produces an image when it is heated. The thermal print head heats parts of the paper selectively to produce symbols, images and barcodes. Thermal transfer printers, on the other hand, do use ink as […]

Physical Security is Crucial to Your Data Security

We write about data security in our blog posts often as it is a topic that goes hand in hand with any IT Support discussion. One aspect that often is overlooked is the actual physical security of your serves and systems.  Having a lock on a door to your office simply isn’t enough.  No amount of anti-virus […]

Beginners Guide to Cloud Computing

It is imperative when transitioning to the cloud to know what questions to ask, as well as what information is necessary to share with your possible cloud computing service provider.  Some businesses make the switch with some ambiguity and no clear understanding of data, business and budgetary needs. These few tips could possibly save you […]

SMB Best Practices: Why Do You Procrastinate?

Today we share a post from our guest bloggers at Organizing4u.com as part of our Small Business Best Practices series. SMB owners have a lot on their plates, to say the least.  Procrastination can harm the success of your organization. Do you find yourself frequently procrastinating? Here are 10 strategies that may be helpful for you: 1. […]

Thermal Printers: Heating Up The Print Industry

Thermal printing is a process where images are generated digitally by applying heat to heat-sensitive thermal paper. The heat applied to the paper causes certain chemicals to change color, resulting in the desired images being transferred to the thermal paper. Due primarily to its relatively low cost and high speed of operation, thermal printing has […]

3 Questions to Ask About Your BYOD policy

Nearly half of all companies have a BYOD policy, and more are making the switch every day. Allowing employees to use their personal devices (smartphones, tablets, laptops) for work responsibilities can result in increased productivity… and increased security concerns.  We are sharing a post today from our partner at Informs, Inc. that presents 3 questions companies […]

Unique Challenges Arise With Thermal Printer Repair

Businesses across many different sectors are increasingly turning to thermal printers for their printing needs. Companies are always looking for unique ways to reduce costs and increase productivity, and thermal printing manufacturers have aligned their value proposition with these goals, resulting in rapid sales growth that is forecasted to continue for many years. While managers, […]

Is it Time For Your Business to Scrap the PC and look in the Cloud?

The PC has been a mainstay of the business world for decades, which is a rare feat in the frenetic world of technology hardware. Its form may have transitioned from towering desktops and chunky monitors to sleek, lightweight laptops, but the essence of the PC has remained intact for far longer than most pieces of […]

Warn Employees Against Ashley Madison Phishing Scams Now

The following is a Phishing Scam Alert from the KnowBe4 blog regarding the Ashley Madison breach, and while it is making 35 million+ people very nervous, it is important as a business owner or IT admin to educate your network’s users how the breach can cause some serious issues in IT environments (let alone marriages). Phishers […]

How Thermal Printing is Changing The Print Industry

Where once you had to physically visit a store or call a salesperson in order to purchase anything, now you can seemingly buy everything with just a few taps on a smartphone screen. This massive increase in the online purchasing market has resulted in a proliferation of new manufacturing and retail businesses. It’s no secret […]

Signs (and Labels) That Print is Not Dead

The global printing market is expected to top $980 Billion by the year 2018, according to a report by Smithers Group. This growth is despite the fact that many consider print to be dead, as we move towards an expanding paperless world. Consider, for example, the items and events in your life that are now […]

The Most Innovative Developments In Cloud Computing

Managers across a diverse array of sectors are increasingly turning to the cloud to manage their IT infrastructure. Thanks to exponential leaps in technology such as bandwidth speed and data compression, cloud technology is now more accessible than ever and can provide tangible benefits for almost any company. Business leaders now realize that the days […]

Don’t Make These Easily-Avoidable Mistakes With Your Disaster Recovery Plan

You may think your organization has implemented a foolproof and robust data backup plan, but it’s not until disaster strikes that the mettle of your efforts will truly be tested. Data recovery technology, like every other sector in the IT services field, continues to change at an intense pace, and as even legacy companies begin […]

Important steps to getting started with cloud computing

The following is a guest post from Avatara LLC.  Great Lakes Computer is proud to be a partner/reseller of their CompleteCloud product.  When considering a transition to the cloud, it’s important to know what questions to ask and what information to convey to your potential hosting provider in order to make your move as seamless and smooth […]

Census Bureau Data Breach Brings Up the Question of Downtime

Late last week, officials discovered the Census Bureau’s Federal Audit Clearinghouse site experienced a data breach and was hacked. Details of the hack are shared below in an article from The Federal Times. The news of another hack is concerning, but by no means a shock.  The biggest news in this recent release is that […]

Protecting Yourself Against Cyberattacks

Today’s post on IT security from cyber attacks is shared courtesy of Todd Pouliot of Gateway Financial, LLC: 25% of Americans were cyberhacked between March 2014 and March 2015. The American Institute of CPAs announced that alarming discovery in April, publishing the results of a survey conducted by Harris Poll. Disturbing? Certainly, but the instances of […]

4 Cloud Computing Myths for SMB’s

The following is a guest post from Avatara LLC.  Great Lakes Computer is proud to be a partner/reseller of their CompleteCloud product.  Despite the rapid adoption of cloud computing in government, business and our social lives, there are so many misconceptions concerning what it is and what it does. When technology is understood, the benefits […]

Ask Me about Anything: 10 Answers To Your Questions About Office 365

No matter what business you are in, the idea of not using technology is absolutely absurd. In today’s society technology is the way that businesses get into the public eye and become relevant to the audience they target. This is why having good software to help maintain your business is a great idea. A popular […]

An Introduction to Office 365

When Microsoft initially released Office 365 home, university, business, and personal it was the company stepping up their technology game. The release of a program set that works on the new tile version of Microsoft and can be usable for Mac and mobile devices showed that Microsoft wasn’t resting on their past success, but trying […]

Changes in Company Culture Accompany a Move to the Cloud

While there’s a long list of technical tasks involved in a cloud migration, one of an organization’s biggest hurdles to being in the cloud is its culture. As we discuss moving to the cloud for more and more of our clients and their applications, we are sharing this post from TechTarget entitled “Avoid culture shock in […]

What Not to Do In Your Data Backup and Recovery Plan

Assuming your company is one of the many small business that has gotten better about data security and loss prevention, you are probably ahead of the curve. According to the Small Business Administration, most companies do attempt to backup critical data, but less than 40 percent of small companies have any formal plan at all. […]

5 Costly Mistakes You Are Making With Your Backup and Recovery Plan

According to some insights from PropertyCasualty360, large businesses take disaster planning much more seriously than the majority of small businesses. However, as the Small Business Administration points out, 40 to 60 percent of small companies never reopen for business after a disaster. Since the “risk managers” in most small businesses are simply the owners or […]

Data Security: Can Hackers Take Control of Your Products & Equipment?

Could you imagine what would happen to your manufacturing company if a hacker took over your control systems? It happened to a German manufacturer. The company could not shut down their blast furnace. The damage, according to a report by Wired, was massive.  The hackers accomplished the feat by accessing the steel mill through its […]

Beyond IT Support: A Guest Blog About Organizing your Home or Small Office

In today’s Beyond IT Support blog post, we welcome guest bloggers again today from Muffy and JoEllen over at Organizing4u.com to blog about  de-cluttering our work lives – even when your work life is at home.  Here are Home Office Ideas: Do you have a home office that is in need of help?  Clearing the clutter is one […]

4 Features Of Office 365 That Will Help Jumpstart Your Small Business

As Microsoft prepares to end support and updates for its Small Business Server 2003, many professionals are exploring the cloud-based Office 365 as a potential replacement. The idea of switching from a platform with which you are intensely familiar to an unknown quantity can be a daunting task, but Office 365 offers several benefits over […]

Keeping up with Employee Demand for BYOD

If you have not adopted a Bring Your Own Device (BYOD) policy for your business, you may no longer have the luxury of delaying.  According to the article, Business trends for 2015: the mobile workforce and BYOD maturing, employee demand will be the main component of growth for BYOD: In 2015, technology, more than ever, will […]

What Does the End of SBS 2003 Mean For Me?

If you’ve been relying on Windows Small Business Server 2003 to manage your company’s IT infrastructure, it’s time to begin investigating other options. Beginning on July 14, 2015, Microsoft will end support for the mainstay OS, and many users will be scrambling to update to a supported platform. There are several options available, but you need to […]

Ransomware: To Pay or Not To Pay the Ransom?

The following post was featured on TechTarget SearchSecurity earlier this week and is being shared as we have many clients who have asked us this hypothetical question, in the hopes that the day doesn’t come that they have to know the answer. Thankfully, they are working with us and have a sound Data Backup and […]

The State of Healthcare IT Security in 2015

Have you had time to research IT security and how it can impact your healthcare company? If you haven’t, don’t worry, we’ve identified some of the risks and have listed some suggestions to help you get started: 1. Almost Half of All Healthcare Companies Have Had 1 Data Security Incident in the Past Year Did […]

5 Astonishing Data Security Mistakes Law Firms of All Sizes Make

While law firms have made significant progress in closing data security gaps, they’re still far from perfect. Take a look at some of these common mistakes many make: 1) Not Knowing Where Your Cloud Computing Services Provider Stores Your Data: Every cloud company stores data in multiple physical locations in or outside of the United […]

Rombertik Identified by Cisco as a New Suicide Virus

Rombertik is a new malware that is making data security headlines, as it collects everyday data you may enter into websites.  It specifically targets collecting the data that users type in fields on websites, such as usernames, passwords, addresses, phone numbers, etc. It is spread through phishing emails. Below is the information to be aware […]

BYOD: Companies are inviting staff to bring their own computer to work

What is BYOD? Bring Your Own Device (BYOD) is a growing trend that is helping many businesses to expand their worktime coverage and reduce costs. The concept is simple: rather than employees only using business owned computers and mobile phones, they configure their own devices to enable them to access business documents and resources. The […]

2015 Data Security: The Rise of Hacking Campaigns

Even though technology makes it harder for criminals to do their work, it’s not bullet-proof. In fact, there are many criminals equally as innovative as their private industry counterparts. So they’re fast at developing new methods for attacking your business.Take a look at some ways they might do that in 2015: 1) State-Sponsored Hacking will Continue […]

‘Ransomware’ a Growing Threat to Small Businesses

I came across an interesting article in the Wall Street Journal regarding recent advancements by cybercriminals to attack small businesses with ransomware, and essentially use malware in bogus emails to freeze SMB computer files, and demand a ransom to unlock them. You may recall we have reported on this before, dating back to 2013, but […]

5 Data Backup Myths to Ignore

The AT&T Small Business Technology poll found 9 out of 10 small businesses backup their data daily. But, you still hear stories all the time about SMBs that lose their data or don’t comply with given standards. So mistakes still happen. Don’t let yourself be a victim! Ignore these common data backup myths: 1. Onsite […]

3 Myths About Cloud IT that May Hold You Back From Its Benefits

Companies (especially law firms) of all sizes are adopting cloud computing on a greater scale than ever. But some firms have fears that are still holding them back. Take a look at them, they may be familiar to you: 1. The Cloud Costs More Than Our Budget will Allow: Most cloud apps charge an annual […]

7 Ways Cloud Computing Can Revolutionize Your Manufacturing Company

As a manufacturer, you are under constant and intense pressure to produce with speed and accuracy. On top of that, every customer interaction counts. How do you keep up with it all, running a solid business that continues to grow in reputation? 1. Add Convenience for Your Customers with Added Services: With the cloud, you […]

5 Antivirus Mistakes You’re Making Right Now

Once you get an antivirus program, you can totally forget about it, right? You don’t have to do a single thing more because the program does all the work for you…Well, yes and no. Antivirus does protect you so you don’t have to guess which links and downloads are safe, and which aren’t. But, you […]

5 Signs You’re Not Ready for Disaster Recovery

You’ve got a great disaster recovery plan in place…so you think. You’ve spent hours testing and bulletproofing it from top to bottom. To you, it doesn’t look like there’s a thing wrong. Everything on the surface looks great, but there are things you’ve forgotten to check. Even as you create your disaster recovery plan, your […]

Do I Really Need to Scrap SBS 2003 When It Works So Well?

Nobody wants to spend money on upgrading a server or moving to another solution when the one they use works so well. But with the End Of Support for SBS 2003 looming, it is, sadly, not really a choice.  I believe that this conversation on Microsoft’s TechNet sums up perfectly what many SMB’s are asking right now […]

6 Biggest IT Needs Companies Should Outsource

Your company, whether a law firm, manufacturing plant, or an SMB of any sort, has many IT issues that need to be addressed. But how do you decide which are the most important and whether you should outsource them? Take a look at this list of commonly outsourced IT problems: Computer/printer repair – If you’re […]

10 Things to Know Before Moving to Office 365

With Microsoft’s Small Business Server 2003 making its grand departure from the world of support and updates in July 2015, it is time to consider your options if you have not done so already. One option many companies are considering is Office 365, and with good reason. It is a convenient solution, great for remote […]

Top 7 Disaster Recovery Questions & Answers

What are the top questions your organization should be able to answer about disaster recovery? They might be these: 1.  Has Your Senior Leadership Bought into the Need for a Disaster Recovery Plan? If not, it’s time to start talking about one. Yes, it’s unlikely your physical location will ever be destroyed by a natural […]

6 Tips for Choosing the Best Antivirus for Your Business

If there is one good thing about viruses, it would be that they stimulate competition in the marketplace to make the best antivirus software. As a result, there are many great options to choose from. But you shouldn’t choose on brand name alone. After all, marketing can make an ineffective data protection program appear to […]

The 5 Largest Healthcare Data Security Breaches of All Time

Did you know healthcare data breaches make up 44% of all data security breaches? That makes them the most frequent data breach of all. Criminals use this information to: Buy prescription drugs and sell them on the street File false tax returns under your patient’s names Use other medical services in their name Open credit […]

Small Business Best Practice: Think Spring and Organize!

Today’s blog post is from our guest bloggers at Organizing 4 U and encourages you to “Think Spring Cleaning” with these SMB office organizational tips: Another snowy day in Northeast Ohio causes some doubt that Spring is almost here. But it really is March and it is good to know that things will be warming […]

The Complete Guide to Managed IT Services for Law Firms

How new are you to managed services for law firms? It sounds like a generic term at first, so you might not know exactly what it means. What it means in reality depends on the company too. But, it should refer to the proactive monitoring and maintenance of your IT architecture. So, your network issues […]

SBS 2003 End of Support: The Pros and Cons of Outlook 365

September 21, 2004: Windows Small Business Server’s success and soaring adoption rate are notable and is selling itself. In less than 1 year of deployment, Windows Small Business Server 2003 has outsold its predecessor Windows Small Business Server 2000 by 200 percent. July 5, 2012: Microsoft end-of-life for the SBS family, with extended support available. July […]

The Scary Malware you Probably Don’t Need to Worry About – YET

An article in pcworld.com this week entitled “Destroying your hard drive is the only way to stop this super-advanced malware” caught my attention. And with good reason. Upon reading the article two things stood out to me. The world of cyber espionage is a scary place and capabilities are getting too advanced that I really fear for […]

5 Tips for Creating Disaster Recovery Plans

57% of all small businesses do not have a disaster recovery plan ( yes 57% – you are not misreading). Now it’s true that most small businesses like yours will not experience a natural disaster that threatens your physical premises. However, it’s kind of like buying home owner’s insurance. You probably will never need it. […]

Advice on Anthem Data Breach: Monitor Your Children!

The news of the Anthem BC/BS data breach spread fast. Faster than Anthem seems to be responding to clients about it, unfortunately. But not as fast as the attackers have started to use the information stolen. Reports have already surfaced of phishing emails from the attackers to victims. There is a lot of advice being offered […]

5 (More) Deadly IT Support Sins SMB’s Commit

Most small businesses experience IT problems that are totally preventable had they taken the correct action in the first place. Who knows how many millions (billions?) of dollars get wasted each year because of this? Yet not taking wise action jeopardizes your entire business. Here are some of the most common IT support and security mistakes […]

When’s the next big data breach going to happen?

Notice that we didn’t use the word “if.” It’s the unfortunate reality we live in. The web connects people from around the globe. And for the most part, that’s a good thing. But a certain percentage of people will always misuse it for their own best interests. And you have to protect your healthcare company […]

5 of the Most Established Cloud IT Solutions of the 21st Century

Over the years, cloud-based tools have gone from something of a niche to being used on a daily basis by some of the biggest organizations in the world. What are they though, and what makes them so hugely appealing to businesses? Cloud IT solutions and based services, or cloudware, are delivered online rather than ‘on […]

3 Law Firm Data Security Breaches

“Most major U.S. law firms have been victims of security breaches, and the unwelcome threats likely operated covertly for up to nine months before they were discovered,” says the American Bar Association Journal. Sounds scary, doesn’t it? Let’s take a look at some of those breaches, and what happened: 1. Alabama Law Firm McCutcheon & […]

Top 5 Data Security Challenges You May Not Know About

Did you know hackers are not afraid to take control of your business’s equipment remotely? The US Department of Homeland Security, for example, recently investigated medical devices for exactly that flaw. In fact, a Russian hacking group, “Energetic Bear,” has made no secret of some of their attacks on US industrial control system equipment manufacturers. […]

5 Disaster Recovery Best Practices Your SMB Must Have

Can you imagine all of your business, or most of it, getting completely destroyed in a natural disaster? What would you do? To many, it seems that having a disaster recovery plan in place is not necessary. But according to Symantec, 74% of SMBs have none in place, while a dismal 21% are “extremely confident” they […]

New Report Predicts 10.1% Market Growth For Managed Print Services

A report released yesterday on CNBC indicates the Managed Print Services market is expected to grow at a compound annual growth rate of 10.1% over the period of 2015-2019. The factors driving this growth are: Eco-friendly print solutions and carbon footprint awareness Total Cost of Ownership (TCO) Increasing need for document security Here is the […]

Data Protection: 4 Best Ways to Protect Healthcare Companies from Cyber Crime

Do you want your healthcare company to be like Jersey City Medical Center, which lost the private data, including social security numbers, of many of its patients? It happened because someone lost a CD with all this data on it. And the data was unencrypted, so cyber thieves didn’t need any skill to get away […]

15 Data Backup and Protection Vows You Should Make for 2015

Happy new year from Great Lakes Computer!  I am sure your minds are a little foggy from the past 2 weeks of holiday celebrations, so I am going to get right to the point and keep my blog this week simple about data backup.  Here are 15 promises for 2015 you should make to yourself […]

Have You Heard about the Nasty “Bash” Bug Computer Virus?

Do you remember Heartbleed and all the chaos it caused? No one seems to have accurate estimates of the total damage it caused, but one cloud vendor found that it cost them around $400,000 in lost network bandwidth. It seems like you hear of a new virus that’s going to destroy the Internet almost every […]

IT Security: 4 Signs Your Manufacturing Company’s Network Has a Virus

Viruses slip by anti-virus and anti-malware protection all the time. Your users often allow them through by clicking on something they shouldn’t. Sometimes, they’re so cleverly designed that they sneak right through, regardless of how good your protection is. And if a certain cybercriminal is determined enough, they can get through with enough time and […]

The 5 Most Destructive Viruses of 2014 and Why You Need IT Support

In 2014, these bad guys have turned some companies absolutely upside-down. What are they, what did they do, and are you prepared for them? Many companies weren’t – and still aren’t. Take a look at the worst viruses of 2014 – and make sure you have great Managed IT Services in place to protect you: […]

Disaster Recovery Statistics that will Silence Your Lambs

Quid Pro Quo, Clarice:  In exchange for a few minutes of your time reading this blog post, I will provide some disaster recovery statistics for your business: 43% of companies were immediately put out of business by a “major loss” of computer records. 51% permanently closed their doors within two years. That means that only […]

4 Computer Virus Items Your Company’s Users Shouldn’t Click On

Quick: what’s one of the leading causes for all viruses any computer network gets? User error! And unfortunately, no matter how good any antivirus program is, it can’t possibly make up for every possible computer virus your users could click on. They could easily thwart your entire data protection plan with a single click! Some […]

SECURITY ALERT: Fastest Moving Computer Virus Hits Millions Worldwide

On December 6th millions were hit by what experts are calling the fastest moving computer virus ever. The data security attack hit the UK very hard, but in the world of cyber crime, it doesn’t take long to spread worldwide. Here are the details that you need to know to avoid the bug and protect your […]

5 IT Support Tips to Keep Your IT Equipment Fast and Current

Your small business absolutely needs these tips. When time and financial resources are scarce, they help you stay competitive versus other bootstrapping SMBs. What can you do to make sure your IT infrastructure serves your client’s needs, while also not driving your own costs through the roof? Here are some tips: 1. Upgrade Hardware in […]

Small Business IT Support: Ten Tips for A More Efficient Work Day

Thanks to our friends at Organizing 4 U, here are some tips that will make you a more efficient worker, and get all you need done in this shortened week of Thanksgiving.  Because even though the work week is shorter, there is no shortage of work! Ten Tips for A More Efficient Work Day: Start […]

Do You Get 100% Uptime from Your IT Support Team?

Wouldn’t 100% uptime be your ideal vision? Is it even possible to achieve in any given year? Maybe and maybe not. But you should be at least at 99.8% uptime. Get any less than that, and your healthcare business (or any business for that matter) loses a ton of capacity to serve, grow, and profit. […]

5 Consequences for Law Firms Without Disaster Recovery Plans

According to FEMA reports, 40% of businesses (or more) are affected by serious superstorms. For example, think of Hurricane Sandy. And unfortunately, many businesses, including law firms, find they are not prepared when a disaster like this strikes. In the case of Sandy, 31% of affected businesses still couldn’t operate – even 6 months after […]

Your Manufacturing Company Isn’t Safe from Data Security Breaches

You would think that, as our world grows and advances technologically, the cyber world would get even safer. But the reality is that it only becomes more difficult (not impossible) for cyber criminals to do their work. And they work just as hard at disobeying the law as the good guys do at obeying it. […]

Are You Making These 5 Deadly Managed IT Services Mistakes?

When you go out to find an IT support team, they’re supposed to be the expert, right? Well, yes and no. You have to be careful because not every third party puts your best interests first. Regardless of the type of small (or large) business you run, here are some IT mistakes you must avoid: […]

10.5 Secrets to Reduce Your Technology Costs

We welcome back fellow Northeast Ohio blogger, Brett Harney, of Corporate Technologies Group, to share their whitepaper with our IT Support blog subscribers on ten and a half secrets you can use to reduce your technology costs when it comes to your network bandwidth and connections: 10.5 Secrets to Reduce Your Technology Costs Posted on […]

4 Top Data Protection Tips for Healthcare Companies

Fact: did you know that more than 260 healthcare data breaches have affected more than 10 million patients? And did you know this happened in the span of just 2 years, from 2009-2011? This is according to the US Department of Health and Human Services. You can check the entire list of data breaches here. […]

The difference between disaster recovery and business continuity

We have been talking a lot about Data Protection, Disaster Recovery and Business Continuity.  People tend to use these terms interchangeably.  I came across this great article on Dell’s Tech Page One that describes the importance of each and the differences.  Here is the article: The terms business continuity and disaster recovery are often mistakenly […]

Warning: Your Law Firm’s Data Security Measures Aren’t Secure at All!

We’re not saying this just to scare you – it’s the truth. Even the highly conservative financial industry has already adapted to the cloud. The Legal industry as a whole, however, still lags somewhat behind. Joseph M. Burton, who writes for LawPracticeToday.org said: “The need for better cyber security, along with the responsibility to safeguard […]

3 Glaring Reasons Your Manufacturing Company Needs Managed IT Services

You hear almost every day about big companies that have millions of customer’s information hacked and stolen. There’s Target, Home Depot, and many others. But what about companies that focus on manufacturing? Well, they’re no exception to the rule. Take a look at some of the largest manufacturers and what happened: 1. Microsoft: You don’t […]

Business Decisions: When To Invest In IT Support

Running a business is no easy task. From operations to finance, it all comes down to your final decisions at the end of the day. In this ever-growing IT based world, deciding when to invest in IT outsourcing for your business is critical. And don’t worry, by the end of this you will be enlightened […]

4 Data Recovery Best Practices Your SMB Needs to Use

You love technology – until it fails. And fail it will! It’s not a matter of if, but when your data storage devices fail. Hard drives all have a certain life, and some time or another, they will fail. You know it’s important to have a data backup plan in place, and the same goes […]

Does Your IT Support Company Comply With HIPAA?

When you store and protect data regarding patient health information, you have to do so according with HIPAA’s strict standards. If you don’t, you could cost yourself $1.5 million per year in fines! At a very general level, HIPAA requires you to take appropriate measures to safeguard private health information. And if you have an […]

IT Support and Social Media – Personal and Professional Legal Advice

Today’s IT Support guest blog post is from the law office of Slater & Zurz, and is good advice for not only social media usage in SMB’s, but in our personal life.  Even when not involved in a legal dispute, it is always wise to BE CAREFUL. EVERYONE INVOLVED IN AN OHIO LEGAL PROCEEDING SHOULD […]

2 Data Security Measures Every Law Firm Must Take

As long as 5 years ago, the FBI started warning law firms that hackers specifically target them. At the time, they cited the most common hacking attempt was to use e-mails to access computer networks and steal data. The report also continued on to note these attempts had begun as early as 2007. Now in […]

Prevent a Breakdown with Routine Printer Maintenance

This is a guest blog from our friends and fellow bloggers at Market Point.  When it comes to protecting the investment in your printer fleet and safe-guarding the reliable printer performance your business depends on, the importance of routine printer maintenance cannot be overstated. Poor print quality and printer downtime negatively affects your users and your […]

5 Awful Data Security Mistakes Manufacturers Make after a Breach

I’m sure by now you’ve heard of the Home Depot security breach. If you haven’t, it could be one of the largest of all time, as it may have affected up to 60 million customers (possibly more). Estimates suggest up to $2 – $3 billion in fraud may affect these accounts. When it’s all said […]

Rising Costs A Growing IT Security Concern With Data Breaches

The following is a data protection guest post article from Manmohan Hebbar at LockLizard PDF IT Security: Whenever a data breach takes place in an organization, it serves as a cautionary note for other enterprises. IT administrators gather information from such events in order to prevent similar attacks in their organizations that can severely damage […]

4 IT Support Keys for Manufacturers

One of the main reasons for the existence of the manufacturing industry is to make components that make things easier for other people and businesses, right? So it logically follows then that IT support for you should make your own internal operations easier too. Take a look at a few important ways IT support should […]

8 Quick Data Recovery Tips for Manufacturing Companies

Do you have the perfect disaster recovery plan? Let’s say a massive fire completely destroys your business… How soon would you be able to get it up and operating again? If you have a good disaster recovery plan in place, you should experience almost no downtime at all. If you’re not already doing these, this […]

Beyond IT Support: A Guest Blog About Organizing Your SMB (and Life)

We welcome guest bloggers again today from Muffy and JoEllen over at Organizing4u.com to blog about  problems all Small business owners, make that everyone, faces.  Because no matter how reliant we have become on email, standard paper mail still exists, and not just to clutter our lives.  Here are Keys to Staying on Top of […]

What is the ideal life span for your printers?

This is a guest blog from our friends and fellow bloggers at Market Point.  Historically, businesses have purchased printers and used them until they expire, which can take 10 years or more in some cases (we know some of you still have Optra S devices from 1997 out there!). Yet, these same businesses are leasing […]

Special Edition: 4-Tips on Data Protection for Manufacturers

Your major competitive advantage versus other manufacturers could be a super-secret proprietary process. Maybe you have customer service methods that are so efficient and pleasing to your customers that you don’t want anyone else finding out. And of course, you don’t want someone to steal your client’s information. Data protection breaches happen all the time, […]

Importance of a Law Firm Disaster Planning in IT Support

This article was written by attorney James W. Slater of the Ohio law firm Slater & Zurz LLP Although it seems quite remarkable that a business would not back up computer files in a more sophisticated way than duplicating data to the “C” drive or having an external tape device, some businesses have rather primitive […]

5 Reasons Why Laptop Repairs Are More Difficult And Expensive

Laptops have become thinner, lighter, faster and their screens more brilliant than ever before. However, packing all this technology in an increasingly shrinking form factor has made it increasingly difficult to repair when the time comes. Unlike with laptops that were sold a few years ago, today the latest Ultrabooks are a lot thinner but […]

5 Printer Repair Problems that Show It’s Time for a New Printer

Has your printer reached the end of its life? If you’re experiencing a need for one of these repairs, it has in most cases. Check out some printer repair problems that show it’s more worth your time and money to buy a new printer instead: 1.    Ink Systems that Clog too Frequently:Some printers are known […]

Data Security Challenges Law Firms Face with Younger Attorneys

Not long ago I wrote an article for this blog entitled “Why Law Firms Need an IT Policy for Data Security” and it discussed young employees’ (specifically, millenials) computer behavior and how it is impacting Law Firm IT Support and data security.  Check out these stats: Seven out of ten (70%) young employees break their […]

5 Ways to Convince Your IT Support Team Outsourcing’s Okay

Imagine this: You’ve been an employee working loyally for your company for years. Now, after all this hard work, you hear that your company is going to start looking at outsourcing options. Your personal position at work may not be impacted at all by outsourcing. However, your employee’s minds will be flooded with fears. Primarily, […]

DRPs and BCPs Should Not Be MIA in your IT

Disaster Recovery Plans (DRP) and Business Continuity Plans (BCP) are important for organizations to have in place, but for some businesses, they are a requirement.  Healthcare, Financial Industries (such as banks and credit unions), and Legal Practices are just a few examples where there are requirements, even laws, mandating that these are in place and […]

Here is Why Your IT Support Cannot Ignore Tablets

Tech Target recently published this blog post entitled “Why IT can’t ignore tablet computers” that provides some useful insight into the whole BYOD and BYOx debate.  View our post “Mobile Data Security: Forget BYOD – Now the Buzz is BYOx!  Here is the post: Can tablet computers really replace desktops? No! Does that mean you […]

Does Free Antivirus Software Do the Job?

When you run a small business, you spend money on the bare essentials – and that’s it. Sometimes, that means cutting some corners. Others, it’s hard to tell what really is essential to running your business. So does antivirus fall into the category as something essential that you should spend money on? Let’s take a […]

Should You Do Any of Your Managed IT Services Yourself?

For SMB’S of any size, it’s always difficult to understand when you should take something on yourself by hiring more staff, or outsourcing it. The true answer is, it all depends on your circumstances. At every stage of growth, however, whether you are a startup or rapidly growing up-and-comer, there are tasks to outsource and […]

Do Cyber Criminals Have Your Law Firm In Their Cross Hairs?

This Guest Post article was written for Great Lakes Computer’s Tips on Tech Blog by attorney James W. Slater of the Ohio law firm Slater & Zurz LLP: With maintenance of confidentiality actually a requirement for lawyers dealing with clients due to professional ethics regulations, protection of data is a very important aspect of an […]

If a Law Firm’s Printer Falls in the Woods, Does it Make a Sound?

Why Your Law Firm Needs to Look at Managed Print Services Now When your law firm’s printers jam or break, who gets called on to repair it?  If you are a large enough firm to have an IT person on staff, the answer is obvious.  But for those firms who cannot afford that luxury, or […]

Printer Repair: What are the Pros & Cons of the Best Brands?

Having printer problems? Do you need to make a printer repair? It may be time to buy a new printer instead! Printers are one of the most complicated pieces of technological equipment to buy. If you’ve been reading our blog, you know that the real cost of any printer is in the ink. And in […]

New Guest Blog Series: SMB Best Practices for Organization

This is the first in a monthly series of guest blogs from Organizing 4 U, a fellow Northeast Ohio Company and CMBA Partner. They are professional organizers for business and residential, who will share with our readers some insights into organizing your business – and your life!  Today, they discuss organizing your computer files.  This […]

Heartbleed Bug Still Able To Compromise Data Security on 300K Servers

Like a flash in the pan, the Heartbleed Bug has faded away from mainstream news to only be whispered by those data security experts assigned to address server security issues for companies. With the lack of any current information to the public at large, many Internet users will be led to believe that servers are […]

Are You Doing These 4 Simple Network & Server Repair Operations?

Are you the do-it-yourself type? This works for and against you. On the one hand, you can teach yourself how to tackle virtually any problem business or life throws at you. On the other, you can end up taking on too much and stressing and burning yourself out. If you’re doing your computer, IT support, […]

760 Data Security Reasons to Switch to a New Operating System

According to TechTarget’s recently posted article “6 Benefits of Migrating to Modern OS’s,” The Dell SecureWorks Counter Threat Unit (CTU) has catalogued more than 760 vulnerabilities in Windows XP, and predicts “continued discovery and disclosure of new software vulnerabilities linked to Windows XP well beyond the end-of-support date.”  So, it could be said there are […]

5 Data Protection Questions (And Answers)

What do you know about data protection? Even if you’re just a newbie, that’s okay. Today, we’re going to cover a few common questions small business owners often ask. Here they are in random order: 1. What makes data security so important for your business? You know the obvious one – to protect the confidential […]

4 Budget Busting IT Support Mistakes When Moving your Office

‘Tis the season to move offices, it seems.  We get a great deal of calls in the heat of summer and around the holidays from companies relocating to different office space, and requiring assistance with their IT equipment.  It could be that with vacations, business is slower and summer is a good time to make […]

Top 5 Benefits to Look for When Hiring Managed IT Services

When you hire managed IT services, not all companies are the same. There’s what they say they do – and then what they actually do. At Great Lakes Computer, we want you to get the very best service from your provider when you sign the contract. Before you actually do that, here’s what you should […]

IT Support Guest Blog: Perfecting Network’s Performance

It is time for our monthly guest blog post from guest blogger, Brett Harney,  principal at Corporate Technologies Group in Hudson, Ohio.  Today Brett is sharing with the readers of our IT Support blog excerpts from his eBook, available for free download, on perfecting your network’s performance: “Businesses are increasingly more aware of the quality […]

Printer Repair: 4 Tips on Buying the Printer Your Office Needs

So your printer just broke down, and you’re tired of having it repaired. Or maybe it’s old, and you know it’s time for a new one. You can buy a cheap one that just gets you by, or you can get the deluxe powerhouse version that prints 20-50 pages per minute. How do you know […]

How Secure is that Coffee Shop Connection? A Data Security Discussion

We have all done it.  Some time between meetings, stop at Starbucks and get some work done.  Check email while you are waiting for your flight at the airport.  Or even shelling out the $30 to connect on the plane during that cross country flight for a sales meeting to finish that presentation or send […]

5 Telltale Signs It’s Time to Hire an IT Support Company

If you’re a small business owner, you have to constantly evaluate whether to do it yourself or hire someone else. How do you know when you’ve crossed the threshold from being able to do it yourself to having to hire an outside vendor to do the work? When it comes to IT support, you should […]

Mobile Data Security: Forget BYOD – Now the Buzz is BYOx!

We have been discussing BYOD (Bring Your Own Device) for a while now and its impact to your company’s data security plans.  BYOD  is employee-owned devices being brought into a business. Smartphones, tablets, laptops and USB drives are all examples. Bring your own everything (BYOx) is an all-encompassing term that covers various BYO-related trends in […]

Top 5 Viruses and How They Have Impacted Data Security

You know what the most amazing part about Heartbleed is? It was around for two years before any news came out about. And it also affected about 2/3 of all internet servers. Doesn’t it seem amazing something like this could happen in the internet of 2014? It just goes to show you anything can happen […]

Exploring The Safety Of Info In The Cloud

Cloud storage has become one of the most popular tools in recent years. Instead of taking up room on our hard drives, we can simply access a kind of  ‘virtual hard drive’ located on the web, and just transfer our files to this online storage location. But many doubt the safety of this new tool. […]

5 Best Managed IT Services to Outsource

Should you do it yourself, or should you let a managed network services provider do it? It’s a tough call, and a lot of the decision depends on the budget and IT needs your business has. Here are some of the top services you should consider in general, regardless of your business: Data Security: Data […]

7 Reasons Why You Should Consider Cloud Services For Your Business

Otherwise known as ‘cloudware’, cloud technology is being exploited by more and more businesses owners because it can enable them to dramatically reduce their IT Support and overall IT costs, and improve their flexibility. Your employees can work from home: Because employees don’t need to log in to a work computer to access files and […]

Printer Repair Problems: 7 Signs It’s Time for a New Printer

Should you keep repairing your printer, paying a little at a time? Or is it time to purchase a newer model? That’s hard to figure out on your own if you’re not an experienced IT pro. But if you do use the professionals, here’s what they look at to decide if it’s time for a […]

3 Challenges in Voice over IP SIP Trunking Implementations

In today’s blog post, we welcome again our guest blogger, Brett Harney, to continue his discussion from his last guest post with us: A Buying Guide for Small Business: VoIP vs. Hosted VoIP.  Brett is a principal at Corporate Technologies Group in Hudson, Ohio, and today he is sharing with us 3 Challenges in SIP […]

The Complete Newbie’s Guide to Computer Hardware Repair

What do you do when you need a hardware repair made? Do you call a professional?  Should you have a contract set up with an outsourced option so they can perform the service for you? Or should you just do it yourself? DIY works out okay in some situations. For more complex repairs, though, you […]

5 Simple Data Backup Tips You Can Use Today

Since the takeoff of the Information Age in the 1990s, you’ve probably heard the words  “data backup” preached at you time and again. And for good reason.  You don’t want to lose all your valuable data that you spent years developing and accumulating in an unexpected disaster. Today, backing up your data is a little […]