[vc_row][vc_column][vc_column_text]The Department of Homeland Security issued a warning to all PC owners on April 14th; Uninstall Quicktime immediately. There are known vulnerablilities in the software, and Apple has discontinued updates for it. This leaves your PC at...
Blog
BYOD Policies Attract Younger Talent, But At What Cost?
[vc_row][vc_column][vc_column_text]Today's graduates aren't seeking out the classic 9 to 5 cubicle gig. They are looking for a flexible schedule with a greater focus on work-life balance, but they understand the price of that may be working at sporadic hours and on...
Big Telecom Providers Dropping SMBs – Tech Concierge to the Rescue
[vc_row][vc_column][vc_column_text]In the past year, several major telecommunication providers have decided that SMBs just don't generate enough money to keep as clients. In December of 2015, Windstream announced it would be phasing out all its SMB clients that...
10 Items Your Disaster Recovery Plan is Worthless Without
Your disaster recovery plan is a crucial aspect of business risk management. If you want to ensure you can maintain business continuity in the face of disaster, you need a good plan in place to help see you through the rough times. Here are 10 items your disaster...
Top 5 Best Practices for Network Security
[vc_row][vc_column][vc_column_text] The web we create with the introduction of newer, better technology is a tangled one. In a business setting, we not only have internal servers, but we operate on the cloud as well. We have BYOD (Bring Your Own Device) work...
Printer Maintenance Tip: Spring Clean Your Plotter
[vc_row][vc_column][vc_column_text] Laser plotters can be indispensable to the types of companies that use them. They can also be quite costly to purchase. This is why proper plotter and printer maintenance is crucial. No CIO wants to be in the position of constantly...
IT Forecast: Cloud Covered
It’s no secret that the growth of cloud computing has been one of the most significant stories in the tech world for several years now. At this point, even the people who would consider themselves the opposite of early adopters have at least heard of the cloud, and...
Disaster Recovery Planning: Where to Start?
[vc_row][vc_column][vc_column_text] There’s often a great deal of cognitive dissonance on the part of business owners when it comes to disaster recovery. They think they don’t need to plan for an emergency because they doubt it will ever happen to them, despite the...
Second Hospital Network Security Breach by Ransomware in Just Two Months
[vc_row][vc_column][vc_column_text] Data Backup and Recovery Saved this Hospital from Paying the Ransom A Hospital in Henderson, Kentucky is the second victim of a ransomware attack in the last two months. The first attack using the same ransomware, called Locky, took...
Cloud Computing, Is it as Safe as You Think?
[vc_row][vc_column][vc_column_text]Cloud computing isn't just a buzz word anymore. It is where the majority of data processing and storage is headed, if it's not already there. The cloud offers many advantages over premise-based hosting, the most important of which is...