Are you the do-it-yourself type? This works for and against you. On the one hand, you can teach yourself how to tackle virtually any problem business or life throws at you. On the other, you can end up taking on too much and stressing and burning yourself out. If...
Blog
760 Data Security Reasons to Switch to a New Operating System
[vc_row][vc_column][vc_column_text] According to TechTarget's recently posted article "6 Benefits of Migrating to Modern OS's," The Dell SecureWorks Counter Threat Unit (CTU) has catalogued more than 760 vulnerabilities in Windows XP, and predicts “continued discovery...
5 Data Protection Questions (And Answers)
[vc_row][vc_column][vc_column_text] What do you know about data protection? Even if you’re just a newbie, that’s okay. Today, we’re going to cover a few common questions small business owners often ask. Here they are in random order: 1. What makes data security so...
4 Budget Busting IT Support Mistakes When Moving your Office
'Tis the season to move offices, it seems. We get a great deal of calls in the heat of summer and around the holidays from companies relocating to different office space, and requiring assistance with their IT equipment. It could be that with vacations, business is...
Top 5 Benefits to Look for When Hiring Managed IT Services
When you hire managed IT services, not all companies are the same. There’s what they say they do – and then what they actually do. At Great Lakes Computer, we want you to get the very best service from your provider when you sign the contract. Before you actually do...
IT Support Guest Blog: Perfecting Network’s Performance
It is time for our monthly guest blog post from guest blogger, Brett Harney, principal at Corporate Technologies Group in Hudson, Ohio. Today Brett is sharing with the readers of our IT Support blog excerpts from his eBook, available for free download, on perfecting...
Printer Repair: 4 Tips on Buying the Printer Your Office Needs
So your printer just broke down, and you’re tired of having it repaired. Or maybe it’s old, and you know it’s time for a new one. You can buy a cheap one that just gets you by, or you can get the deluxe powerhouse version that prints 20-50 pages per minute. How do you...
How Secure is that Coffee Shop Connection? A Data Security Discussion
[vc_row][vc_column][vc_column_text] We have all done it. Some time between meetings, stop at Starbucks and get some work done. Check email while you are waiting for your flight at the airport. Or even shelling out the $30 to connect on the plane during that cross...
5 Telltale Signs It’s Time to Hire an IT Support Company
If you’re a small business owner, you have to constantly evaluate whether to do it yourself or hire someone else. How do you know when you’ve crossed the threshold from being able to do it yourself to having to hire an outside vendor to do the work? When it comes to...
Mobile Data Security: Forget BYOD – Now the Buzz is BYOx!
[vc_row][vc_column][vc_column_text] We have been discussing BYOD (Bring Your Own Device) for a while now and its impact to your company's data security plans. BYOD is employee-owned devices being brought into a business. Smartphones, tablets, laptops and USB drives...