IT Insights & Trends

Accelerating Business Success: The Importance of a Prompt IT Managed Service Provider Response 

In today’s fast-paced business world, time is money. Every minute of downtime can translate into lost opportunities and revenue. That’s why businesses rely on their outsourced Information Technology (IT) Service Providers to keep their technology infrastructure up and running smoothly. However, simply having an IT service provider isn’t enough – businesses also need a fast […]

The Importance of Customer Experience with Managed IT Services and Cybersecurity 

Get expert tips to improve customer experience with managed IT services and cybersecurity. Learn today with Great Lakes Computer!  Customer experience is a crucial aspect of managed IT services and cybersecurity. It is not enough to provide a secure service; businesses must ensure that customers receive the best possible service when using their managed IT [...]

Great Lakes Computer Forms Partnership with BIXOLON to Offer Best in Class Printing Solutions

Supercharge Your Business with a Zero- Cost Premium Intranet Unlock the Power of Effective Communication with Our Easy, Free Guide, or Keep Scrolling To See The Video!*No Email Required, Get Access Immediately  Download Your Free Guide and Transform Today The Power of SharePoint Intranet Revolutionize Your Business Operations for Free You already have the key [...]

Why Honesty is the Best Policy when Filling Out Cyber Insurance Forms

Get prepared for Cyber Insurance deadlines! Learn the importance of honesty when completing forms for your coverage.  Tips for Completing Cyber Insurance Forms: Don’t Risk Your Coverage by Fudging the Truth  The World Economic Forum (WEF) says that cyberattacks are among the top 10 risks in the world. To mitigate this risk, companies often purchase […]

Need Quick and Reliable Epson Printer Repair? Trust Our Experts!

The Importance of Epson Printers in Today’s Business World In today’s business world, printers have become an indispensable tool and Epson printers have gained widespread popularity among businesses of all sizes for their reliability, affordability and quality output.  Epson printers are high-quality, but any machine can break down due to regular usage or malfunctioning components. […]

Cybercrime As A Service (CaaS): What Every Business Owner Needs to Know 

If you're an entrepreneur, you know how cybercrime can impact your business. Read to learn more about Cybercrime-as-a-Service.  Cybercrime-as-a-Service (CaaS) is an emerging trend that you should be aware of as a business owner. CaaS describes offering hacking tools, services, and expertise to criminals to execute cybercrimes.  In 2022, this cybersecurity menace led to damages [...]

Enforcing Cybersecurity in the Age of Credential Phishing

The shift from office work to remote or hybrid models has evolved and frequented cyberattacks, phishing in particular. The pandemic necessitated operational changes in the office space to minimize the spread of COVID-19. However, the resulting office changes may remain long-term because of the benefits of working remotely and technological advancements. One pivotal factor that [...]

Establishing Effective Company Cybersecurity Policies

Are you looking to improve your cybersecurity protocols and policies? Read our latest blog post for best practices on establishing effective company cybersecurity protocols for protecting sensitive business data.  As businesses increase reliance on digital technologies and services, having a solid foundation of company cybersecurity policies and protocols is paramount to keeping information secure and [...]

How AI Can Benefit Your Cybersecurity Strategy 

Ensuring the safety of your digital assets is of utmost importance. As the risk of cybercrime increases, it is critical to employ the most up-to-date practices to protect your data and networks. Integrating Artificial intelligence (AI) into your cybersecurity strategy is a highly- efficient and contemporary way of doing this. Below, we’ll explain how AI […]

How to Ensure Your Data is Secure in Case of a Breach 

Data security is a crucial part of running any business. Cybersecurity breaches can have a huge impact on an organization's reputation and revenue. This makes it essential to have a robust data breach response plan in place. The Cost of Cyberattacks  Small businesses are particularly vulnerable to data breaches, with 43% of attacks targeting them. [...]

How to Plan Your 2023 Cyber Spend 

A cybersecurity budget can seem like a daunting thing to calculate for any size organization, but it doesn’t have to be. As long as you and your executive team assess and understand the risks you face, and the solutions you need to protect against them, you can calculate your cost.  

Why the Demand for Outsourced IT Services is Exploding 

Every business looks for ways to save money, while still retaining the best possible quality for its own internal systems and for customer service. IT security and IT services are no exception to this. These factors are a key part of why the demand for managed outsourced IT services is exploding worldwide.

Nothing is More Important Than Data Backup

The underlying backbone of all digital and IT security for any individual, organization or business is data backup. The reason why boils down to this: Even if you lose everything else, suffer a massive hack, or lose your IT assets to some major physical disaster, a strong data backup will at least keep your core […]

Phishing Emails: Would You Take the Bait? 

Spam email attacks (otherwise known as phishing) are one of the largest threats facing all businesses today. They are everywhere and affect everyone. Plus, they are continuing to grow in sophistication and number, so there is no end in sight. And what’s worse is that most people are aware of this large danger, and yet, […]

4 Key IT Vulnerabilities and How to Prevent Them 

We currently face a growing IT security threat landscape. Therefore, organizations of all sizes need increasingly professional and threat-specific solutions for their IT security needs if they really want to stay protected. The cost of failing to do so can be enormous. As IBM’s 2022 Cost of Data Breach Report found, an average organization-level data breach this […]

Vulnerability Tops List of Cyber Security Scares

We always talk about the importance of being protected from cyberattacks and how smaller companies are often at risk of being a target for hackers. But it’s also very easy for a larger company to be breached.  

Cybersecurity Post Pandemic

The COVID pandemic affected many things across the country, but the impact it had on the IT world was catastrophic–particularly when it comes to cybersecurity. Employees working from home opened many businesses up to cyberattacks since many used unsecure networks to keep business operations moving. At the same time, it gave many cybercriminals the time […]

Having Trouble Obtaining Cyber Insurance? You’re Not Alone

Learn How to secure & insure your organization, plus, get FREE pizza! IT has gone from being a minor part of most businesses (particularly smaller ones) to being one of the key aspects of their success and growth. An unfortunate side effect of this growth in importance has also been to turn an average company’s […]

Apple Operating System Vulnerability Leads to Critical Updates

It seems like there is constantly a new update for the Apple platform. Just last month (August 2022), Apple announced the 15.6.1 update which included some critical and necessary changes due to a recently discovered vulnerability in the operating systems, only to then be followed by an announcement this month that another update is coming […]

Cyber Insurance is Becoming Harder to Obtain

As the complexities and diverse risk profiles for protecting business IT security increase, cyber insurance coverage is becoming harder to obtain. Before IT security became as important as it is now, cyber insurance wasn’t something that many organizations thought much about. If they did feel a need for it, it could often be easily bought. […]

Why Cyber-Ready Now is Not Enough

We frequently discuss and stress the importance of protecting your digital assets today. Across the country, this is becoming more important to businesses. Case in point: According to Price Waterhouse Cooper’s June 2021 U.S. Digital Trust Insights Snapshot, “Cyber threats jumped to CEOs’ number-one concern in the U.S., and number-two globally.” The study PWC conducted […]

How to Protect Your Business Before It’s Too Late

IT security consists of multiple facets and is crucial in today’s deeply digitized world. As a business owner, your IT components—the sensitive data, software, and hardware—are the backbone of your company’s success. So, it’s crucial to protect them beyond just hack attacks. Other problems that can easily strike include data loss, customer data leaks that […]

Disaster Protection: Why Your Business Needs BCDR Now

Disasters sometimes strike. They can take on many forms (fire, hurricane, earthquake, theft, etc.) and either be localized or fully global. The COVID-19 Pandemic was one particular example on a global scale, but it’s far from the only kind of catastrophic event we can expect. That’s why it is important that your business has a […]

Be Ready! Your MS Office and Outlook Could Stop Working in October

If you use Microsoft Office and Outlook, it may be time for preparations to begin! Microsoft announced that starting on October 1st, 2022, early versions of Office and Outlook will stop working! It’s been in the media since last year. We at Great Lakes have reminded our customers through several emails. Now is the time […]

Essential Two-Factor Authentication Basics

One of the unvarying truths of the digital world in which all of us–business owners or consumers–operate is that cybercriminals constantly evolve their attacks. This means that the things we used to do for secure access to sensitive account systems like online banking, stock apps, or email accounts usually have to evolve too. One of these evolutionary methods has been two-factor authentication, also known as TFA or 2FA.

Simple Steps to Improve Your Company’s Cybersecurity

As a general rule, digital security—for companies and web-connected organizations of all types—is subject to all sorts of potential threats. These could come from online organized crime, hostile foreign governments, individual hackers, and fraudsters with a penchant for stealing data or funds.

Now In Sandusky! Broader Reach, Same Great Service.

Great Lakes Computer is opening a convenient new location! While the headquarters will remain in Avon, Ohio, we are adding a satellite office near downtown Sandusky. This prime spot will enable us to better serve our traditional business customers in Northwestern Ohio. This will also allow us to expand our new consumer offerings in the […]

GLC Partner, SentinelOne, Acquires Attivo Networks

It’s common knowledge that standard antivirus and firewalls are no longer enough to properly protect your business in today’s tech savvy world. As hackers and viruses become smarter, your protection needs to be stronger. So to bring our clients the best Endpoint Detection and Response program to protect their networks, we partner with SentinelOne. They are one of the best innovators when it comes cybersecurity solutions.

What to Look For in an IT Outsourcing Provider

Many small to medium sized businesses today at some point or another consider IT outsourcing. Gaining access to enterprise level IT support at SMB prices makes a lot of business sense. But, as with any vendor, it’s important to find the right Managed Services Provider for your business’ particular needs. Here are some criteria to […]

Transferring Cybersecurity Risk is About to Get Complicated

Many organizations have historically made decisions to transfer cybersecurity risk by purchasing a cybersecurity liability insurance policy from an insurance carrier. Transferring risk has become popular because the magnitude and variety of cybersecurity risk that organizations are attempting to manage is overwhelming and resources to mitigate or eliminate the risks are scarce. Obtaining insurance takes […]

Penetration Testing? What Is It and Why Do You Need It?

Risk associated with cybersecurity threats and exposures motivate organizations to implement protective controls intended to keep their digital assets safe from malicious computer hackers. Firewalls are installed at the network perimeter to keep unauthorized users from accessing the private network. Anti-virus software is installed on computers and servers to enhance overall endpoint security. Sensitive data […]

3 Reasons SMBs Need Managed Service Providers

Managed Service Providers (MSPs) are often brought in to handle specific IT tasks that small-and-medium-sized businesses no longer want their IT guy doing in-house, because they aren’t the best use of a salaried employee’s time. Projects like repetitive monitoring and maintenance tasks that can be automated are easy to hand off. But MSPs can completely […]

Why Business Cybersecurity is a Huge Problem for 2022

In an increasingly digitized world, cybersecurity is becoming an ever-growing, vitally necessary burden–and problem–for thousands of organizations. This applies to government bodies, institutions and businesses of all sizes. This isn’t just a flippant conclusion either. The World Economic Forum (WEF) recently released its “Global Risks Report 2022” and guess what subject ranked as one of […]

How to Expose (or Uncover) Your IT Security Risks

Conducting a vulnerability assessment is important because the exercise will identify security flaws that exist in your information technology environment before they are discovered by a malicious computer hacker. Once the vulnerabilities are discovered, you can correct them and lower your risk of becoming a victim of a successful cybersecurity attack.

Guest Wi-Fi – A Necessary Evil

The more windows and doors you put into a house, the more points of access a would-be intruder has. Your internet connection, your servers, your employees smartphones and laptops, and your WiFi controlled thermostat are all windows into your data infrastructure. You do your best to control who can access these and inform them of […]

Crucial Managed IT Services Benefits for Your Business

IT maintenance is fundamental for just about every business in today’s world. It’s important for the most basic reason that IT is an inescapable part of managing even a tiny company, and also for the sake of firm security. The security angle is especially vital due to the increasingly rampant expansion of cybercrime. In fact, […]

Why the NIST Cybersecurity Framework Matters for Your Business

Cybercrime is only increasing in today’s world. During the COVID-19 pandemic alone, the number of cyberattack cases has risen by a whopping 600%. The consequences of these hacks and data thefts especially affect small to medium-sized businesses since they often don’t have robust internal IT resources to fight off all possible threats. But despite internal […]

Proactive vs. Reactive IT Management

When it comes to small businesses, we see plenty of reactive IT management. There are obvious cost concerns when it comes to owning a small business, so owners wait until a problem arises before putting resources toward solving it. However, savvy business owners recognize that a proactive approach to IT maintenance can lead to greater […]

Your Essential Guide to Phishing Email Scams

Phishing is alive and kicking as one of the methods most widely used by cybercriminals for penetrating the IT networks of organizations and businesses both small and large. The reason why is simple: It works.

A Basic Guide to Cybersecurity Penetration Testing

We get asked this question all the time: What’s the best way to confirm that your business’ IT security is firmly protected? Sure, you can implement all kinds of security measures, or have someone else with plenty of professional experience do it for you. But to be even more certain, there’s another trick to try: […]

5 Ways Managed Print Benefits Your Business

When you have existing printers you’ve already bought and paid for, it’s tempting to think that maintaining your existing fleet will cost less than purchasing new printers or signing up with a managed print services (MPS) provider. Why replace them if it’s not absolutely necessary?

The Top 4 Cyberattacks of 2021 (So Far!)

Cybercrime evolves at least as rapidly as the wider digital landscapes it targets. Arguably, it’s sometimes even the faster, more agile player in the race. Key evidence of this is the simple fact that instead of shrinking, cyberattacks have only become larger and more brazen in recent years. Far from being an exception to these […]

SOC-as-a-Service: What You Need to Know

Today’s cyber criminals are clever, sophisticated, organized and typically determined to profit from the theft of sensitive data–by selling it on the dark web or by extorting organizations with ransomware and distributed denial-of-service bombardments.

Why Your Business Needs a Managed Services Provider

How secure is your business from cyber threats? Take a look at some of these latest cybersecurity statistics: As of late 2021, the number of malware infections against individual computers and business networks has increased by over 2000% since a decade ago. Roughly 93% of these are delivered via email, and neither of these stats […]

Build a Human Firewall for Your Business

Establishing a human firewall in your business is more important than you think. Consider your employees. On one hand, they are your single most important business asset. The diligence and know-how of your staff can make or break not only your bottom line, but also your company’s ability to serve its customers securely. On the […]

Simple Solutions to Productivity Blockers

Technology makes our lives easier… most of the time.  But sometimes, getting that technology to work the way it should when it should takes more work than we’d like it to. How often have you been held up because your office printer is giving you error messages or failing to sync with your laptop? Ever […]

How to Protect From Threats While Using Microsoft Office 365

Microsoft Office 365 is used by thousands of organizations and individuals through its Consumer, Small Business and Enterprise versions, and cyber criminals have taken notice of this. Consequently, just as these hackers have attempted data breaches through other cloud services, they’ve done the same with Office 365 products. One example of this is the fact […]

15 Must-Dos to Protect Your Business from a Cyber Attack

Cybersecurity is more critical now than ever. Those seeking to access your information are constantly upping their game. Whether they slip in through the backdoor with a simple malware-laden phishing email or they quietly enter through your network and encrypt your data, you need to be prepared. What can you do to prevent data loss […]

The Ransomware Tide is Rising

Ransomware has been a problem for businesses, individuals and organizations for years, but it has reached endemic proportions in the last couple of years. According to U.N. Findings, since the COVID-19 pandemic, email-based malicious attempts on organizations have risen by a whopping 600% or more.

What are Managed IT Services?

Managed IT services are growing at a rapid rate, with a recent survey estimating that almost 69% of small to medium-sized businesses (SMBs) hire at least one type of IT service provider. So what are managed IT services, how do they work, and why would companies consider using them?

3 Tips to Circumnavigate a Skills Deficit and Improve Your Security

Despite the fact that cyberthreats have never been more prolific or problematic, the majority of organizations believe they lack the cybersecurity talent needed to stem the flow of cyberattacks. In fact, 70 percent of IT professionals think there is a shortage of cybersecurity expertise.

Focus on Business Development By Hiring a Managed Services Provider

Professional IT services definitely have a niche for themselves in the U.S. small business landscape: Of the roughly 3.7 million small businesses operating in the United States currently, over 57% of them feel a strong need to improve their existing IT infrastructure. This means improvements to the quality of their security infrastructure, IT staffing and […]

7 Tips to Keep Your IT Cool in the Heat

Don’t be fooled by brisk morning temperature drops–there are still many hot days to come this summer. Your IT hardware wants to stay as cool as you do and a spike in temps can lead to overheating, which can cause a lot of issues for your business network and data. We’ve put together seven simple […]

Reduce Costs With Managed Print Services

Saving money on budgetary expenses is something that any business needs to stay competitive and keep profitability as high as possible. This applies especially when cost savings can be achieved without biting into the quality of product or service that customers receive. There are many ways to pull this off, but one of the more […]

Simple Tips to Keep Your Business Data Safe

Business data is vital to keep safe given increasing threats in the marketplace, such as identity theft and various forms of financial fraud. Fortunately, there are simple controls you can implement to mitigate risks to your business and clients’ confidential information. Here are some tips to help you establish strong data security.

Should Your Business Outsource IT?

At least 83% of corporate IT leaders are either already outsourcing or planning to outsource their IT to professional external management services in 2021. There are more than a couple of good reasons for this. As the post-COVID economy increasingly moves towards the streamlined digitization of de-localized offices, companies worldwide are being forced to cut back […]

Small Business Security Tips

The dangers associated with email and web security continue to grow, even more so now due to the pandemic. According to one study, though 71% of Americans are still working from home today, when business returns to normal, 54% of them want to continue that. If you’re a small business considering allowing your employees to […]

The Increasingly Risky Web

It’s important for your business to have strong internet security in place, ensuring your employees are working safely and mitigating the risks.

Increase in Email Threats

Businesses face all kinds of threats every day—competitors, the economy, laws and regulations, and increasing employee benefit costs to name a few. But cyber threats are increasingly becoming one of the more common threats that companies regularly face. In fact, the FBI estimates that more than $5 billion has been lost worldwide to email scams. […]

Improving Work-From-Home Security

According to research from security software provider Malwarebytes, roughly 20% of organizations may have suffered a security breach caused by remote workers since the beginning of the COVID pandemic. This is a worrying but predictable statistic and one that could have been easily mitigated by improved security in these companies. Here are six key work […]

Email Security Event from Mimecast

We cannot stress enough the importance of protecting your company’s email accounts from spam, phishing attacks and malware. Cyber criminals continue to become more creative in their attacks, and so it’s crucial that you have proper email security measures in place to keep your business safe.

The Importance of Email Security

Email security is so crucial for businesses and organizations. It closes a gaping door to fraud, theft and network hijacking.

Phishing Email Attacks on the Rise

Since the COVID-19 pandemic heavily shifted work patterns for millions of people around the world, one of the biggest changes, particularly among white collar workers, has been a move towards working from home wherever possible. As a result, millions of employees are accessing sensitive corporate networks from outside secure office settings. Naturally enough, this creates […]

Cloud Computing in 2021

Though it launched in the late 1990s, the popularity in Cloud Computing has grown exponentially due to a little thing called COVID-19. With many employees working remotely, the need to access data and continue work operations from their homes was (and continues to be) critical to the survival of many businesses. In fact, research companies […]

Why Government Services are Turning to Managed IT Services

Today’s economic environment requires state and local government agencies to leverage IT resources if they intend to effectively control costs and streamline their services. Unfortunately, the government’s IT system faces many challenges. They include a lack of transparency due to the use of outdated technology solutions, insufficient staffing, and slow changes due to bureaucracy. To […]

The 6 Keys to an Effective SOC

Every 11 seconds. That is how often experts predict a ransomware attack on a business will occur by the end of 2021. With that in mind, businesses can no longer push cybersecurity to the side, or just put up a basic firewall. Protecting your business’s data is crucial for the safety of everyone involved, and […]

Benefits of a Managed Print Provider

Even with the digital revolution, printing is still a significant part of almost all businesses today. Nevertheless, many companies do not have a clear picture of their overall print costs. According to a white paper published by Xerox, most companies spend approximately 1 to 3% of their total annual revenue on printing. As such, print costs […]

Digital Risk: Protecting Your Most Important Asset Webinar

Data breaches are a real threat that should be taken seriously, and SMBs have a higher susceptibility of suffering a breach. It’s important to understand the potential threats, how they can affect your business, and what you can do to reduce the risks.

Understanding POS Cash Registers

Retailers handle various transactions daily, so it’s key for those businesses to be equipped with the necessary hardware and software to smoothly, seamlessly, and quickly handle large volumes of daily transactions. But which transaction-processing solution is best for your business?

Technology Preparations for an Office Move

Moving is stressful—especially when it comes to an office move. It requires careful planning and preparation, otherwise it can result in major work disruptions, sometimes halt productivity entirely for your business, resulting in income losses. Taking the time to specifically focus on, think through and plan out your company’s technology move can help avoid catastrophe.

The Changing State of Backup

Traditional backup tools have become obsolete and unable to offer reliable backup data security. Technological advancements have led to more efficient backup systems that protect businesses’ IT assets while supporting growth.

Disinfecting Your Workstation

As we continue to face the coronavirus pandemic, everyone’s safety remains a top priority. Therefore, washing our hands regularly, keeping a safe distance from one another and wearing masks is extremely important since the primary way COVID-19 spreads is through respiratory droplets in the air. However, the jury is still out in terms of if […]

Keeping Up with Your Office Printer

As the pandemic continues in this country, so does working from home for many Americans. In fact, one study shows that roughly 42% still work from home. For business owners, it presents multiple problems and required adjustments, but what many don’t think about is what does that mean for your office technology, just sitting there […]

Why IT Support Is More Critical with a Remote Workforce

According to a survey conducted by the Bureau of Labor Statistics, only around 7% of U.S. employees had access to remote work benefits as of 2019. Then the COVID-19 pandemic swept the world—and the nation. Suddenly, many companies were scrambling to support remote work forces as a way to remain economically viable during shutdowns. According to Statista, […]

2 Keys to Successful Team Collaboration Post-COVID

As the COVID-19 pandemic continues to impact the economy, companies across the globe have been forced to seek digital reforms to protect their employees and consumers. Businesses have no choice but to review and modify their operational strategies to find new ways to function.

Working from Home = Virtual Private Networking

With all that’s happening in the world right now, home is becoming the workplace for many of us. However, depending on your area of employment, that can present a number of problems.

2020 Technology Trends to Watch For

When it comes to computer technology, it’s important for business owners to stay on top of the trends—ahead even. Not only to make sure they’ve updated their software and replaced equipment with the latest releases, but to keep an eye on the bigger technology evolutions ahead to avoid being left behind.

The Trouble with People

A standard practice for businesses today is to invest in cybersecurity. However, data breaches still continue to happen daily, and compromised data is becoming more and more common. And unfortunately, it’s got very little to do with your security investment, and everything to do with the people that work for you. In fact, a recent […]

What Does EOSL Mean for Your Hardware?

End-of-service-life (EOSL) announcements can lead to concern for IT managers. Each year, IT hardware manufacturers decide they will no longer support certain models of storage, servers, or network hardware. In the wake of this, IT folks are left with some tough choices like whether they will be forced to upgrade or if they want to […]

Top 3 Ways MSPs Can Help Your Business

Old technology, backup issues, millions of cables…. The list goes on and on of all the common IT problems businesses face. And often, owners don’t have time to deal with them. They just need the problem quickly fixed so work can continue. For small businesses who don’t have an IT department, what’s the solution? A […]

Windows 7 End of Life is January 14th, 2020

On January 14, 2020, Windows 7 will reach end-of-life (EOL) and will no longer be supported by Microsoft. If you haven’t started mapping out your migration to Windows 10, it’s time to act. Once a product reaches its end-of-life, no new features or fixes are released for it – however Microsoft did announce in September it […]

The Newest Malware – Fake Windows 10 Update

Great Lakes Computer is always on top of the latest cyber attacks and there’s a new one to beware of – the fake Windows 10 update. Portrayed as a critical update, this ransomware will install an executable .NET file that will infect your computer and request that you make a payment to recover your data. […]

The Zero Trust Model for SMB IT Security

Protecting your business from cyberattacks is something to take seriously—especially for small businesses. With the speed of their growth and their often-limited budgets, small companies often have to prioritize items and sometimes, having a strong cybersecurity system can feel less important—but that kind of thinking couldn’t be more wrong. Smaller businesses make up almost half […]

Office Space: Modern Trends in Workplace Layout

There are many decisions to be made when running a business – branding, staffing, marketing and operations are all important. But you need a place to operate and you want to choose the office arrangement that best fits your requirements. Will you lease a traditional office space? Or perhaps it’s a shared office or a […]

The Dark Web: What is it and why should you care?

When you hear about the Dark Web, you may think the very idea is based on fiction, innuendo and fear-mongering. After all, how could it be so bad? It’s as though the boogeyman joined forces with the worst cyber stalker and decided to let loose their evil machinations by deploying thousands of malicious attacks and […]

Break Fix or Managed Services – Which makes sense for you?

If you run a business, you probably use some variation of IT hardware to do it. To keep that equipment running smoothly, you’ll run across the need for maintenance, which can come in a couple forms. Managed IT Service contracts are proactive and include ongoing maintenance, monitoring and support, while the break fix model is […]

Small Businesses Looking for Security Use Managed Services

Robust security is no longer a “luxury” that only enterprises can afford. Small businesses are at greater risk for both their limited security resources as well as their reputation for being lax in valuing strong defenses. It’s a critical weakness that cyber criminals will exploit and they know SMBs are likely low hanging fruit. A […]

Learn How to Prevent Phishing by Spotting It [An Infographic]

It’s time to get serious about thwarting phishing attempts.  While these attacks are increasing in frequency, we can decrease their success rate with just an ounce of prevention. It doesn’t matter how new the approach is, the trick is the same. It’s all about duping just that one person into clicking on a link or […]

Are Managed IT Services Right for You?

Technology plays a central role in business, making it a key component of almost every company. Staying on top of your business’s IT game can be a real challenge, as the technological environment is always changing. Overwhelmed with choices and a lack of expertise, many companies often overspend on IT without understanding which technology expenses […]

10 Questions Law Firms Should Ask Their MSP

Managed IT services for law firms has evolved from its early days of providing offshore support services, data center space and outsourced IT hardware. The strategy of managed IT services has now emerged as a valuable approach for law firms who choose to partner with an expert services provider.

Raising the Bar: How to Modernize Cybersecurity in the Legal Industry

Fifteen years ago, the Harvard Business Review asked its readers, “Can you trust your law firm?” The question then referred to whether corporate lawyers were providing sound advice to their clients. Today, it would also have to account for their approach to cybersecurity. The entire legal industry faces unique challenges in ensuring proper stewardship of […]

The Latest Ransomware Attack – SamSam

We keep abreast of the latest cyber attacks and here’s one that we’re seeing a lot of coverage on we think you should know about–SamSam.

You Hire a Mechanic for Your Car, Why not an MSP for Your IT?

For most people, owning a vehicle means you occasionally need to take your car to the shop for maintenance or repair because you simply lack the expertise–and most people don’t think twice about doing so. But, those same people are using the internet to operate their business and choosing to handle the complex management of […]

October is National Cybersecurity Awareness Month

October is National Cybersecurity Awareness Month (NCSAM). NCSAM is a collaborative effort between DHS and its public and private partners – including the National Cyber Security Alliance (NCSA) – to raise awareness about the vital role cybersecurity plays in the lives of U.S. citizens. At Great Lakes Computer, we understand the value of effective cybersecurity and […]

Hurricanes and Hackers – Are You Disaster Ready?

Threats to your business come in many forms, from Hurricane Florence threatening the East coast to Harvey in Accounting opening an infected email. While there are many steps you can take to reduce your exposure, it's almost impossible to prevent disaster completely. Your best move is to have a response plan in place to help [...]

What the Three Little Pigs Can Teach Us about Cybersecurity

Last night, as I was putting my kids to bed, I read them the classic children’s story, “The Three Little Pigs”. And you know what it got me thinking about—cybersecurity. Probably everyone in the audience is familiar with the tale, but I’ll lay out the basics just so that we’re all on the same page. [...]

Ohio Data Protection Act Just Passed. What Does It Mean for You?

Ohio legislatures just passed the Ohio Data Protection Act, which gives companies a safe harbor in the case of a data breach.  Companies that adhere to the NIST Cybersecurity Framework will be entitled to an affirmative defense to any cause of action sounding in tort that is brought under the laws of Ohio or in [...]

Legal Industry Late to the Cloud, But They’re Coming.

In the early years, cloud computing was taken on by the innovators and early stage adopters. Then, as with any new tech, it spread to the mainstream. But, there are always the old guard. The ones distrustful of change. Those with the most to lose if adoption fails somehow. The legal, medical, and financial sectors [...]

How to Add a Second Monitor to Your PC

We are a world of multi-taskers. At any given time, you might have more than 10 windows open on a single screen. Maybe it's time to give your eyes a little breathing room. Here's how from an article on PC World: Step 1 The first part is easy. Simply connect your second monitor to a [...]

Beware the Costs of “Free” POS Systems

Everyone loves to get a deal, especially when you're a business owner. Money you're not spending is money that goes back into your business. However, some deals are too good to be true. Always be wary of "free" as it's rarely true. For example, the true cost of "free wifi". Free POS systems come at [...]

Valuable, and True, Lessons Learned During an Office Relocation

Moving offices can be a daunting, but energizing, undertaking. Planning is an integral part of success, as is hiring vendors that you trust to be there for you before, during, and after the move. During the transition, there are plenty of "wish we had done X earlier" moments that are realized too late. I recently [...]

Ready for a New Location? Set These Goals for a Successful Move.

Is 2017 the year you admitted you may need a bigger office? It's easy to ignore how tight or ill-fitting your current space is when faced with the daunting task of office relocation. Moving can be full of unseen expenses and headaches. But, it can also be vital to the health of your profit to [...]

Managed IT Service Trends We Expect in 2018

While there is no crystal ball we can find that can accurately predict the future, we've learned enough in 2017 to know what we can expect in 2018. Here we review some trends and issues we expect to arise for businesses and their Managed IT Service Providers. Cyber Attack Battlefront Moves to the SMBs The [...]

Is BYOD a Threat to Your I.T. Security?

Bring Your Own Device (BYOD) is jokingly referred to in some IT circles as “Bring Your Own Disaster”.  While it offers a great opportunity to reduce costs and make employees happy, it’s still crucial to protect your organization’s data. GROWING IN POPULARITY BYOD had its genesis probably about 10 years ago with the advent of [...]

How to Get Back to the Core Strength of Your Business in 2018

You got into business to do a specific thing, but there are so many other tasks that go along with operations, it's easy to get dragged off course - IT management is a big one. Answer these questions about the last year: Did you experience downtime or data loss? Did you spend time tinkering with [...]

Holiday Travel Tip for Workers on the Go: Protect Your Data

Whether you're traveling for business or pleasure, it's likely you're logging in for work while on the move. Whether it's on your smartphone or laptop, you need to be extra cautious with your internet access during the holidays. Hackers know there are terminals full to the brim with potential targets. Don't be one of them [...]

5 Ways IT Managed Services Benefit Your Business

As a Managed Services Provider, we are clearly a little biased when it comes to IT outsourcing. We know we can help alleviate the stress and burden that IT management can create for business owners. But, in case you need a more convincing argument, we're sharing these five benefits from Tech Guru Daily. 1. Easier [...]

The Latest & Greatest in WiFi Routers for Your Home

Whether you’re dealing with slow speeds or WiFi dead zones, a new router can improve your internet experience. spoke with networking experts and WiFi geeks to get to the root of what matters.Their top picks come with the latest protocols and recommended frequencies, have been independently tested for speed and range, and boast a [...]

Heard of Fog Computing? You Will.

We've talked a lot about cloud computing in the past couple of years. It continues to become more prevalent in our daily lives. But, there's a new term being added to the mix when it comes to the cloud, "fog computing". Here's a quick run down of just what that term means. Where the cloud [...]

7 Reasons to Outsource Your IT and 3 Potential Risks

As a business owner, you've certainly considered outsourcing some of your business functions because you simply don't have bandwidth to handle them all. This is a simple call for things like accounting and contracts. But, your IT management can always be a little intimidating to release control over. Here are seven reasons you should consider [...]

Cloud Computing’s Most Important Benefit

There are many benefits that come with operating in the cloud - increased uptime, automated backup, automatically updated software - to name a few. But, the most important one is the hardest to actually quantify. Cloud computing's biggest boon to your business is productivity. It's the streamlining of your communications and data flow. Here are [...]

5 Characteristics of Best-in-Class IT Support

Smart SMB owners are learning a valuable lesson that is leading to increased productivity and cost savings. It is simply this - do what you have expertise doing, and allow others to do the same. You hire an accountant for your taxes. You hire an attorney for your contracts. Doesn't it make sense then to [...]

Evaluate Efficiency when Making Plans for 2018

We're almost to the halfway mark in the fourth quarter of our business year. This is a great time to assess your business operations and make plans for the upcoming year. Here are some tips on how you can become more efficient in the new year. Identifying wasteful or inefficient processes is a great place [...]

5 Must-Dos for an Easier Office Relocation

While reasons for office relocation can be exciting, the actual moving can be a major headache. But, there are plenty of ways you can make the whole process a little smoother. Here are five simple tips to help. 1. Label everything. Every box needs a label that outlines the contents and where it should go […]

Step One in Gaining Control of Your Print Expenses

You’ve identified that you are potentially pouring money down the drain when it comes to your printing, be it documents, labels, or any other ink to paper medium. You can’t just tell everyone to reduce what they print. You need a plan. Here is step one. Assess Your Current Print Environment. From The first […]

The Seamless Future of Mobile POS Systems

There have been plenty of blockbuster movies that have shown us what the future of retail shopping could look like. In the Minority Report, eye scanners identified customers walking through the door and projected holograms of sales catered to the shopper. In Wall-E, shoppers never have to leave their hover chairs as they simply request [...]

Outsourcing Your Printing Makes Smart Business Sense

If your business is reliant on printers, for documents, labels, blueprints, or anything else, you know how much time and money can be wasted on print. You can potentially benefit from Managed Print Services (MPS). These services include a wide range of activity and supply management that can save you money. Here we make the [...]

How to Determine the Lifespan of Your Server

When you buy a car, you have a number in your head of the miles you expect to get out of it before the parts start to fail. You use that number to weigh the price of the vehicle. When investing in server equipment, you may be tempted to try a similar tact, replacing miles [...]

Create a Culture of Security in Your Office

Even with the most robust security measures available, one uninformed employee can open the door to catastrophic data loss with the click of a mouse. In our current threat environment, you need more than strong software, you need smart practices and trained people. Creating a culture that values data security in all aspects of your [...]

Choosing the Best POS System for Your Business

There are no shortage of options when it comes to Point-of-Sale systems, which is good because every business has its own needs. While there are many differences, there are some commonalities that any user should expect in today's market. We'll outline the features you should demand as well as share some top picks based on [...]

The Latest News in Ransomware

Ransomware is a hot topic these days. We're seeing it in the headlines far more than we'd like. The trick about digital attacks like this, and most malware attacks in general, is the ever-changing nature of them. The ransomware attacks we saw a year ago aren't the same as they are today. Here's an update [...]

Cyber Security Awareness Month: 7 Simple Steps to keep You Cyber Safe

Hooray! October is here and that means it's National Cyber Security Awareness Month. You may not be as excited as us, but you should still do your part and be aware of how you interact online. The more interconnected we become online, the more windows of opportunity created for cybercriminals. So let's do our part [...]

Hackers Build Backdoor into CCleaner App

A new hack has been announced and it's affecting over 2 million users. The infected application is called CCleaner and it's one that even we have mentioned in the past because it's free and works well to run file clean up to remove clutter from your hard drive. But, as with so many other breaches, [...]

The Why, What, When, & Who of Preventative Maintenance

We are all guilty of losing track of the last time we cleaned our printer jets or dusted our PC fans. Preventative maintenance is one of those tasks that quickly gets lost in the shuffle. When we get a new piece of hardware, we vow this time will be different, but it never is. Preventative [...]

The Obvious and Unseen Savings of Managed Print

If you leave kids alone in a kitchen to make themselves dinner, there is likely to be some unexpected use of food and utensils and plenty of unnecessary waste. When it comes to printing, if left unsupervised, your staff will do the exact same. It's easy to be wasteful when it's not you footing the bill, which [...]

Why the Manufacturing Industry Wins with Managed Services

Manufacturing operations rely on IT for just about everything. When you have machines doing your work, you rely on other machines to control them. IT is part of production, logisitics, supply chain, customer interaction, and more. If it's a large organization, as manufacturing companies tend to be, there will likely be multiple locations as well [...]

What to Do in the Wake of the Equifax Security Breach

The Equifax breach is a big one. The company holds the credit reports of over 143 million US consumers, and those reports have all our most valuable information. They are suggesting that you should not wait to determine if your information was breached to take action to prevent identity fraud. You should start with the [...]

5 Tips on How to Choose a Managed Print Provider

You give your business the most value by sticking with your core competencies. Eliminating some of the other business functions through outsourcing can be a great way to free up your schedule to focus on the important parts. One commonly identified bottleneck in any business owner's day is dealing with print-related issues. But, how do [...]

How to Make More Money While Doing Less

We've certainly got your attention with that headline, right? Too good to be true? Not at all. Entrepreneurs are known for having great ideas, but they are equally notorious for thinking they can do it all. Many SMB owners are the first to admit that they "wear many hats". They tend to hold the reigns, from [...]

Data Security Warning: Hurricanes Bring Out the Scammers

In the wake of Hurricane Harvey, and with the predictions for Irma, we want to remind our readers to keep vigilant about protecting their data. Hackers use the confusion and swell of donation requests as a window of opportunity to send phishing emails. Want to learn how to protect yourself from these attacks? Read our blog [...]

Lenovo Innovations Making Sci-Fi a Reality – An Augmented Reality

Lenovo makes computing equipment that is best-in-class. That’s why we are a certified supplier of their hardware. The Lenovo brand has the industries lowest failure rates, the best end-user experience, and a commitment to cutting edge technology and innovation. The latest out of Lenovo, using Augmented Reality (AR), may not be useful for your business, but it […]

Ransomware: A HIPAA Compliance Nightmare

We've written a lot about ransomware in the last year. It's a serious data security risk and can cause complete data loss, even if you pay the ransom. Dealing with any data loss takes a toll on a business in terms of customer trust, downtime, lost revenue, and security. But, combine that loss with personal [...]


If you’re in the healthcare industry and thinking about the pros and cons of switching over to the cloud, then one of your top concerns is following HIPAA regulation, or ensuring the confidentiality of your patient information. So the question becomes: is it more secure switching to the cloud? This depends on a number of [...]

Free Your PC from Malware with These Simple Steps

Malware is a major problem these days. It just takes one click on the wrong link or email and your PC is infected with a virus, spyware, or even ransomware. The tricky part lies in the fact that these infections may sit undetected in your machine for over three months. Maybe you've noticed some funnky [...]

5 Things You Should Do to Your Laptop Once a Month

We have it easy. We carry supercomputers in our pockets and data processing powerhouses in our shoulder bags. We are no longer tethered to a desk, or an internet cable, or even a power cord. Our freedom has made us more productive, but too often we neglect the basic maintenance these high-powered machines need to [...]

Forget Everything You Know about “Strong” Passwords

How many passwords would you guess you have? In 2007, the average was 17. It's estimated that by 2020 we will have 207 unique logins... each!* As cybersecurity continues to be a growing concern, more password rules have been created. But, one of the men responsible for all those rules is telling us he was [...]

Top Criteria for Choosing an IT Managed Service Provider

Trust is hard, especially when it comes to business because everyone has their own skin in the game. Choosing to outsource functions of your business is never a decision to take lightly. You are granting access to an outsider under the assumption they will protect your interests as well as you would yourself. Some of [...]

The Upside of Office Moves

Office moves are a real glass half empty situation most of the time. There are plenty of articles on how hard relocating your offices can be. It certainly isn't a picnic, but it's not all schlepping and headaches. Here are a few ways to see your move as a glass half full. A Chance to [...]

Lenovo Included in Gartner’s Top 25 Supply Chain Leaders

As a licensed supplier of Lenovo IT hardware, we are always proud when they receive an award. This year they climbed from the 25 spot to the 24th in the Gartner Supply Chain Leaders. We support the Lenovo brand because it has the industries lowest failure rates, the best end user experience, and their commitment […]

A Modern Office and the Integration of the Cloud

Business IT is more interconnected than ever and it's certainly a boon to our productivity. We have talked about the many ways you can use the cloud to grow your business, but it's mostly been in reference to your computing power and data processing. There are several ways a business can integrate the cloud from [...]

5 Ways a POS System Can Enable You to Work Smarter

Retailers have it tough. They need to be open when customers aren't at work and that means weekends, nights, and holidays. They need to manage schedules, monitor inventory, analyze sales, and simultaneously meet and exceed the expectations of the customer. If they want any type of personal life, they need to do all these tasks [...]

6 Biggest Concerns of IT Experts Today

Security is one of the biggest issues IT professionals deal with. Regardless of how perfectly constructed your network architecture is, if your security is weak, it's all for naught. With all of the headlines about ransomware and major breaches, cybersecurity is certainly at the top of the list, but it's not our only concern. According [...]

Invasion of the IoT: Your Kid’s Toys Can Spy On You

The Internet of Things is intended to make life easier by getting all of our devices interacting and working as a team. Our devices even collect data to learn our preferences so they can better suit our needs. It's a wonderful, magical symbiotic interaction in a perfect world environment. But our world isn't perfect and [...]

Restaurant POS Terminal Business Continues to Boom Globally

Restaurant Point-of-Sale (POS) Systems are no longer the simple registers of days old. The new systems integrate mobile devices, assist with inventory and staff management, and operate in the cloud. McDonald's is even introducing a POS with a customer facing interface allowing customers to input their own orders. With the new trend towards quick service [...]

Move Over Ransomware, Wiperware Is Coming to Town

We've talked a lot about ransomware this year. The WannaCry attack was certainly the most notable, recently. Ransomware is a nasty piece of code that takes your system hostage until you pay the hacker whatever they demand. Then, most people assume, you get the pass key and regain control. However, it's often advised to not [...]

5 Principles of Protection for Your SMB

Small to Mid-Sized Businesses (SMBs) are natural targets for the criminally minded. SMBs have limited resources and are more likely to have gaps in their security because there just aren't enough funds to spread around. The flip side of that issue, though, is that these smaller operations often represent the entirety of the owner's assets, [...]

Digital Forensics Finds Criminal Evidence in Auto-Correct

We live in a world where almost everything we do leaves a digital footprint. We use our phones to help us find where we're going, pick a restaurant for dinner, find a doctor, read the news, shop online, and a million other things. Then we tell our friends about those things via text, email, and [...]

Ransomware Attacks on Hospitals becoming an Epidemic

Ransomware is not a new thing. The first newsworthy attack occured almost 30 years ago, shockingly. So why is it making headlines now? The greatest strength of hackers is their ability to evolve. Every time we figure out how to prevent a data breach, they come up with a new twist on an old scam. [...]

Hubs and Switches and Routers – Oh My!

The world of office IT can be a scary and intimidating one if you don't understand the terminology. There is no shortage of complex machinery involved in the simple act of connecting people to the internet and to each other. But don't be overwhelmed! Here's a simple explanation of what each is and what functions [...]

The Single Most Effective Deterrent to Ransomware

Are you tired of hearing the warning bells about ransomware yet? It's in the headlines everyday, it seems. But, this isn't just some internet hoax or overinflated issue gabbed about for the sake of news. It's a legitimate and growing problem that is proliferating, despite the fact that internet and email users should know better [...]

FBI Urges Businesses to Be Vigilant Against Cyber Threats

Ransomware and cybersecurity are big news right now, and not without cause. There have been several major breaches in the last few months that have set everyone on edge, and there's zero likelihood we've seen the worst of it. In response, major agencies are publishing articles to help educate businesses and citizens on what to [...]

How to Choose an Online Backup and Recovery Solution

Your company's data is your most valuable asset, and it is in constant peril. Whether the threat comes from malware or a negliglent employee, the resulting impact of data loss is the same: lost information, lost time, lost money, and lost customers. There are many ways to protect your data, but the most effective one [...]

Is Your Open Office Setup Hurting Your Productivity?

As the 90's ended and the internet (and tech startups) exploded, the limitations of the cubicle-filled office were decidedly outdated. The walls came down and the age of "open space" work environments was born. No more walls to separate us, no more doors to keep us out, now simply a community of employees working together, [...]

The 3 Most Common Plotter Problems

Plotters are complex pieces of machinery used for complicated jobs. The more complex a machine is, the more likely that issues will arise. While there are many models of plotters available, most wide-format printers run into the same main issues. Most require an expert to address, but some you may be able to take on [...]

Thermal Printer Maintenance Tips You Can Use

Thermal /TTR Printers are leading the growth of print in areas such as manufacturing, distribution, and retail sectors, mainly for labels, barcodes, and tags of all types. The healthcare industry, an industry that will only continue to grow as populations increase and people are living longer, have also found that thermal printers are a great [...]

Helpful Tips for Setting Up a Small Office Network

Whether you're starting a new business, or your current one is in a growth period, a well-constructed office network is going to be a boon to your productivity. Your computer network needs to be built with your particular requirements in mind. There isn't a great one-size-fits-all solution. Best practices for SMB network setup say you [...]

Affordable & Effective Data Backup Options for SMBs

In business, your data is just as valuable as your income. In small to medium-sized businesses, this is just as true for you as big business, if not more so. Customers are trusting you over larger operations that have more resources. But, just because you don't have a huge budget, doesn't mean you need to [...]

5 Tips for Buying Your Next Laser Printer

Buying office equipment is never fun or glamorous. But, it's an investment that needs careful consideration nonetheless. While electronic documents and email have greatly reduced the need for physical printers, they are still a necessary piece of hardware for most office environments. There are many options available in the laser printer category and you need [...]

3 Simple Reasons SMBs Need MSPs

Small-to-Mid-Sized Businesses (SMBs) are like the little engine that could. While they may be outgunned in terms of financial resources compared to larger competitors, they keep chugging along and making it work. SMB owners are, more often than not, jacks of all trades. If they want something done in their operation, they do it. That's [...]

FTC Publishes New Resource to Help SMBs with Cybersecurity

We're seeing increasing reports of data breaches on businesses of all size. Big businesses can afford to hire their own IT security professionals and dedicate resources to prevention, detection, and remediation. But, according to the National Small Business Association, more than half of SMBs are victims of cyber attacks. The Federal Trade Commission is seeing [...]

Outdated Windows Platforms at Risk for “WeCry” Ransomware

Last Friday, yet another large scale cyber attack made headlines. Known as "WeCry", "WannaCrypt", "WeCrypt0r", or "WannaCrypt0r", this latest attack was aimed primarily at enterprises, not the general public (like the Google Docs phishing attack a few weeks ago). How did the attack occur so quickly and what can be done to prevent it from [...]

VPNs – Are They the Natural Next Step in Cybersecurity?

Since the beginning of time, humans have sought out new ways to make their lives easier. Early man invented simple tools to help him survive. Modern man invented the internet. It is arguably one of the most useful tools ever created because it can be used for practically every aspect of our lives and we [...]

Death, Taxes, & Data Breaches? How to Manage Cybersecurity Risk.

There used to be two certainties in life: death and taxes. We think it's time to update the saying and include cybersecurity breaches. While computers and the internet have undoubtedly improved our productivity, they have also made us more vulnerable to data theft. Here are some suggestions on how to best mitigate those risks. AntiVirus [...]

Cybersecurity News: Google Doc Phishing Issue Follow Up

Yesterday was a bad day for some Google users. News spread quickly about a phishing attack within the Google system. Estimates now say only 0.1% of users were affected. But, at a billion users, that still equates to a million people that had their data security violated. Phishing attacks are nothing new, why is this [...]

May the Fourth Protect You – It’s World Password Day

The 4th of May has been celebrated by Star Wars geeks for several decades. When spoken, the date bears a strong resemblance to the saying, "May the Force be with you." This year, there's another holiday worth geeky celebration occuring on the same date - World Password Day.  Cybersecurity is a global issue. One of [...]

What Is Cyber Liability Insurance? Do I Need It?

Cyber Liability Insurance is a service more and more insurers are offering, but is it just a waste of money? The word insurance makes people cringe. It presents the age old dilemma: Are you risk averse enough to pay for something you’re not sure you’ll ever actually need? Is it a scam? Or is it [...]

HIPAA Breach Leads to $400,000 Settlement

In the 2017 Experian Data Breach Industry Forecast*, healthcare is highlighted as one of the top 5 data breach trends for 2017. “Healthcare organizations will be the most targeted sector with new, sophisticated attacks emerging.” They emphasize the need to act: “Healthcare organizations of all sizes and types need to ensure they have proper, up to [...]

Earth Day 2017: Sustainability Tips for the Workplace

In honor of Earth Day, we'd like to share some tips on how to ensure your workplace is operating in an eco-friendly and sustainable way. We've taken a few of our favorite tips from our blog posts and the web and compiled them here for you. Use the "hibernate" feature on all PCs and turn [...]

Top 5 Questions About EMV Chip Cards Answered

EMV use in the US has finally taken over. We are behind many countries in adoption, but we're getting close to catching up. Almost every POS system now has a chip reader, although they aren't all functional yet. There has been a huge merchant and customer learning curve, but we're getting the hang of it. [...]

Fake Emails to Ignore to Protect Your Cybersecurity

Hackers can be very clever, there's no doubt. They prey on uninformed email and internet users in the hopes of getting their malware into your network. Savvy users can spot the majority of spam emails and pop-ups pretty easily. But, sometimes we all get tricked. Here is a sample of the most recent email scams we've [...]

4 Key Benefits of Remote Server Monitoring

As your business grows, it becomes harder to stay involved and active in every aspect of your operations. The functions that generate the most income will get the most attention. Unfortunately, if you neglect to monitor certain aspects of your business, like your server and network performance, they can fail unexpectedly and drain that income. Remote [...]

An Easter Malware Warning from Homeland Security

The United States Computer Emergency Readiness Team (US-CERT), a division of Homeland Security, published an important warning this morning regarding the upcoming holiday weekend and cybersecurity: As the Easter holiday approaches, US-CERT reminds users to stay aware of holiday scams and cyber campaigns, which may include: unsolicited shipping notifications that may actually be scams by [...]

EMV Adoption Leads to Surge in E-Commerce Fraud

EMV chip cards and readers were only introduced in the US in October of 2015. Yet, you already have chip cards in your wallet and use them daily. You also know, all too well, the growing pains associated with introducing this new POS technology. It has been plagued by slow processing and a slow learning [...]

The Key to Preventing Costly Network Downtime

The phrase "downtime" should bring one image to mind: a pile of money burning to ash. That's what network downtime does to your profits, destroys them. It's difficult to fully grasp the total cost of downtime because it's so muliti-faceted. In 2015, downtime was estimated to cost US businesses $700 Billion, that's with a B. [...]

The Ups and Downs of Contract Maintenance Agreements

If you run an office, school, lab or any other establishment that requires a sizable number of servers, computers and printers, you might be wondering about the best way to keep your equipment running smoothly for as long as possible. That equipment is no small investment! The two standard options are to sign a contract maintenance […]

6 Essential Server Maintenance Tips You Can’t Ignore

If you’re executing a good deal of programs from your server instead of the cloud, you’re going to have to provide extensive regular maintenance for your server.  Even if you don’t have to use your server much, it’s still wise to provide consistent maintenance and oversight to keep it operating smoothly. A preventative approach always [...]

It’s Your Fault That Employees Are Largest Data Security Threat

Security breaches are becoming more of a promise than a threat. It is not a matter of if, it's a matter of when. According to the Identity Theft Resource report, there have already been 300+ breaches that involved a total of over 1.3 million records in 2017. Last year they reported 980 breaches, meaning we [...]

Do These BEFORE Getting Online with a New PC to Keep Data Secure

Getting a new PC or laptop is a blessing and a curse. It's a blessing in that you get a clean slate, a fresh start. None of the old junk cluttering up your shiny new hard drive. It works at its absolute best. The curse comes when you realize nothing is set up the way [...]

What Are Managed Print Services and Why Do I Need Them?

The business owner is notorious for being a "jack of all trades". When you decide to start a business, you may not feel comfortable outsourcing tasks that you can handle yourself. But, as business grows, demands on the owner grow as well. It starts to become necessary to hand off some of the everyday maintenance [...]

The High Cost of Mobility: Why Laptop Repair Costs More

It has been proven again and again, enabling a mobile workforce can be a boom to the success of all types of businesses. Business owners see increased productivity, efficiency, and employee satisfaction (and thus higher retention). All of these add up to cost savings. However, the lifeblood of a mobile workforce is the laptop and the [...]

4 Best Practices for Server Documentation

Servers are complex pieces of machinery that very few people in a business generally understand. Because of this, it's critical to have thorough server documentation in the event of an emergency. If a problem occurs with your server, you want to be able to act quickly and a well-organized manual is critical to reducing recovery [...]

Staff Must Be Included In HIPAA Risk Assessment, Not Just EHR

With the proliferation of mobile and cloud computing, data security threats are a constant state of things, especially in health care. Cloud storage of electronic health records (EHR) has helped to improve quality and efficiency of care by allowing all of your doctors and specialists to seamlessly access your records and medical history. It has [...]

Does Cloud Computing Violate HIPAA Compliance?

Every day more businesses are shifting some or all of their operations to the cloud, but what if your business requires HIPAA (Health Insurance Portability and Accountability Act ) compliance? Is using a cloud service provider (CSP) off the table for you because you're now transmitting data outside your walls? The U.S. Department of Health & [...]

[Infographic] The Beastly IT Security Threats – A MUST READ

Data and IT Security are at the forefront of everyone's concerns these days. The news is overrun with headlines about breaches of corporations that you'd imagine would have tremendous security measures in place, but still fall victim to cyberattack. Then there are the cautionary tales of identity theft you hear from friends and co-workers. We need [...]

5 Keys for DIY SMB Server Room Setup Success

With all the network security threats and potential government monitoring discussed in the news today, some business owners may prefer to take on their own computing management. Whether you have a small in-house IT staff or you alone represent the entirety of your IT team, setting up a server room is no easy task. Here [...]

Don’t Just Pitch Your Old Computer, Protect Your Data Security

There is a never ending, revolving door of new technology these days. In with the new and out with the old happens a lot quicker than it used to when it comes to IT hardware. When you get a new PC, do you just throw the old one in the trash? Absolutely not. It's bad for [...]

How Do You Know if the Cloud is Right for You?

Let's begin with this false statement, "Moving your IT functions to the cloud may not be right for you." I say it's false because moving to the cloud is inevitable. But, by adding one little word, we can make this statement true. "Moving your IT functions to the cloud may not be right for you, yet." Fail to [...]

4 Reasons You Need Managed IT Services in 2017

Maybe you've overlooked managed services in the past because you weren't ready... ready to pay someone to do what you felt you could... ready to outsource control of critical business functions... ready to trust anyone other than yourself to protect your business. But, now that you're running full-steam ahead with your 2017 plans, you realize [...]

Make the Most of Your Shadow… Shadow IT That Is

Today, shadows are very front of mind. Unfortunately, Punxsutawney Phil saw his, meaning six more weeks of winter. But there's another shadow that we'll be seeing a lot more of in 2017... Shadow IT. Shadow IT refers to IT systems and solutions that are managed outside of the IT department in an enterprise, and often [...]

Is Your Data Security Budget a Waste of Money?

When you look at your total IT budget, how much is dedicated to data security? Have you increased that budget in the last couple of years? Most companies have in response to the growing number of cybersecurity threats that have cropped up in the last few years. More threats should be fought - and won [...]

Data Security Tip: January 28th is National Data Privacy Day

In a very interconnected world, it's imperative that we remember to safeguard our data security. The National Cyber Security Alliance (NCSA), the organization that heads Cyber Security Awareness month each October, has been leading an effort to raise awareness to this issue since 2011, but the history of it goes back to 1981. Data Privacy Day [...]

5 Reasons You Need Contract Maintenance for Your Hardware

When we buy new electronics, we're faced with the decision: Do I buy the extended warranty or insurance plan? Plenty of people immediately think, "This is where they're trying to trick me." I get it. That extra expense wasn't what you intended to pay out of the gate. And it's possible you'll never need it, and [...]

Tips on Telling Your Clients You’re Moving Your Office

Making the decision to move your company is the first step in a very long and complicated process. It takes careful planning and organization to eliminate downtime and minimize impact on your business operations. Any time you are closed, you are losing money, and no one wants to do that! One of the crucial tasks […]

Ransomware: To Pay or Not To Pay?

We've talked a lot about ransomware in the last year. Frankly, the whole world has been talking about it as it becomes one of the leading global cybersecurity threats. The biggest problem with this type of malware is the urgency it creates. Because of an impending threat of data loss and being locked out of [...]

Digital Forensics Is the New Cybersecurity CSI

You've certainly heard the term 'cybersecurity' plenty in the last year. Between the high profile cyber attacks on big box retailers to the newsworthy ransomware attacks on hospitals, if you haven't heard it, you must be intentionally living off the grid, and we don't blame you. Getting in front of cybersecurity issues is front of [...]

Stay On Point with Proper Point-of-Sale System Maintenance

All types of businesses use Point-of-Sale systems, but each uses them a little differently. Where an automotive repair shop may just have a single, fixed terminal, a popular restaurant may have several fixed terminals as well as a series of handheld units that are constantly on the move. No matter what type of system you [...]

Cybersecurity Tip: Voice-Activated Smart Hubs Are Listening

Did you get an Amazon Echo or Google Home for Christmas? They may be really nifty gadgets that make hands-free operation fun, but they're listening to more than just your music requests. These devices have become increasingly popular for their ability to make to-do lists, play music, turn electric appliances on and off, and provide [...]

Is 2017 the Year to Replace Your Server?

Every IT Manager will need to face this costly decision at some point in their careers. Some see the warning signs and put in the due diligence to research their options. Some see the warning signs but wait to take action until there is a critical failure. Some are blind-sided and have to act on [...]

New Year’s Resolution: Grow Your Business with Managed Services

As we get ready to enter 2017, we think ahead to our plans for the new year. If you're a business owner, you are hoping and planning for growth. But how do you find time to focus on the where, when, why and how to get that growth happening? You need to free up some [...]

Prevent Laser Printer Jams With These 5 Tips

Paper jams can bring your productivity to a screeching halt. By taking some simple steps, you can significantly reduce the number of laser printer paper jams you experience on a regular basis. Depending on the printer, you might even go years at a time without having to fight another paper jam while processing print jobs. Use [...]

Malware Alert: Mobile Banking Trojan on Android Phones

Every day new cybersecurity threats are being found. Most recently, there's been an uptick in malware related to mobile banking. The trojan program clones your mobile banking login page and collects your login information when you enter it. And the newest variant includes a ransomware package that will then lock you out of your data as [...]

7 Reasons Managers Love Managed Print

Managed Services are becoming more prolific than ever. Smart business people understand that they are the most successful when they can focus on their strengths and leave the administrative work to others. The market is responding and we are seeing a huge spike in enterprise-related managed services being offered for every business function. This is [...]

Online Shoppers Beware of Malware in Fake Delivery Notifications

Online shopping is a great gift to those who prefer to skip the lines and the parking hunt, or even the need to leave home. We can get all of our holiday gifts from our smartphones. While it's great for shoppers, it's great for hackers too. They are constantly looking for new ways to get into [...]

Malware Tip: Protecting Yourself from Phishing Hacks

Phishing is one of the most prevalent cyber attacks currently. Phishing scams are generally fake email messages appearing to come from legitimate companies, like utility companies, a bank, or the IRS. They direct you to a fake website or ask for personal information, especially account related info. Phishing attacks tend to be panic-inducing in tone to catch [...]

POS Systems are Experiencing an Evolution in 2017

We've seen some major changes in the last couple of years to how consumers can pay for goods or services. We have moved to a credit-based society as less and less cash exchanges hands. Historically, we've used a credit card magnetic swipe to transmit payments. As a result of security breaches, we've moved to the [...]

5 Ransomware Stats That Will Scare You

We've talked about ransomware a lot in 2016. It's a growing, ever-evolving threat to your data security that you may not be paying enough attention to. Preventing this form of cybercrime takes a combination of robust security, in-depth education of staff, and thorough back up. If you need more convincing that it's a threat you [...]

Are You Still Afraid of the Cloud? It’s Time to Get Over It.

In the beginning of any major technology introduction, there are always plenty of hiccups. The first on board, the early adopters, tend to help weed out the kinks. As the mass market adopts the technology, they feel a greater comfort that there will be less bumps in the road. Cloud computing is proving to be an [...]

SMBs Struggle with Cyber Security During the Holidays

In retail environments, 4th quarter earnings can make or break you. Business owners focus on ensuring they have enough stock to cover the demand, without creating surplus inventory. But, are they taking stock of their cyber security measures too? A blogger from ITBusinessEdge doesn't think so. According to a study by IBM's Resilient and the Ponemon [...]

5 Common Laptop Problems and How to Repair Them

A huge chunk of the corporate world is mobile, and they need computing power that can accommodate that. Over the years laptops have gone from bulky and heavy to slim and lightweight. But, even with all the upgrades in power, size, capacity and memory, laptop problems still arise pretty regularly. Here is a quick list of five […]

Printer Problems After Windows 10 Upgrade? Let’s Fix It.

You finally made the switch to Windows 10. After the initial learning curve, you think you have a pretty good handle on it, then you try to print. Where is your printer? Why isn't it working? You're not the only one that's had this happen. Here are some troubleshooting tips to help get your printer [...]

Tech Tips to Reduce Energy Waste at the Office

Reducing energy waste in your office does not have to equate to a sacrifice in personal comfort or quality of workmanship. With the availability of cloud computing, many new options for minimizing energy consumption have opened up that will simultaneously increase the level of freedom enjoyed by team members. Minor changes translate into significant savings [...]

Top 5 Reasons SMBs are Hiring Managed Service Providers

The Managed Service industry is experiencing a major growth trend. More and more, SMBs are realizing that in order to stay competitive with the big guys, they may need to outsource some of their functions to experts, so they can focus on their own expertise. Here are 5 good reasons to consider Managed Services, from MSPblog: […]

Tech News: Microsoft Making It Easier to Get Windows 10 Updates

There are always bumps in the road when new operating systems launch. One of the biggest complaints about Windows 10 stems from trouble users are having with updates. They require too much processing, and thus eat up battery life and space on the hard drive; there is also no control on the timing of them. This could [...]

Insider Tips to Make Your Office Move Easy… Easier

Moving an office is a big job. Not only do you have to pack, move, and unpack all of of your furniture and equipment, but you have to do it fast enough to limit the downtime to your customers. Every minute you're not open, you're losing money. When preparing for an office move, you need [...]

3 Tips to Prevent Malware in Your POS System

We talk a lot about malware and protecting your computers and servers from intrusion. But, your Point-of-Sale systems are another window of weakness where cyber attacks can occur. We all remember the Target attack. More recently, Eddie Bauer found itself a victim as well. Think about it. POS Systems are ripe with valuable payment data [...]

8 Ways a Complete Cloud Solution Wins

Many businesses have already recognized the value of including cloud services within their IT setup, yet one of the newest developments in the world of hosted computing is the complete cloud solution. In this model, all servers, backups, updates and even PCs themselves are hosted on the cloud, freeing your company from the need to maintain [...]

Digital Ghosts Can Be a Nightmare For Data Security

As Halloween nears, we thought a ghost story would be a good idea. But, this isn't about Casper or ghosts in the traditional sense at all. This is a new kind of haunting, one that can linger long after death if not exorcised properly. But, before you run off to the nearest Holy Water supply, let me [...]

Why Law Firms Love Managed Print

Law firms are full of busy people who are heavily reliant on technology to accomplish their daily tasks. While laser printers, copy and fax machines and more are present in nearly every law office, most of these same offices lack a full-time printer technician or an IT specialist. This opens the door for potential downtime […]

Be Cyber Safe: October Is National Cyber Security Month

Since 2004, October has been observed as National Cyber Security Awareness Month (NCSAM) and was created in a collaborative manner between the U.S. government and industry in the hopes of increasing awareness regarding cyber security in general. Do you know how to protect your cyber security, and why it's important for everyone? President Obama has [...]

Ransomware Attacks Now Top Threat to Financial Industry

There have been plenty of reports of ransomware attacks over the last two years. It's clearly on the rise. New reports show that ransomware is now the top cyber security threat to the financial industry, which tends to be the most security conscience sector. Darknews tells us more with some alarming stats. Some 55% of [...]

US Gov’t Issues Malware Warning Tied to Hurricane Matthew

Weather isn't the only threat to fear in a hurricane. Cyber criminals are using the chaos and destruction following Hurricane Matthew to take advantage of unsuspecting web users using malware and phishing scams. The US Computer Emergency Readiness Team (US-CERT) issued a press release tuesday with six preventative measures to take. US-CERT warns users to remain [...]

Tips to Keep Your Thermal Printers Up & Running

Thermal printers are innovative, technological products that can provide amazing benefits for many businesses. Some companies rely heavily on their use, and extended downtime due to maintenance issues can prove very costly. In order to get the most out of your thermal printer and keep it in optimal condition for as long as possible, there [...]

Easier Office Moves: Tips for Relocating Office Technology

Planning for office moves involves much more than just calling a moving truck to haul out the furniture and desks. Relocating office technology includes moving computers and servers and is perhaps one of the most critical aspects of shifting locations, as your company is almost certainly dependent on technology. Minimizing downtime is the key to […]

Tech Tips: [Infographic] Tips & Tricks for Windows 10

At Great Lakes Computer Corporation, we want our customers to feel like they are getting the most out of their computers, printers, servers, and other office technology. In that spirit, we created this quick guide for new Windows 10 users, to help readers understand all the new platform offers. We also provide some quick tech [...]

5 Must Have Features of a Managed Service Provider

You’ve thought about the benefits of IT outsourcing and believe that it could be an excellent way to save money and help your business run smoothly. Great! However, did you realize that not every MSP (managed service provider) is alike? We’ve put together five must-have features of a managed provider to help you determine if [...]

GLC Announces New Partnership with Backup and Recovery Experts

News Release September 27, 2016   TITAN DATA SERVICES AND GREAT LAKES COMPUTER CORPORATION ANNOUNCE PARTNERSHIP TO DELIVER BEST-IN-CLASS IT SERVICES Firms Look to Deliver Unmatched, Comprehensive Managed, Backup, and Restore Services to Ohio Clients Cleveland, OH – Today Titan Data Services and Great Lakes Computer Corporation announced a strategic partnership. The arrangement capitalizes on […]

Printer Problems: HP Firmware Update Rejects Third-Party Ink

Printing can be costly. There have been theories that printer manufacturers don't utilize the full ink tank, and cause you to replace your ink prematurely. From this, stemmed a new business, ink cartridge production and refilling. People willing to risk using non-branded ink cartridges have been doing so for years, much to the printer companies [...]

Data Backup and Recovery Best Practices for SMBs

The amount of digital data that small and medium-sized businesses must process and store continues to increase exponentially, and the need for proper backup and recovery procedures is more pronounced than ever. In order to avoid expensive downtime and ruinous data loss in the event of an emergency, take some time to review your data […]

Tired of Juggling? More Businesses Shift to Managed Services

'Managed Services' as a term is often confused with the much aligned term 'outsourcing'. We're not talking about shifting your operations overseas just to cut costs or firing your trained, in-house staff for cheap labor. We're talking about hiring a specialist to help manage the many moving pieces of your IT infrastructure so you can [...]

Smartphone Malware Infections Rapidly Rising – Protect Your Network

You've heard about the Bring-Your-Own-Device (BYOD) revolution in the work place. It certainly has its benefits. We are on our smartphones at home and at work and use them everywhere else we go. It makes life so easy! All of our work and our play all in the palm of our hands. But there's major trouble [...]

Google Amps Up Internet Security For Everyone

There are lots of ways that hackers can get to you. They can find you on public wifi, access data through your smartphones, and send you infected emails. But the easiest route they can take is the internet, via simple web surfing. With one click of a mouse, you can end up on an infected [...]

EMV Everywhere: All About the Chip Card Revolution

All of the major credit card schemes and card issuing banks have been transitioning to payment by chip card, also known as EMV. It's an older but highly secure technology that is almost impossible to hack. The move to this type of credit card is in direct response to major database hacks of retailers and [...]

3 Ways Dear Aunt Sally is a Potential Data Security Victim

Most of our readers are computer savvy. They know the basics of how their IT works and are mindful of cyber threats and data security risks. But, we all have that relative or friend who is a late adopter of computers, networks, smartphones and the internet. They may not really understand the risks they create [...]

5 Signs It’s Time to Consider IT Outsourcing

Many business leaders assume that by handling Information Technology (IT) management in-house and having greater control over the process, they’ll be able to minimize costs and inefficiencies. It’s actually a fallacy, and here are five signs you need to watch out for. 1. Your IT spending budget is unpredictable, and you need to get it [...]

4 Ways Server Monitoring Can Save You Money

Monitoring your company's server is critical to the smooth day-to-day operations of your business as well as maintaining satisfied clients. Unfortunately, some companies only casually observe daily issues involving the server, often allowing small, correctable problems to develop into major ones. Outsourcing server monitoring, which can be completed remotely with the help of advanced software [...]

Tips to Transfer Files from an Old PC to a New One

Your old computer is outdated and it's time to upgrade. You spend time researching the right machine and finally, you find just the right one. You open up the box and breathe in the scent of unused hard drives, empty caches, and perfect processing speed. But, new computers don't stay without baggage very long. All [...]

Working in the Cloud: The Pros and Cons of Office 365

Lots of people still don't really understand cloud computing as a term. Whether you think you understand the cloud or not, you are already using it - Google, Twitter, Facebook, DropBox - all cloud software. One of the biggest cloud apps is Office 365. Many companies are singing its praises for giving their teams tremendous mobility, [...]

Red Flags Warning You It’s Time For Server Maintenance

After years of providing server monitoring services, we learned to spot some common red flags. Some signs might seem subtle, but others are fairly obvious. If your business relies upon your company's computer server for daily work, you might want to pay attention to what your machines are telling you. Consider these common signs that [...]

5 Ways Managed Print Services Can Save You Money

Can you imagine how much smoother your business could run if you never had to worry about printer trouble or printing costs again? Managed Print Services (MPS) help manage every aspect of business printing, from using printers more efficiently to ensuring that machines get proactively serviced and supplied. Consider five ways that Managed Print Services [...]

Cloud Covered: A Quick Guide to Cloud Computing Models

IT experts have predicted cloud computing will impact over $1 Trillion in IT spending in the next 4 years. Leading up to this announcement, you've undoubtedly heard a lot about cloud applications and  companies that move their entire IT infrastructure to the cloud. But it's important to understand people use terms like cloud and cloud [...]

4 Tips for POS System Maintenance

Many businesses are heavily dependent upon the performance of their POS system, which makes it paramount for them to take all possible steps to ensure that it is always operating in good condition. When POS systems fail due to misuse or malfunction it often results in frustrated customers leaving without a purchase, employee productivity plummeting, [...]

How To Defend Your Network Security from 5 Wi-Fi Attacks

Network Security is serious business. There are many ways intruders can get into your network. Strong passwords are a great place to start defending your network, but you need to take it to the next level. Here are five ways Wi-Fi attacks occur and how to prevent them from NetworkWorld. 1. Lost or stolen device [...]

5 Tips for a Smoother Office Move

You’ve been successful in business and your company is growing. But with growth comes expansion. Increases in staff and equipment can quickly turn your current office space from roomy to congested. Once you find a new office space, you are faced with the daunting task of relocation. Moving is never easy, and there are bound […]

Which Printer Is Right For You?: A Printer Primer.

Although sophisticated mobile technology and the development of the cloud have reduced the need for printers in many situations, most companies still need high-quality printers to power their core business processes. Printers still occupy an important place in the corporate world, and many of the new models are incorporating helpful new features that would have [...]

5 Must-Have Features of Antivirus Software

Since consumers and businesses first started connecting their computers to the internet decades ago, antivirus software has been one of the most important segments of the tech industry. It’s become so ubiquitous in fact, that many people assume all antivirus software offers a similar level of protection and features, and they don’t actually pay much [...]

Network Security Tip: 3 Reasons to Update Your Internet Browser

In our fast-paced technological world, updates are a necessary evil. They take up time, and sometimes they can change things we like, or change the way our apps work. Those can all lead to frustration. Does that mean we should just keep ignoring update requests? Absolutely not! Developers make these updates to improve performance and [...]

6 Ways to Drastically Reduce Your Printing Costs

Printing costs can take a surprisingly heavy toll on a business, but there is much that can be done to drastically reduce the overall expense. The following six ideas will help reduce your company's printing expenses dramatically by implementing some simple changes in your daily activities. Six Ideas to Slash Printing Costs Utilize draft quality [...]

Top 4 Ways Cloud Computing Is Greener Than You Think

There are lots of benefits that come with the switch to cloud computing - reduced costs, increased data redundancy, scalability, and mobility to name just a few. But there is an often overlooked ecological benefit as well. The positive environmental effects of using the cloud can be one more reason to make the switch. Here [...]

The Beauty & the Beast in the Internet of Things – Part 2: The Beast

The Internet of Things (IoT) might sound like another useless buzz word, but it's a very real concept that is becoming a bigger part of your life every day. The interconnectivity between a huge range of objects has the power to change our society for the better, but it also presents many risks from connected [...]

The Beauty & the Beast in the Internet of Things – Part 1: The Beauty

Something funny happened to the internet as we transitioned into the 21st century. It untethered itself from our desktops and laptops and found a home in everyday objects, where it began to revolutionize the capabilities of formerly disconnected devices. In Part 1 of our 2 Part blog, we tell you about the beauty created by [...]

5 Ways SMBs Can Use the Cloud

Do you think cloud computing is too high tech for your small to medium sized business? If so, you are wrong. Cloud computing is useful for businesses of all sizes. It can reduce your IT costs, improve your Disaster Recovery, and be scaled to fit your needs. Here are a few ways you might consider [...]

Data Security Warning: The True Cost Of Free WiFi

When you’re out and about and running up against your cellular data limit, there’s nothing quite as inviting as a sign indicating that free WiFi is available. In the age of ubiquitous broadband internet everyone is expected to be constantly connected for both personal and business communications, and public WiFi can be exceedingly convenient when […]

2 Fundamentals of Small Business Disaster Recovery

Small businesses need to prepare for disaster as much as big ones. It may be even more crucial because the statistics on small business survival after a disaster are daunting. Only 35% of small businesses have a Disaster Recovery Plan (DRP). 90% of small businesses fail within 2 years after experiencing a disaster. The experts […]

Virtual Currency: A Primer and Security Warning

Bitcoin is now so ubiquitous that you’ll frequently hear stories about the world’s most popular virtual currency on the local evening news. Bitcoin and other virtual currencies have exploded in popularity in recent years, yet many people still don’t know much about their foundations and are unaware of the dangers involved in using them. Virtual [...]

7 Security Mistakes You’re Making in the Cloud

People fear what they don't understand, and cloud computing is no exception. You may understand the general concept but don't really understand if you need it and if it's secure. But you are already using the cloud whether you realize it or not - Facebook, Gmail, Instagram, LinkedIn - all data stored in the cloud. [...]

8 Helpful Tips to Increase Data Security in the IoT

The Internet of Things (IoT) is a marvelous idea, conceptually. All our personal and work devices talking to each other to enhance data collection and exchange, to improve how they respond to our needs and make our lives more streamlined and more efficient. Companies are looking for any way they can get their new product [...]

Data Security Tip: Don’t Just Delete Spam, Teach It to Go Away

Spammers rely on catchy headlines and enticing offers to get users to click their emails. While not all spam messages contain malicious content, many do. Most email users are aware of the data security dangers of spam, but don't give it much thought. Our email clients can generally detect most of it and automatically sweep [...]

Tech Tip: Your Likes Could Be Giving the Thumbs Up to Malware

Facebook has created a currency of 'Likes.' They are given and received by the millions every day. Some users are stingy with their likes, some give them freely to every post they see. But, be wary of those viral posts requesting you to 'copy and share' or type 'Amen!' Not all likes or re-posts are [...]

8 Network Security Practices Your Staff Needs To Know

Almost every business now stores at least some of its data digitally, with many organizations attempting to move entirely to paperless record keeping. This is allowing businesses to be leaner and more thorough in their data management, but this proliferation of digital data is also very appealing to cybercriminals. You can purchase the best available [...]

Network Security Tip: Quit Changing Your Password!

Passwords are incredibly important, which is why almost EVERYTHING you access requires them. They are the first line of defense to your data. Best practices for password creation tell us to include a combination of lower and upper case letters, numbers, and special symbols, and the more random, the better. If you value your company's [...]

6 Trends in Cloud Computing You Need to Know

Companies are now realizing that adopting cloud technologies can benefit any type of organization: small or large, traditional or tech-savvy, new or established. As more and more businesses become familiar with cloud services, there is naturally going to be more curiosity about the industry. 2016 is already shaping up to be another eventful year for […]

IT Insider Tip: Beware the Windows 10 Upgrade

More times than not, we readily click "OK" on any Windows related pop up just to get rid of it. However, there's a new pop up to be wary of. Our Help Desk Experts have gotten several calls regarding issues related to this "update" and want us to spread the word. Below are the details [...]

The Multiple Manifestations of Malware

Not all malware is created equal, and the security of your data may rest on being able to recognize the various types that can infect your network. Some of this malicious code does little more than cloud the screen with popups, while other types can result in data theft and severe damage to the operating [...]

6 Easy Ways to Prevent POS Touch Screen Damage

Touch screens are quickly becoming the interface of choice. They take up less space. They're more intuitive. They speed up your work. But, they have one great weakness - humans. We're messy, impatient, and tend to use force when we're frustrated. Here are 6 tips from a Florida POS repair company to help keep your touch [...]

Broken Pipe Leads to GLC’s Own Disaster Recovery

At Great Lakes Computer, we agree with Ben Franklin when he said "If you fail to plan, then you are planning to fail." A thorough plan is the cornerstone of effective Disaster Recovery.  We write about it in our blog all the time. We offer Disaster Recovery backup, replication, and recovery services. We believe in [...]

7 Server Maintenance Tips Crucial to Effective Operation

Servers form a crucial backbone of your company, allowing you to serve clients, store data and run your business seamlessly. In order to keep your server working well, you’ve got to forge a reliable routine that minimizes potential error and breakdown and routinizes crucial maintenance tasks. After all, prevention of common issues through a good [...]

5 Simple Solutions to Your Biggest Printer Problems

Printers can be a real pain. They often don't work quite how you'd expect and fixing them can seem daunting. Before your frustration overwhelms your better judgement,  read these 5 common printer problems and how to fix them from Problem: Printing is too slow. Solution: Rev up printer performance--and save ink in the process--by [...]

Top 5 Ways to Extend the Life of Your POS System

Your point-of-sale (POS) system is crucial. When it’s working well, life is easy, but without it, business comes to a grinding halt, and you can’t even perform the simplest tasks. Don’t let that happen to you by allowing your POS to break down earlier than it’s supposed to. Here are 5 tips for extending its [...]

POS Repair Tips: 5 Helpful Hints to Keep You Up and Running

POS systems are the lifeblood of many businesses, but with finicky parts such as touchscreens and printer ribbons, they are also prone to malfunctions. Having to break out the manual credit card imprint machines is the bane of both your customers and your employees, but some simple steps can help you get the most out [...]

Medium Sized Businesses Targeted Due to Poor Network Security

Hackers, like the viruses they create, adapt at alarming rates. The newest adaptation involves a focus shift to medium sized businesses for cyber attacks. Big companies have the budget to install top line security measures and full IT staffs to oversee them. Medium sized businesses have a hard time keeping up, and that weakness is [...]

**Data Security Alert** PC Users Told to Uninstall Quicktime ASAP

The Department of Homeland Security issued a warning to all PC owners on April 14th; Uninstall Quicktime immediately. There are known vulnerablilities in the software, and Apple has discontinued updates for it. This leaves your PC at risk to hackers. tells us more of the story: This alert stems from a recent call to [...]

BYOD Policies Attract Younger Talent, But At What Cost?

Today's graduates aren't seeking out the classic 9 to 5 cubicle gig. They are looking for a flexible schedule with a greater focus on work-life balance, but they understand the price of that may be working at sporadic hours and on weekends. In order to attract this fresh talent, companies need to consider a fresh [...]

Big Telecom Providers Dropping SMBs – Tech Concierge to the Rescue

In the past year, several major telecommunication providers have decided that SMBs just don't generate enough money to keep as clients. In December of 2015, Windstream announced it would be phasing out all its SMB clients that generate less than $1,500 in monthly revenue. The customers would either have to pay a rate almost double [...]

10 Items Your Disaster Recovery Plan is Worthless Without

Your disaster recovery plan is a crucial aspect of business risk management. If you want to ensure you can maintain business continuity in the face of disaster, you need a good plan in place to help see you through the rough times. Here are 10 items your disaster recovery plan needs to have, or else […]

Top 5 Best Practices for Network Security

The web we create with the introduction of newer, better technology is a tangled one. In a business setting, we not only have internal servers, but we operate on the cloud as well. We have BYOD (Bring Your Own Device) work environments where our staff are using their mobile phones and personal devices to conduct [...]

Printer Maintenance Tip: Spring Clean Your Plotter

Laser plotters can be indispensable to the types of companies that use them. They can also be quite costly to purchase. This is why proper plotter and printer maintenance is crucial.  No CIO wants to be in the position of constantly calling for plotter service, let alone facing the need to replace a unit long [...]

IT Forecast: Cloud Covered

It’s no secret that the growth of cloud computing has been one of the most significant stories in the tech world for several years now. At this point, even the people who would consider themselves the opposite of early adopters have at least heard of the cloud, and have some idea of how businesses are […]

Disaster Recovery Planning: Where to Start?

There’s often a great deal of cognitive dissonance on the part of business owners when it comes to disaster recovery. They think they don’t need to plan for an emergency because they doubt it will ever happen to them, despite the fact that serious data losses occur relatively frequently. Network emergencies can result in lost [...]

Second Hospital Network Security Breach by Ransomware in Just Two Months

Data Backup and Recovery Saved this Hospital from Paying the Ransom A Hospital in Henderson, Kentucky is the second victim of a ransomware attack in the last two months. The first attack using the same ransomware, called Locky, took place in California several weeks ago. The hospital was locked out of its network for 7 [...]

Cloud Computing, Is it as Safe as You Think?

Cloud computing isn't just a buzz word anymore. It is where the majority of data processing and storage is headed, if it's not already there. The cloud offers many advantages over premise-based hosting, the most important of which is Agility. The cloud is scalable and adaptable and in a fast-paced business environment, that is key. [...]

4 Data Security Hacks that Hurt in 2015

The world is constantly becoming more interconnected. Modern broadband technology has brought cheap and reliable communication, increased the efficiency of many processes, and changed entrepreneurship as we know it. It has also opened the door for tech criminals to feast on the ever-expanding availability of sensitive data, and despite the many noteworthy hacking scandals that [...]

Printer Repair Tip: Spring Clean that Printer!

Even the highest quality printers suffer from wear and tear and experience the buildup of dirt and grime through repeated use. These conditions occur very slowly and they can cause your printer to experience diminished performance or even render it unusable. Regular printer maintenance and cleaning is the key to extending the life of your [...]

Computer Repair Tip: 10 Ways to Speed Up Your PC

There is nothing more agonizing than waiting for your computer to catch up with you. It gives bad flashbacks to using dial up modems. Are you willing to try your hand at some basic computer maintenance? The folks at Small Business Trends Magazine outline 10 ways to help you give that PC speed a little [...]

5 IT Solutions That Will Increase Business Productivity

Regardless of the industry, you are in the business of business. You have customers to answer to. You have data to store that is the lifeblood of your business. Are you taking advantage of the IT solutions available to you? They can save you both money and time. Our partners at Avatara share their top [...]

9 Ways to Protect Your Data Security BEFORE Connecting Your New PC

Whether you are managing your business, or your home, you probably use a computer. You use it for searching the internet, paying bills, and storing important records. Computers make our lives more efficient, but also very vulnerable. All of these invaluable pieces of information can be accessed through your network if you're not properly protected. [...]

DIY IT Support: 6 Tips To Troubleshoot Your WiFi

Ubiquitous WiFi connectivity is one of the true marvels of modern life, except when you can’t connect. Few things are more frustrating than computer problems like losing your WiFi connection, especially if you are in the middle of an important task. Instead of reaching for the phone to call IT Support immediately or waiting on hold […]

Hospital Pays Ransom to Hackers in Network Security Breach

Earlier this month, A California hospital's IT systems were taken hostage for an entire week. The hackers inserted ransomware into the hospital's network causing them to lose control of all of their IT systems and demanded $17,000 in bitcoin to release control. The hospital was forced to pay to regain control as quickly as possible. [...]

Managed Services: The Answer to Predicting Your IT TCO?

For small business owners, budgeting for IT expenditures often proves to be one of the most frustrating tasks of running the company. You know you have to spend on essential tech that will put you in a position to succeed, but you find that unforeseen costs can mount over time, busting your original budget and […]

Computer Maintenance Tip: Clean That Case!

Computer users fret about keeping a clean hard drive to keep things running smoothly. You clean out files, run de-frag, and empty your recycling bin faithfully. But there’s physical cleaning to be done in addition to all your digital cleaning. Your PC tower generates static electricity when it runs. This static sucks in dust and […]

POS Systems; Past, Present and the Future

Point-of-sale (POS) systems are one of the most common pieces of technology in modern life, yet we don’t often stop to think about just how thoroughly they changed the nature of business transactions. What once required detailed ledger entries and mountains of paper records quickly became a streamlined operation thanks to the introduction of cash [...]

3 IT Security Failings of the Internet of Things

The seamless synchronization of our multitude of network enabled devices is incredible. They "talk" to each other, sharing and gathering information to help us better understand and control the systems around us. It is the Internet of Things. To put it simply, The Internet of Things (IoT) is the network of physical objects—devices, vehicles, buildings [...]

The Blue Screen of Death! A Good Lesson in Data Backup.

Ack! There is nothing more frustrating, and scary, to a Windows user than the error to beat all errors—the Blue Screen of Death (BSoD for short). This error can cause major data loss for any application that hasn’t saved recently if you don’t actively use data backup. However, even though it is a major, system-wide […]

Terrorist Hackers Violate DHS Data Security, Releasing Staff Info

This week, the U.S. Department of Homeland Security suffered a major data security breach. A hacker released the names, contact info, and job titles of over 9,000 DHS employees. And they said they plan to release the same critical information of 20,000 FBI employees next. Here are the details according to an article published yesterday [...]

How to Save Money on POS Repair

As much as any technological system you rely on, your POS system is the lifeblood of your organization. By facilitating sales, logging crucial data, and communicating with the bank for credit card transactions, a functioning and versatile POS system is an integral part of almost every company’s success. Like any digital platform, eventually your POS [...]

8 Ways Your Computer Problems May Start With YOU!

We all complain about glitchy computers. It’s too old, it never worked right, it keeps crashing. Sometimes it is faulty or outdated machinery. But most of the times the source of our computer problems is good, old fashioned Operator Error. We found a great article from sharing the many ways people screw up their […]

10 Undeniable Reasons People Hate Maintenance Contracts, But Shouldn’t

Service Maintenance contracts can feel like car insurance. You can’t say for sure when or if you’ll need the service and you mentally justify why you don’t want to waste money on what ifs. But this isn’t your car. This is your business, your livelihood. Any number of failures in your IT infrastructure can result […]

6 Tips to Make More Space in Your Hard Drive

Despite exponential growth in memory size and processing speed in computers, we still manage to fill up those hard drives faster than we’d like. The fuller your hard drive, the slower it runs. Here are 7 easy ways to free up space on your hard drive using Windows from Run Disk Cleanup Windows includes […]

How EMV Will Impact Your POS System

With the EMV Chargeback Liability Shift Regulations in full swing, many US merchants are still scrambling to figure out exactly how the introduction of EMV will affect their POS operations. Chargebacks have become an expensive problem for both the merchants and credit card providers, and these regulations represent an effort to reduce fraud and save [...]

Tech Talk: How to Describe Your Tech Issues to a Service Professional

“It’s making a weird thump.” Your mechanic looks at you and resists the urge to slap his forehead. He has to start at square one and figure out this problem without your help, and on your dime. He’ll figure it out eventually, repair it, and then hit you with a giant bill for the time […]

The Biggest Problems With Printer And PC Maintenance … And How You Can Fix Them

We often go through the work day without thinking about the thousands of ways that technology makes doing business easier, cheaper, and more productive. The times we do tend to notice the tech around us is when something fails, causing us to curse the hardware or software error that led to the shutdown. It’s tempting [...]

Questions to Ask When Choosing a Cloud Service Provider

Moving your business to the cloud can reduce costs, streamline your business' workflow and eliminate the need for an in-house IT support staff. The cloud also makes it easy for employees to work remotely and access information from anywhere with Internet access. Although moving to the cloud is a no-brainer, choosing the right cloud service provider for your [...]

Java: Innocent Plug-In or Data Security Risk

Java, a pre-installed plug-in on many pc's, is causing data security concerns for users. Like so many programs, Java requests to be updated on a regular basis; which many people ignore. As reported by the BBC, research by the FTC has found older versions had a flaw in the update tool that "allowed hackers to [...]

Common Computer Problems You Can Fix Yourself

Any time your computer breaks down, panic sets in and many different thoughts run through your head. And to make matters worse, computers always break down at the worst possible times. Before you get frustrated, the first question to ask yourself is, “can I fix this on my own?” Here’s an article from USA Today about common […]

5 Tips for Ensuring Your Data is Secure in the Cloud

Moving to the cloud is a big decision for any business, and security is an important factor to consider before making the switch. In fact, one of the biggest reasons businesses avoid making the switch is due to security concerns. However, it's important to remember that cloud security has improved dramatically over the past several [...]

Tips for Migrating to the Cloud

Migrating to the cloud is often overwhelming for business owners. Do I need to enlist outside help? What is the first step I need to take? Will my employees be on board? These are just some of the questions running through every business owner's head before making the leap to cloud computing. If you're wondering [...]

5 Benefits Of A Contract Maintenance Agreement

Modern businesses across all industries rely on IT infrastructure, whether it be servers, desktops, printers, etc. These systems are vital to your core processes, which is why an inopportune failure of any one of them is a cause for concern. Rather than being left to improvise when your critical support systems aren’t working when you need [...]

How to Effectively Work in the Cloud

Moving to the cloud is "the thing" to do in the business world, but that doesn't mean it's always easy. Migrating your business' operations to the cloud may seem like a daunting task. How do you get your employees on board? What programs do you use? Should I outsource to a third-party service provider? These are [...]

Up and Coming Trends in Cloud Computing

It often seems like trends in the cloud computing industry change overnight. As enterprises increasingly embrace the cloud for a variety of core processes, the industry is shaped by new entrants and forced to adapt to what clients are looking for. Here are some of the trends driving cloud computing right now. Renewed emphasis on [...]

How Managed Print Services Can Help Your Business

As a business owner, you try to do it all. But even the most successful business owners know when it's time to call in the experts. Something like printing may seem like an easy thing to do on your own, but when you rely heavily on paperwork to run your business, it can be overwhelming [...]

EMV And Your POS System: Repair It Or Replace It?

The recent legislation regarding Payment Networks Liability Shift and EMV microchips is designed to reduce credit card fraud, which has been a serious problem for many U.S. merchants for decades. While it remains to be seen what effects it will have on fraud rates, this policy shift has sent many businesses scrambling to update their [...]

Computer Repair: Are Music and Pictures Slowing Down Your Computer?

Every once in awhile, you notice your computer running slower than usual. Applications won't load, it takes forever to open a document, and programs close unexpectedly. When you have a large quantity of music and pictures on your computer, it's easy to think, "well, that must be the culprit!" But are music and pictures really [...]

The Pros and Cons of Contract Maintenance Agreements

If you run an office, school, lab or any other establishment that requires a sizable number of servers, computers and printers, you might be wondering about the best way to keep your equipment up and running. The two main approaches are to sign a contract maintenance agreement with a provider who will routinely service your [...]

Why EMV May Not be Reason Enough to Upgrade your POS System

Now that October 2015 is behind us, many merchants with POS systems who didn't jump on the EMV bandwagon are feeling the pressure to upgrade. Aging Point of Sale systems that cause constant headaches are not fun and could be a good reason to upgrade, aside from the other benefits of security and chargeback liability [...]

The Most Common Complaints About Cloud Computing (And The Truth Behind Them)

As cloud computing grows in popularity, many managers who are resistant to change are trotting out tired, old excuses for why they advocate sticking with the old ways of doing business. Adopting a cloud-based platform results in a period of change for an organization, as is true when any transition is undertaken. However, the numerous [...]

How to Choose the Right Cloud Service for Your Small Business

Cloud computing is arguably the fastest growing trend in the IT and technology industries. By now, you likely know the benefits of the cloud and how your business could benefit from the switch, but there's still a lot of confusion about how it works. If you still find yourself feeling a little bit confused, you're not [...]

8 Things Your Boss Wishes You Knew About Cloud Computing

Over the last decade, the way we do business has changed dramatically. So why are so many managers ties to the old methods of getting things done? People have been tied to the traditional server and PC methods of IT infrastructure for so long that sometimes it's difficult for them to see the benefits of [...]

Is Your Small Business Making These 5 Technology Mistakes?

As a small business owner, you wear many hats. From IT director to marketing coordinator to lead accountant, your job requires you to do it all. But when it comes to technology, a lack of experience can lead to pitfalls or setbacks in your day-to-day business operations, resulting in lost revenue, downtime, or even lost [...]

What’s Holding Back The IT Support Industry?

Few industries have experienced greater periods of rapid change than IT support. Even as recently as twenty years ago, most employees didn’t have access to a computer, and data security was seen as storing and destroying paper documents correctly. Now, almost every user has a mobile device, and terabytes of sensitive data need to be protected […]

5 Surprising Statistics About Thermal Printers

For many industries, thermal printing has ushered in a new wave of productivity and reliability. For sectors that rely on the mass printing of labels and barcodes, such as manufacturing, retail, and shipping, thermal printers have allowed them to print better quality images faster and more efficiently. Many companies are starting to take notice, as [...]

IT Support Question of the Day: Should You Shut Down Your PC at Night?

It used to be, many moons ago, that as you left for work, you shut down your big desktop computer as you were leaving, then allowed it to reboot as you waited for the coffee to brew.  With the advent of such innovations as the laptop and the Keurig, your evening and morning work routines have [...]

Manufacturing IT Support: Why You Need to Embrace Technology

Today's Manufacturing IT Support guest blog is shared from our partner at Informs: One thing is becoming clear to the modern manufacturer: if they want to continue to succeed, they must develop and execute strategies that embrace technological innovations. Increasingly, manufacturers are leveraging digital technologies, the Internet of Things, and other advances to build better [...]

Considering Managed Print? 4 Things NOT To Do When Your Printer Breaks

These days, most people are moving much of their important data and documents to the cloud or other sources of secure, digital storage. It’s likely that you will still need to rely on your printer though for many crucial applications, so the frustration that comes when it's not working when you need it most can [...]

The 9 Most Commonly Misunderstood Facts About Cloud Computing

By now everyone has heard of “the cloud,” but most people tend to associate it with its namesake: i.e. a puffy white ball of nothingness that’s far away and impossible to grasp. Well, folks, the cloud is real, and it could be the answer to your computing frustrations. But not if you don’t understand it, [...]

Top 5 Ways A Move to the Cloud Makes Your Business More Productive

This is a shared post courtesy of our partner, Avatara, LLC and their CompleteCloud blog, and presents 5 ways to make your SMB more productive using new technology: 1. Move to the cloud - based infrastructure.  Ok, so you saw this one coming. But don’t just take our word for it; every day, more and [...]

5 Fun Facts About Cloud Computing

Cloud computing is everywhere, but surprisingly few people understand exactly what it is, or the incredible power it has to continue to revolutionize our digital landscape. Whether or not you get the gist of cloud computing, there’s always more to learn. Here are five fun facts you probably don’t know, which may just make you [...]

SMB Best Practices: 7 Key Practices to Sales Success

According to Pipeline Deals, "If you're in a small or medium-sized business, you're always looking for an edge to maximize your sales success."  No doubt for every SMB we encounter, especially when we are providing IT support to mission critical applications in the sales cycle. Pipeline recently hosted the Accelerate Sales Conference to bring together the top [...]

5 Things People Don’t Know about Thermal Printers

Unlike traditional printing mechanisms, which use a ribbon to apply ink to surfaces, direct thermal printing uses heat sensitive paper that produces an image when it is heated. The thermal print head heats parts of the paper selectively to produce symbols, images and barcodes. Thermal transfer printers, on the other hand, do use ink as [...]

Physical Security is Crucial to Your Data Security

We write about data security in our blog posts often as it is a topic that goes hand in hand with any IT Support discussion. One aspect that often is overlooked is the actual physical security of your serves and systems.  Having a lock on a door to your office simply isn't enough.  No amount of anti-virus [...]

Beginners Guide to Cloud Computing

It is imperative when transitioning to the cloud to know what questions to ask, as well as what information is necessary to share with your possible cloud computing service provider.  Some businesses make the switch with some ambiguity and no clear understanding of data, business and budgetary needs. These few tips could possibly save you [...]

SMB Best Practices: Why Do You Procrastinate?

Today we share a post from our guest bloggers at as part of our Small Business Best Practices series. SMB owners have a lot on their plates, to say the least.  Procrastination can harm the success of your organization. Do you find yourself frequently procrastinating? Here are 10 strategies that may be helpful for you: 1. [...]

Thermal Printers: Heating Up The Print Industry

Thermal printing is a process where images are generated digitally by applying heat to heat-sensitive thermal paper. The heat applied to the paper causes certain chemicals to change color, resulting in the desired images being transferred to the thermal paper. Due primarily to its relatively low cost and high speed of operation, thermal printing has [...]

3 Questions to Ask About Your BYOD policy

Nearly half of all companies have a BYOD policy, and more are making the switch every day. Allowing employees to use their personal devices (smartphones, tablets, laptops) for work responsibilities can result in increased productivity... and increased security concerns.  We are sharing a post today from our partner at Informs, Inc. that presents 3 questions companies [...]

Unique Challenges Arise With Thermal Printer Repair

Businesses across many different sectors are increasingly turning to thermal printers for their printing needs. Companies are always looking for unique ways to reduce costs and increase productivity, and thermal printing manufacturers have aligned their value proposition with these goals, resulting in rapid sales growth that is forecasted to continue for many years. While managers, [...]

Is it Time For Your Business to Scrap the PC and look in the Cloud?

The PC has been a mainstay of the business world for decades, which is a rare feat in the frenetic world of technology hardware. Its form may have transitioned from towering desktops and chunky monitors to sleek, lightweight laptops, but the essence of the PC has remained intact for far longer than most pieces of [...]

Warn Employees Against Ashley Madison Phishing Scams Now

The following is a Phishing Scam Alert from the KnowBe4 blog regarding the Ashley Madison breach, and while it is making 35 million+ people very nervous, it is important as a business owner or IT admin to educate your network's users how the breach can cause some serious issues in IT environments (let alone marriages). Phishers [...]

How Thermal Printing is Changing The Print Industry

Where once you had to physically visit a store or call a salesperson in order to purchase anything, now you can seemingly buy everything with just a few taps on a smartphone screen. This massive increase in the online purchasing market has resulted in a proliferation of new manufacturing and retail businesses. It’s no secret [...]

Signs (and Labels) That Print is Not Dead

The global printing market is expected to top $980 Billion by the year 2018, according to a report by Smithers Group. This growth is despite the fact that many consider print to be dead, as we move towards an expanding paperless world. Consider, for example, the items and events in your life that are now [...]

The Most Innovative Developments In Cloud Computing

Managers across a diverse array of sectors are increasingly turning to the cloud to manage their IT infrastructure. Thanks to exponential leaps in technology such as bandwidth speed and data compression, cloud technology is now more accessible than ever and can provide tangible benefits for almost any company. Business leaders now realize that the days [...]

Don’t Make These Easily-Avoidable Mistakes With Your Disaster Recovery Plan

You may think your organization has implemented a foolproof and robust data backup plan, but it’s not until disaster strikes that the mettle of your efforts will truly be tested. Data recovery technology, like every other sector in the IT services field, continues to change at an intense pace, and as even legacy companies begin [...]

Important steps to getting started with cloud computing

The following is a guest post from Avatara LLC.  Great Lakes Computer is proud to be a partner/reseller of their CompleteCloud product.  When considering a transition to the cloud, it’s important to know what questions to ask and what information to convey to your potential hosting provider in order to make your move as seamless and smooth [...]

Census Bureau Data Breach Brings Up the Question of Downtime

Late last week, officials discovered the Census Bureau's Federal Audit Clearinghouse site experienced a data breach and was hacked. Details of the hack are shared below in an article from The Federal Times. The news of another hack is concerning, but by no means a shock.  The biggest news in this recent release is that [...]

Protecting Yourself Against Cyberattacks

Today's post on IT security from cyber attacks is shared courtesy of Todd Pouliot of Gateway Financial, LLC: 25% of Americans were cyberhacked between March 2014 and March 2015. The American Institute of CPAs announced that alarming discovery in April, publishing the results of a survey conducted by Harris Poll. Disturbing? Certainly, but the instances of [...]

4 Cloud Computing Myths for SMB’s

The following is a guest post from Avatara LLC.  Great Lakes Computer is proud to be a partner/reseller of their CompleteCloud product.  Despite the rapid adoption of cloud computing in government, business and our social lives, there are so many misconceptions concerning what it is and what it does. When technology is understood, the benefits [...]

Ask Me about Anything: 10 Answers To Your Questions About Office 365

No matter what business you are in, the idea of not using technology is absolutely absurd. In today’s society technology is the way that businesses get into the public eye and become relevant to the audience they target. This is why having good software to help maintain your business is a great idea. A popular [...]

An Introduction to Office 365

When Microsoft initially released Office 365 home, university, business, and personal it was the company stepping up their technology game. The release of a program set that works on the new tile version of Microsoft and can be usable for Mac and mobile devices showed that Microsoft wasn’t resting on their past success, but trying [...]

Changes in Company Culture Accompany a Move to the Cloud

While there's a long list of technical tasks involved in a cloud migration, one of an organization's biggest hurdles to being in the cloud is its culture. As we discuss moving to the cloud for more and more of our clients and their applications, we are sharing this post from TechTarget entitled "Avoid culture shock in [...]

What Not to Do In Your Data Backup and Recovery Plan

Assuming your company is one of the many small business that has gotten better about data security and loss prevention, you are probably ahead of the curve. According to the Small Business Administration, most companies do attempt to backup critical data, but less than 40 percent of small companies have any formal plan at all. [...]

5 Costly Mistakes You Are Making With Your Backup and Recovery Plan

According to some insights from PropertyCasualty360, large businesses take disaster planning much more seriously than the majority of small businesses. However, as the Small Business Administration points out, 40 to 60 percent of small companies never reopen for business after a disaster. Since the "risk managers" in most small businesses are simply the owners or [...]

Data Security: Can Hackers Take Control of Your Products & Equipment?

Could you imagine what would happen to your manufacturing company if a hacker took over your control systems? It happened to a German manufacturer. The company could not shut down their blast furnace. The damage, according to a report by Wired, was massive.  The hackers accomplished the feat by accessing the steel mill through its [...]

Beyond IT Support: A Guest Blog About Organizing your Home or Small Office

In today's Beyond IT Support blog post, we welcome guest bloggers again today from Muffy and JoEllen over at to blog about  de-cluttering our work lives - even when your work life is at home.  Here are Home Office Ideas: Do you have a home office that is in need of help?  Clearing the clutter is one [...]

4 Features Of Office 365 That Will Help Jumpstart Your Small Business

As Microsoft prepares to end support and updates for its Small Business Server 2003, many professionals are exploring the cloud-based Office 365 as a potential replacement. The idea of switching from a platform with which you are intensely familiar to an unknown quantity can be a daunting task, but Office 365 offers several benefits over [...]

Keeping up with Employee Demand for BYOD

If you have not adopted a Bring Your Own Device (BYOD) policy for your business, you may no longer have the luxury of delaying.  According to the article, Business trends for 2015: the mobile workforce and BYOD maturing, employee demand will be the main component of growth for BYOD: In 2015, technology, more than ever, will [...]

What Does the End of SBS 2003 Mean For Me?

If you've been relying on Windows Small Business Server 2003 to manage your company's IT infrastructure, it's time to begin investigating other options. Beginning on July 14, 2015, Microsoft will end support for the mainstay OS, and many users will be scrambling to update to a supported platform. There are several options available, but you need to [...]

Ransomware: To Pay or Not To Pay the Ransom?

The following post was featured on TechTarget SearchSecurity earlier this week and is being shared as we have many clients who have asked us this hypothetical question, in the hopes that the day doesn't come that they have to know the answer. Thankfully, they are working with us and have a sound Data Backup and [...]

The State of Healthcare IT Security in 2015

Have you had time to research IT security and how it can impact your healthcare company? If you haven’t, don’t worry, we’ve identified some of the risks and have listed some suggestions to help you get started: 1. Almost Half of All Healthcare Companies Have Had 1 Data Security Incident in the Past Year Did [...]

5 Astonishing Data Security Mistakes Law Firms of All Sizes Make

While law firms have made significant progress in closing data security gaps, they’re still far from perfect. Take a look at some of these common mistakes many make: 1) Not Knowing Where Your Cloud Computing Services Provider Stores Your Data: Every cloud company stores data in multiple physical locations in or outside of the United [...]

Rombertik Identified by Cisco as a New Suicide Virus

Rombertik is a new malware that is making data security headlines, as it collects everyday data you may enter into websites.  It specifically targets collecting the data that users type in fields on websites, such as usernames, passwords, addresses, phone numbers, etc. It is spread through phishing emails. Below is the information to be aware [...]

BYOD: Companies are inviting staff to bring their own computer to work

What is BYOD? Bring Your Own Device (BYOD) is a growing trend that is helping many businesses to expand their worktime coverage and reduce costs. The concept is simple: rather than employees only using business owned computers and mobile phones, they configure their own devices to enable them to access business documents and resources. The [...]

2015 Data Security: The Rise of Hacking Campaigns

Even though technology makes it harder for criminals to do their work, it’s not bullet-proof. In fact, there are many criminals equally as innovative as their private industry counterparts. So they’re fast at developing new methods for attacking your business.Take a look at some ways they might do that in 2015: 1) State-Sponsored Hacking will Continue [...]

‘Ransomware’ a Growing Threat to Small Businesses

I came across an interesting article in the Wall Street Journal regarding recent advancements by cybercriminals to attack small businesses with ransomware, and essentially use malware in bogus emails to freeze SMB computer files, and demand a ransom to unlock them. You may recall we have reported on this before, dating back to 2013, but [...]

5 Data Backup Myths to Ignore

The AT&T Small Business Technology poll found 9 out of 10 small businesses backup their data daily. But, you still hear stories all the time about SMBs that lose their data or don’t comply with given standards. So mistakes still happen. Don’t let yourself be a victim! Ignore these common data backup myths: 1. Onsite [...]

3 Myths About Cloud IT that May Hold You Back From Its Benefits

Companies (especially law firms) of all sizes are adopting cloud computing on a greater scale than ever. But some firms have fears that are still holding them back. Take a look at them, they may be familiar to you: 1. The Cloud Costs More Than Our Budget will Allow: Most cloud apps charge an annual [...]

7 Ways Cloud Computing Can Revolutionize Your Manufacturing Company

As a manufacturer, you are under constant and intense pressure to produce with speed and accuracy. On top of that, every customer interaction counts. How do you keep up with it all, running a solid business that continues to grow in reputation? 1. Add Convenience for Your Customers with Added Services: With the cloud, you [...]

5 Antivirus Mistakes You’re Making Right Now

Once you get an antivirus program, you can totally forget about it, right? You don’t have to do a single thing more because the program does all the work for you…Well, yes and no. Antivirus does protect you so you don’t have to guess which links and downloads are safe, and which aren’t. But, you [...]

5 Signs You’re Not Ready for Disaster Recovery

You’ve got a great disaster recovery plan in place…so you think. You’ve spent hours testing and bulletproofing it from top to bottom. To you, it doesn’t look like there’s a thing wrong. Everything on the surface looks great, but there are things you’ve forgotten to check. Even as you create your disaster recovery plan, your [...]

Do I Really Need to Scrap SBS 2003 When It Works So Well?

Nobody wants to spend money on upgrading a server or moving to another solution when the one they use works so well. But with the End Of Support for SBS 2003 looming, it is, sadly, not really a choice.  I believe that this conversation on Microsoft's TechNet sums up perfectly what many SMB's are asking right now [...]

6 Biggest IT Needs Companies Should Outsource

Your company, whether a law firm, manufacturing plant, or an SMB of any sort, has many IT issues that need to be addressed. But how do you decide which are the most important and whether you should outsource them? Take a look at this list of commonly outsourced IT problems: Computer/printer repair – If you’re […]

10 Things to Know Before Moving to Office 365

With Microsoft's Small Business Server 2003 making its grand departure from the world of support and updates in July 2015, it is time to consider your options if you have not done so already. One option many companies are considering is Office 365, and with good reason. It is a convenient solution, great for remote [...]

Top 7 Disaster Recovery Questions & Answers

What are the top questions your organization should be able to answer about disaster recovery? They might be these: 1.  Has Your Senior Leadership Bought into the Need for a Disaster Recovery Plan? If not, it’s time to start talking about one. Yes, it’s unlikely your physical location will ever be destroyed by a natural [...]