IT Insights Trends
51% Think Storms Affect Cloud Computing
Does severe weather impact cloud computing? As seasoned IT Professionals, we may chuckle at the question posed above. However, a recent survey from Citrix shows that many are still confused about what cloud computing is, if they ever use it, and if the National...
Professional Printer Repair – Facts you need to know about printers
[vc_row][vc_column][vc_column_text] Professional Printer Repair for your Business Equipment Small businesses and “one man shops” often avoid the need for printer repair completely by purchasing small, cheap printers that can be thrown away and replaced when they start...
Cloud Computing – Is it Time to Make the Move?
Is the cloud right for your industry? One of the most pressing questions facing small businesses across the board these days is whether or not software located in the cloud can provide cost savings great enough to justify a transition to cloud IT solutions. As more...
Symantec Issues Data Security warning about Shamoon Malware
Another malware wreaking havoc on company networks Symantec is currently warning computer users that a new variation of the Shamoon malware has been detected. This most recent variant performs several different actions on infected systems. In addition to wiping data...
Just When You Thought Your Data Protection was Strong Enough…
[vc_row][vc_column][vc_column_text] How Hackers Erased a Digital Life in an Hour... When tech writer Mat Honan of Gadget Lab, a regular to the Wired blog, lost all of his digital life in the span of an hour, it should be a wake up call to everyone to increase their...
Understanding the Effects of Malware on Data Protection
[vc_row][vc_column][vc_column_text] Understanding the Impact of Malware The term “malware” is a shortcut way of referring to malicious software installed on a system without the owner's permission or knowledge. Malware tends to produce two major effects, both of them...
How Small to Medium Businesses Can Use Social Media to Build Trust
One of the reasons we created the Great Lakes Computer Blog is to share information to further build the reader's trust in us as a knowledge resource. We found that the recent article "How to use Social Media to Establish Trust" by Lisa Baron reinforced our...
Download the Buyer’s Guide to Virtual & Physical Data Protection
This new eBook, courtesy of Dell AppAssure, will help you sort through the new as well as the more traditional data protection approaches, providing the background you need to select the right approach for your environment. About the Author: Greg Shields Microsoft...
Differences in Cloud IT Solutions: Public vs. Private
Public vs. private cloud: essential differences When a small business decides to streamline operations and save money by moving resources or transactions into the cloud, one of the very first issues that must be faced is which type of cloud will best suit the...
A Guide to Malicious Software and Their Threat to Data Security
[vc_row][vc_column][vc_column_text] A Basic Understanding of Viruses Trojans, and Worms Most small business owners have probably seen news reporting on viruses, worms, and Trojans, but they may not have a terribly clear understanding of how these forms of malware...