man in grey suit facing white hologram chart

You’re ready for Hurricane Irma… but how about your business technology? It’s not too late to protect your computers and data from the impending storm. Here are some quick steps you should take NOW to minimize possible downtime due to storm damage. Check your data backup system to make sure it’s working. Do a test…

Read More
ransomware skull key icon

You sit down at your desk, log on to your computer… and are greeted with a brazen message: YOUR COMPUTER AND FILES ARE ENCRYPTED. YOU HAVE 96 HOURS TO SUBMIT PAYMENT OR YOUR FILES WILL BE DESTROYED. You’ve been working on a project for two days. But when you frantically search for your files, they’re…

Read More
blue hallway with icons on walls and man in suit at the end

Technology makes it easier than ever to monitor your business when you’re not around. You can view live video feeds from surveillance cameras, set your building’s internal temperature, even turn off the lights when the closing crew forgets. It also makes your business more vulnerable to a web-based attack. And the newest threat targeting that…

Read More
blue backup key on computer keyboard

Congratulations – you’ve made the wise choice of backing your data up to a secure off-site facility! But how do you choose the right firm to perform this very important function? If your data is important enough to back it up to a secure off-site facility, you shouldn’t trust that job to just anyone. Here…

Read More
magnifying glass on red broken lock

It has recently been discovered that the Yahoo network was compromised back in 2014, resulting in the breach of over 500 million user accounts. If you have a have a Yahoo account, you should consider yourself at risk and take action immediately. The first concern is the ability of the thieves to use Yahoo passwords…

Read More
fingers clicking on white lock icon

Facebook’s algorithms to suggest friendships often bring to light convoluted yet amusing coincidences. You might see an acquaintance from high school reach out to a colleague at your workplace, or perhaps a long-lost love knows a fellow daycare parent. But these algorithms can also have a troubling side if your profession requires client confidentiality, as…

Read More
woman holding tablet with icons coming out of it

When the livelihood of your organization depends on data stored in your computer network, you simply cannot afford to leave anything to chance. Data preservation and the ability to retrieve it at any point in time is the foundation of business continuity. Yet the facts about backup failures are shocking: According to the Boston Computing…

Read More
purple coding and technology icon

Do your employees bring their own smartphones, tablets or laptops to work? If your company is like most these days, they do. And that raises a whole new security risk to your computer network. One of the best strategies your company can employ to defend against this emerging threat is what’s known as “web content…

Read More
woman holding technology keywords

Thank you for joining me for the second part of our technology business planning series.  Last month we focused on the user experience and how planning to upgrade those components increases user productivity, lowers costs, and supports a healthy and happy workplace environment. Read the previous article, “5 Simple Technology Solutions to Help Ensure Your Workplace…

Read More