Blog

Technology expertise, advice and tips

Blog

  1. Antique Passwords Are Very Expensive

    Password policies can be frustrating for you and your employees, and many companies do a poor job explaining why they should be in place.  Here’s how they help your business stay safe from security threats. The One Key to Rule Them All Sometimes people need to provide a spare house key to someone so that…

  2. The Undying Business System Revolution

    Have you heard about Agile?  It’s the hot new business system, replacing Six-Sigma as the most sought-after resume tag.  When it comes to successful businesses, it’s out with the black belt, and in with the scrum master.  Like most business systems, Six-Sigma was doomed to eventually fall out of vogue; after all, Six-Sigma took over…

  3. What Is the Goal of Your Business?

    Some business owners start out with lofty aspirations.  For many, however, the goal of starting a business instead of working at someone else’s isn’t a world-changing one.  Some owners don’t enjoy working for someone else and want to try working for themselves.  Some have worked at a “successful” business and felt that they could do…

  4. Data Sprawl (and Why Your Business Needs Zoning Regulations)

    Houston is famous for having no zoning regulations, and it leads to some pretty odd scenes.  While there’s something to be said for freedom to do what you want with your land, it’s hard to look at a skyscraper right next to a single-family house and wonder if that’s really the best scenario for anyone. …

  5. Data Backups Alone Can’t Save You from a Hurricane

    The first hurricane of the season is scheduled to hit Florida, and many businesses in that state are readying their contingency planning.  Hurricanes aren’t uncommon for most areas of Florida; any business that’s been around for a few years has been through this process before. North Carolina gets its share of hurricanes, but for most…

  6. Three Ways Around the Hiring Challenge

    If you’ve hired anyone recently, you know that hiring isn’t fun right now.  Unemployment is under 4% in the Triangle.  Unemployment hovers just above 200,000, a historically low range.  Some industries have even tighter employment markets than these numbers.  If you need a skillset, then the people with that skillset are working for somebody else…

  7. Poor Physical Security: The First Step to a Compromised Network

    CBS recently interviewed a security expert at IBM, and she promised them a surprise when she joined them for an interview.  When she arrived, she handed them each a piece of paper with their account passwords inside. Stephanie Carruthers is not a developer, and she didn’t find their passwords online, either.  She’s a social engineering…

  8. Small-Town Technology Constraints

    We’re located just a few miles south of downtown Raleigh, which is one of the most tech-forward areas in the country.  But there are plenty of small towns only 20 to 30 miles away – towns that are well within our service area but offer a very different environment than the big city. There’s a…

  9. Three Signs Your Company Won’t Die with You

    If you’re 55, there’s a 10% chance that you’ll die within the next ten years.  Put another way, one out of ten business owners who are 55 will leave their businesses behind in the next ten years. How prepared are those businesses to deal with not having their current owner?  In most cases, not very…

  10. Avoiding Cyberattacks by Leveraging Access and Vigilance

    It seems that every other week there’s another story about a cyberattack on a company. Unfortunately, employees are often, knowingly or unknowingly, the source of network attacks. These three articles cover strategies you can employ to help keep your company safe. Three Requirements for Employee Access to Company Data Company data and information can be…