Blog

Technology expertise, advice and tips

Category Archives: Industry News

  1. Three Important Questions Answered About Spectre and Meltdown for CEOs and CFOs

    You’ve probably heard the news about ‘Spectre’ and ‘Meltdown’, two computer vulnerabilities that also describe Intel’s stock price once they were disclosed.  Both Spectre and Meltdown are major security risks.  The problem behind these two vulnerabilities is hardware-based; that means patching these problems will reduce hardware performance, especially in the case of Meltdown. What does…

  2. Net Neutrality: What Does It Mean For Your Business?

    The FCC’s recent rule change overturning Net Neutrality regulations has gotten a lot of press recently.  Net Neutrality regulations mandated that your internet service provider (ISP) not prioritize one specific type of content over another.  Of course, you might choose to prioritize specific types of content on your own – for instance, your business likely…

  3. What is a Managed Service Provider (MSP) Anyway?

    If you’ve looked for someone to keep your business technology network in good shape and to serve the technology needs of your company, you’ve probably run across the phrase Managed Service Provider or MSP.  It’s one of those phrases that’s used a lot by people inside of the tech industry, but not so much by…

  4. Beware of High Turnover at Your Managed Service Provider

    Think about the service provider your company most appreciates; it might be a law, technology, accounting or marketing firm, or someone else entirely. Regardless of who it is, there’s a pretty good chance that it’s someone you’ve used for a while.  In fact, there’s a good chance that you’ve been dealing with the same people…

  5. GDPR Increases Data Security Requirements On Companies Doing Business in the EU

    The European Union (EU) has for decades been more stringent on data security and privacy than the United States.  A new regulation is going into effect in May of 2018 that bolsters these protections even further, increasing the amount of security required to safeguard EU citizens’ data.  This regulation applies to anyone collecting information on…

  6. iOS 11 and Email: A Reminder of the Dangers of Brand New Software

    With more than 700 million iPhones in use, it’s easy to think that when a new version of iOS (the phone’s operating system) is released all of the major problems will have already been ironed out.  Despite the best efforts of software designers, however, it’s impossible to know how the software will work for everybody…

  7. Two Things Every Managed IT Service Plan Needs

    Have you ever taken a look at a proposal from a Managed Service Provider (MSP) and wondered if it covers everything your company needs?  Some specifications may need to be gathered during the pre-proposal discovery process – for instance, the type of coverage for specific machines, or which line of business apps will be supported. …

  8. Moving to the Cloud without Careful Planning? Beware the Security Risk!

    Cloud security has been a recent issue for a couple of big companies with lots of resources. Part of the reason can be attributed to changing patterns of thought. The evolution of the perspective of companies on moving data to the cloud has closely followed the evolution of the perspective of consumers first purchasing items…

  9. Microsoft 365: A (Confusing) New Product from Microsoft

    Six years after releasing Office 365, Microsoft has announced another completely different product named Microsoft 365.  If that’s not confusing enough, Microsoft 365 isn’t a new product at all, but a relaunch of the Secure Productive Enterprise.  Here’s what you need to know about the two 365s and what they mean for your business. Office…

  10. Disaster Recovery Plan – The Petya Attack Demonstrates the Importance

    In a recent blog post, we warned about an hours-old ransomware named Petya.  In the past two weeks, it was discovered that Petya wasn’t ransomware at all. It was an attack aimed at Ukraine.  When the malware hit, files weren’t encrypted, but deleted entirely.  And even if the ransom was paid, there was no ability…