503-359-1275
503-359-1275
 

blog

The Business Guide to Ransomware, Part 3

The Business Guide to Ransomware, Part 3, is our third post in this series of defensive information you need to know, that will absolutely save your company if you are one of the unfortunate ones forced into finding backup copies of your database after you’ve…

The Business Guide to Ransomware, Part 2

The Business Guide to Ransomware, Part 2, is our second post in this series of defensive information you need to know, that will absolutely save your company if you are one of the unfortunate ones forced into finding backup copies of your database after you’ve…

The Business Guide to Ransomware, Part 1

The Business Guide to Ransomware, Part 1, is our first post in this series of defensive information you need to know, that will absolutely save your company if you are one of the unfortunate ones forced into finding backup copies of your database after you’ve…

The Business Guide To Power Outages Part 2

In Part 1 of this topic (Read about it here) we discussed the different technologies available to your business to protect you against power outages. In this post, we discuss a simple and relatively inexpensive device to protect your power. In addition, we discuss a…

THE BUSINESS GUIDE TO POWER OUTAGES

Keep Operations on When the Lights Are Off Businesses of all sizes can be impacted by a power outage, but for small to medium sized businesses (SMBs) in particular, a black out can be devastating. After all, a power outage equals downtime, which translates directly…

Just What You Need To Know About Backup And Business Continuity

Just What You Need To Know About Backup And Business Continuity. This post is just that. Just what you need to know. Nothing more. You won’t have to read through a bunch of technical information that goes on and on, paragraph after paragraph. The steps…

What Is Network Continuity?

Why Does It Matter For Small Businesses? Today’s businesses rely on technology more than ever before. Innovations like cloud-based applications, VoIP, and mobile keep things moving . . . as long as they’re working properly. At the heart of all technology is the network. Without…

5 Keys To Creating A Disaster Recovery Plan

Disaster Recovery and the keys to surviving one was introduced in our last post on this subject. This post will give you the tools to create an effective Recovery Plan that will allow you to survive a disaster that befalls your business. Here are 5…

5 Keys To Creating A Disaster Recovery Plan

Disaster Recovery is something most people do not think about until they read an article about it, or see something in the news about a disaster. There are numerous types of disasters, but there is only one way to survive them. Only one. Preparation. You…

Do You Need Backup?

Do You Need Backup? Absolutely Is backup enough to support your business? Absolutely not Disaster happens 45% from human error 50% from network outage Be prepared How you prepare can mean the difference between business as usual and costly downtime. Without Intelligent Business Continuity, more…

“Successful” Ransomware Attacks are totally UNNECESSARY. Come on people!

This stuff drives me nuts and I do not apologize for the following post. This post may come across as harsh to some. But sometimes the world is a cold, calculating place and we all need a harsh dose of reality to get on track.…

Not All Business Continuity Solutions Are Created Equal

For years, you’ve been hearing about the importance of data backup. You hear about it on radio commercials and on the sidebars of oh so many websites, “just make sure to backup your data and everything will be great!” What?! Well that’s bull%^&*. Okay, maybe…

Cybersecurity Checklist

Cybersecurity Checklist is the headline for this fifth and final post on the critical topic of cybersecurity for small businesses. According to a recent Security and Exchange Commission (SEC) report, small businesses (SMB) are the “principal target” of cyber-attacks. Use this checklist to be sure…

ESSENTIAL CYBERSECURITY SOLUTIONS for SMBS

  ESSENTIAL CYBERSECURITY SOLUTIONS for SMBS is the headline for this fourth post on the critical topic of cybersecurity for small businesses. Essential cybersecurity? Here’s one thing the cybersecurity world can agree on: there is no single product available today that will solve all of…

How to Spot a Cyber Scam

How to Spot a Cyber Scam is the headline for this third post on the critical topic of cybersecurity for small businesses. Inbox Scams To the recipient, an email in their Inbox appears to come from a business partner asking the reader to “open the…

Essential Cybersecurity Toolkit

Essential Cybersecurity Toolkit is the headline for this post about a cybersecurity toolkit for your small business (SMB). There are five Types of Social Engineering Scams Before you get started on building a cybersecurity toolkit for your business, let’s take a few minutes and talk…

Essential Cybersecurity Toolkit

The Essential Cybersecurity Toolkit is the headline for this series of posts on the critical topic of cybersecurity for small businesses (SMB). Simply stated, cybersecurity are technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In…

Ransomware protection for your business.

  STAY ONE STEP AHEAD OF POTENTIAL DISASTERS Ransomware protection for your business. This means a successful defense against an attack on your business that would otherwise be a disaster for you and your business reputation. The best defense against a ransomware attack is a…

Ransomware? Business owners never, EVER, pay ransomware!

Ransomware?! Yep. If you Google “ransomware”, a cyber-attack on your business in which hackers commandeer a company’s data until a ransom is paid, the resulting headlines and statistics will all point to the same conclusion: this malware has become the most prominent, global threat to…

Business Continuity Checklist

Business Continuity (BC) is a very broad subject. There is much to consider and much you can overlook. Los Angeles Valley College may want to rethink their BC planning in light of the ransomware attack they recently had to endure and pay for; this would…

Disaster Recovery Planning, aka, Business Continuity

Disaster Recovery Planning, also known as Business Continuity, is the ability to keep daily operations running—even in the midst of a natural, man-made or technical disaster. It isn’t just about data backup, though; it’s a holistic practice that also addresses ready access to backups and…

The Case For Modernizing Your Data Protection Strategy

  Cyberattacks are on the rise—and so are temperatures, which can increase the risk of natural disasters. Get the scoop on these and other challenges to your data protection strategies. The modern era is a time of constant change and challenge for IT professionals: •…

The Guide to CryptoLocker Protection and Removal

WHAT IS RANSOMWARE? In order to discuss CryptoLocker, first we must have a handle on ransomware. According to the definition offered by the US Department of Homeland Security, ransomware is a type of malware that infects computer systems, restricting users’ access to the infected systems.…

Backup and Data Protection for the SMB: What they need to know

Introduction Backup and data protection for the small business. Today’s small to mid-sized businesses, or SMBs, are creating more data than ever. Their growth calls for more robust solutions to back up their business critical data. Due to limited financial and IT resources, it is…

The Business Guide To Ransomware: Keep your company afloat

INTRODUCTION In this business guide to ransomware, you’ll find out more and more, that ransomware has emerged as a major threat to individuals and businesses alike. Ransomware, a type of malware that encrypts data on infected systems, has become a lucrative option for cyber extortionists. When…

CEO. Here’s why you care about Data Backup and Disaster Recovery.

Introduction As a proactive CEO, you know that implementing a solid business continuity and disaster recovery plan, also referred to as BCDR, is essential for your business. After all, why would anyone in your position ever put a business at risk to downtime or data…

What is a MSP?

Should Your Company Outsource IT? IT service providers deliver the technical expertise small businesses need at a much lower cost than hiring IT staff. They can recommend, install, and manage technology according to business’ objectives and core competencies and ensure that critical data is safe.…

Top 3 Benefits of Image Based Backups

Top 3 Benefits of Image Based Backups Data is the new currency, and in order to stay competitive businesses must protect it. However, data size and volume are increasing at an unprecedented rate, spawning stricter IT regulations and greater downtime costs for businesses. Outdated backup methods…

Backup versus business continuity: plan better for your business – Part 1

Backup versus business continuity and data protection solutions are essential for businesses of all sizes to implement, regardless of size, industry and geographic location. In this blog post, we’ll discuss the importance of business continuity rather than simply backing up your data. We’ll also explain…

Cure your IT ailments with Business Continuity – Part 1 As a healthcare company, your patients are your number one priority. Part of your obligation to them is to keep their health-related information as confidential as possible. This information can include their health history and insurance…

Data backup and recovery

Data Backup and Recovery? Lately we’ve had a number of conversations with small business owners who think they’re okay because they have their data backed up. Don’t get me wrong, backing up your data is good a thing to do, very good, but it’s only one…

Risk Assessment: Why is this such a big deal?

Risk Assessment: Why is this such a big deal? Answer: Conducting regular risk assessments is fundamentally good business practice. Risk Assessment – In our business, we talk with covered entities (CE) who will sometimes tell us, “Oh yeah! We’re HIPAA compliant. We have an EMR…

Why HIPAA Enforcement Will Get Stronger In 2016

Why HIPAA Enforcement Will Get Stronger In 2016? In our last post, we reminded the followers of this blog that for the last couple of years we’ve been expecting many more HIPAA audits from the Office of Inspector General (OIG). In fact we are sure…

Why HIPAA enforcement will get stronger in 2016 We’ve been saying for the last couple of years that many more HIPAA audits from the Office of Inspector General (OIG) were sure to be heading our way. But of course we’re an IT Support company, serving…

Ransomware attacks

Ransomware attacks are world-wide. Ransomware attacks from hackers are taking control of computer networks on a truly global scale. These criminals are locking up files stored on computers and demanding money to un-lock the infected computer so the rightful owner can get their files back.…

You MUST have adequate disaster recovery mechanisms in place.

“You MUST have adequate disaster recovery mechanisms in place. A Datto Siris would have prevented the damage and had them (Hollywood Presbyterian Medical Center) back up in 5 minutes.” Disaster Recovery This was our first thought when we read about a hospital paying $17,000.00 in…

Maintenance of Assessment Criteria This is the topic for our tenth post in our “compliance – why and how” series. In this post we will introduce The Guard, a software application from the Compliancy Group that we use here at DTS InfoTech to Achieve HIPAA…

Passwords: Their requirement and vulnerability, is the main topic for this ninth post in our “compliance – why and how” series. But passwords is not the only topic; we’re also throwing in Threats and Manual Tracking for good measure. Passwords Applications residing on the company…

Application Risk Analysis Application Risk Analysis and the need for it, is the topic for this eighth post in our “compliance – why and how” series with specific emphasis on the application infrastructure. Risk Analysis After a company completes a thorough Risk Analysis, they will have…

An easy-to-use web-based HIPAA Compliance portal!

HIPAA Got You Sideways? We can get you turned around. An easy-to-use web-based HIPAA Compliance portal? Please raise your hand if you’ve ever been overwhelmed by the sheer magnitude of becoming HIPAA Compliant at your business. You know what I’m talking about; when you think…

Synthesizing the tenets of NIST

Synthesizing the tenets of the National Institute of Standards and Technology (NIST) is the sixth post in our “compliance – why and how” series. Regulatory compliance typically presents a complex problem requiring an even more complex solution. By synthesizing the tenets of NIST, one should be…

NIST – The National Institute of Standards and Technology

NIST – The National Institute of Standards and Technology and the excellent guidance they provide to all organizations trying to achieve HIPAA Compliance is the fifth post in our “compliance – why and how” series. What is so good about NIST? NIST strengthens the nation’s innovation,…

Regulatory Compliance

Regulatory Compliance using the International Organization of Standardization (ISO) is the fourth post in our “compliance – why and how” series. Today we look specifically at Information Security Management. Regulatory compliance help Regulatory compliance used to come with a saying that corporate America should not…

The HITECH Act

The HITECH Act This is the topic for this third post in our “compliance – why and how” series. For good measure, we will also address the Payment Card Industry Data Security Standard. The HITECH Act, also known as The Health Information Technology for Economic…

Regulatory impact

Regulatory impact is the topic for this second post in our “compliance – why and how” series with specific emphasis on HIPAA Compliance. That is with the exception of this post! This post includes two other descriptions of specific compliance legislation and industry mandates (Sarbanes-Oxley…

Computerization of business data

Computerization of business data, specifically transactions between patients and health care providers is causing no end of concern and problems for the medical personnel who serve their patients and the patients themselves who benefit from it. The explosion of all things digital We all are…

Windows 10. Should I upgrade? Or should I wait?

Windows 10. Should I upgrade? Or should I wait? Now that Windows 10 has been out for a while we want to address that question. But before we begin we must have full disclosure here. DTS InfoTech is a Microsoft Partner and we really like…

Business Associates (BA) not complying with HIPAA.

Business Associates (BA) not complying with HIPAA is our 6th post on the subject of The History of HIPAA. In this post we’re addressing the risk BA’s are taking by not complying with HIPAA. We’re also providing links to stories of “small” BA’s that have been…

Covered Entities (CE) not complying with HIPAA

Covered Entities (CE) not complying with HIPAA is our 5th post on the subject of The History of HIPAA. In this post we’re addressing the risk CE’s are taking by not complying with HIPAA. OCR = Enforcement For many years, after HIPAA became the law…

Business Associates not complying with HIPAA

Business Associates not complying with HIPAA is our 4th post on the subject of The History of HIPAA and in this post we’re going to address the risk they’re taking by not complying with HIPAA. Ignoring HIPPA compliance It’s apparent to this writer, and the Department…

HIPAA’s Major Provision’s

HIPAA’s Major Provisions This is the third post in our series HIPAA History and now that we’ve explained the structure of HIPAA, let’s look at some of HIPAA’s major provisions in more detail. What is the Privacy Rule? Proposed in November 1999 and enacted April…

HIPAA History and Background – Continuing with HIPAA

HIPAA History and Background That was the first post on this topic and we quoted an article by Daniel J. Solove that is an excellent resource on HIPAA. In this post we start putting the pieces of HIPAA together and we begin by asking the question: What…

Attached documents? I open them all the time.

And not only that, I attach documents to my emails all the time. As an information technology (IT) company, DTS InfoTech resolves problems for customers who get themselves into trouble with attached documents. It doesn’t happen all the time, but often enough for us to know that people…

HIPAA History and Background

HIPAA History and Background From a business associates perspective it’s very interesting, to say the least. As an IT Company, it’s apparent to me the massive change this legislation has brought about is not going to stop; there is too much change occurring in Information Technology…

Data Backup and Disaster Recovery – Critical business topic.

Data Backup and Disaster Recovery is the headline for our third and final post on this critical topic to businesses of all sizes. If you ever have to recover from a data erasing disaster at your business and you’re prepared, you’ll be able to say,…

Data Backup and Disaster Recovery – critical business topic.

Data Backup and Disaster Recovery is once again the headline for this second post on a critical topic to businesses of all sizes. If you ever have to recover from a data erasing disaster at your business and you’re prepared, you’ll be able to say,“I’ve…

Data Backup – Disaster Recovery

Data Backup and Disaster Recovery is the headline for this first post on a critical topic to businesses of all sizes. If you ever have to recover from a data erasing disaster at your business and you’re prepared, you’ll be able to say, “I’ve been…

HIPAA compliance for small health care practices?

HIPAA compliance for small health care practices – that was the last thing on our mind, here at DTS InfoTech, an MSP (Managed Service Provider). Basically we’re computer geeks. We design, implement and manage computer networks for small businesses (SMB) that don’t have their own IT…

National security and business continuity go hand-in-hand.

“Vandalism in Arizona Shut Down Internet, Cellphone, Telephone Service Across State” National security and business continuity were already on mind when I read that headline last week, and I thought, “OMG, how many businesses were affected by that communication outage? Virtually all of them I…

Microsoft Windows Server 2003 End of Service

Microsoft Windows Server 2003 End of Service. Even though we’ve known this was coming for a while now, Microsoft officially notified their partners today that as of July 14th, 2015 (that’s only five months) they are stopping support on Windows Server 2003. Remember Windows XP?…

Data backup centers, thousands of miles apart means data is safe

Data backups is the tenth and final post from our Business Advisory Guide entitled “12 Little-Known Facts Every Business Owner Must Know About Data Backup, Security And Disaster Recovery.” Written in plain English, this easy to read 15 page guide explains what you must know about data backup…

Ransomware – hiding your head in old technology? It may cost you.

Ransomware – hiding your head in old technology? It may cost you. It was reported last week by CNN Money that visitors (using outdated browsers like Internet Explorer 8) to the Huffington Post website picked up an infection on their systems just by visiting the site…

I Don’t Need A Backup And Security Audit. My IT Guy Has It Covered.

I Don’t Need A Backup And Security Audit comment from business owners, is the topic of our ninth post from our Business Advisory Guide entitled “12 Little-Known Facts Every Business Owner Must Know About Data Backup, Security And Disaster Recovery.” Written in plain English, this easy…

I Don’t Need A Data Backup And Security Audit.

Data Backup And Security Audit is the topic of this eight post from our Business Advisory Guide entitled “12 Little-Known Facts Every Business Owner Must Know About Data Backup, Security And Disaster Recovery.” Written in plain English, this easy to read 15 page guide explains what you…

Virtualize your server? Critical if your building is destroyed!

Virtualize your server? It’s critical if your building is destroyed and it’s the seventh post from our Business Advisory Guide entitled “12 Little-Known Facts Every Business Owner Must Know About Data Backup, Security And Disaster Recovery.” Written in plain English, this easy to read 15 page guide…

Continuous backup and storing copies of data in remote locations

Continuous backup and bare metal imaging headline the sixth post from our Business Advisory Guide entitled “12 Little-Known Facts Every Business Owner Must Know About Data Backup, Security And Disaster Recovery.” Written in plain English, this easy to read 15 page guide explains what you must know about data…

Backup Service-IT Company-Demand 12 Characteristics

12 Characteristics To Demand From A Backup Service And IT Company is the fifth post from our Business Advisory Guide entitled, “12 Little-Known Facts Every Business Owner Must Know About Data Backup, Security And Disaster Recovery.” Written in plain English, this easy to read 15 page…

Data backup and why you need to get rid of your tape backup.

Data backup is the topic of this post, and if you’re a business owner you probably have some type of backup system in place. That’s good. HOWEVER, there’s a HUGE difference in the quality and reliability of backup systems and services. Plus, data backup is only ONE…

Data Backup & Disaster Recovery-Businesses are misinformed

Data Backup and Disaster Recovery misinformation is the topic of our second post from our Business Advisory Guide entitled “12 Little-Known Facts Every Business Owner Must Know About Data Backup, Security And Disaster Recovery.” Written in plain English, this easy to read 15 page guide…

Data Backup Disaster Recovery: business owners don’t get it.

Dear Business Owner, Data Backup Disaster Recovery. Have you ever lost an hour of work on your computer? Now imagine if you lost days or weeks of work – or imagine losing your client database, financial records, and all of the work files your company…

Computer consultant-hire by being informed. It’s easy!

Computer consultant and how to hire one (our final word on this subject) is the fourteenth and final post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide…

Computer Consultant – 5 More Mistakes To Avoid When Hiring.

This is the thirteenth post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the maintenance of their computers. This…

Stolen passwords? I know. Again, I have to change mine, again!

Stolen passwords I like routine and the feeling of ease and convenience that it brings. When it comes to things like car keys, combination locks and passwords, I take them all for granted. Because they’re just that, routine, easy and convenient and always around. I…

Computer network maintenance: 4 Most Costly Misconceptions – Part 4

For the last time, computer network maintenance is the headline for this twelfth post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who…

Computer network maintenance: 4 Most Costly Misconceptions – Part 3

Once again, computer network maintenance is the headline for this eleventh post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to…

Computer network maintenance: 4 Most Costly Misconceptions – Part 2

Computer network maintenance is the headline for this tenth post from our Business Advisory Guide entitled“What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the…

Computer network maintenance: The 4 Most Costly Misconceptions – Part 1

Computer network maintenance is the headline for this ninth post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the…

Computer Consultant Search? 20 Questions You Must Ask – Part 5

This is the eight post from our Business Advisory Guide entitled“What Every Business Owner Must  Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the maintenance of their computers. This…

Computer Consultant Search? 20 Questions You Must Ask – Part 4

This is the seventh post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the maintenance of their computers. Our…

Computer Consultant Search? 20 Questions You Must Ask – Part 3

This is the sixth post from our Business Advisory Guide series entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the maintenance of their computers.…

MS Internet Explorer – “zero day” security flaw

By now you have probably heard or read news of a massive MS Internet Explorer (IE) “flaw” that was discovered two days back.  Several of our clients have written us to inquire about whether or not it is safe to use MS Internet Explorer at…

Computer Consultant Search? 20 Questions You Must Ask – Part 2

This is the fifth post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the maintenance of their computers. In…

The Heartbleed bug

What you must know to protect yourself Our company, DTS InfoTech, is an IT Support Company, located in Portland, Oregon. As a technology company supporting about seventy five small businesses, we receive emails from our clients who are alarmed by a rumor they just heard…

Computer Consultant Search? 20 Questions You Must Ask – Part 1

This is the fourth post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.” We wrote this guide to help business owners who have to outsource the maintenance of their computers. Last week…

Hiring an IT Support company? 5 Rules to know before interviewing

This is the third post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the maintenance of their computers. In…

Microsoft Windows XP is abandoned! Am I the only one who loves XP?

This is probably a silly question about Microsoft Windows XP  Am I the only one who loves the Microsoft Windows XP operating system? Is there anyone out there besides me that is more than just a little ticked off about being forced to abandon something…

Beware: The Computer Consultant and Repair Industry Is NOT Regulated

This is the second post from our Business Advisory Guide entitled “What Every Business Owner Must Know About Hiring an Honest and Competent, Responsive and Fairly Priced Computer Consultant.”  We wrote this guide to help business owners who have to outsource the maintenance of their computers. In…

Computer consultant – How do I hire one? What should I do?!

Please raise your hand if you’ve ever felt unqualified to hire a computer consultant that will manage all of your computers and technology for your business. Because this hire is so critical to your success, when you really think about it, you’re hit with an…

Hackers Targeting Small Businesses: Now they’re after the rest of us!

“We’ve been hacked.” There is a must read article for all small businesses. It’s about electronic hackers and a small business in Chicago that was successfully hacked. The authors are Geoffrey A. Fowler and Ben Worthen. The title of the article is: Hackers Shift Attacks…

Is Your Data Backed Up?

“How are your Data Backups?” if your answer is . . . “Uh . . . I . . . think they’re ok?” That’s the wrong answer.

Maintaining Corporate Antivirus Programs

Saying “We’ve never had a virus problem on our network” is like saying… “I don’t carry car insurance, because I’ve never had an accident!” Corporate Antivirus Programs, like car insurance, will always cost you less in the long run.

Break-Fix IS more expensive

Break-Fix is waiting for a problem to arise and then resolve it… preventative maintenance,
like car maintenance, will always cost you less in the long run

IT Support is Not Expensive

For as little as $1/day, per computer, your systems can be fully backed up, patched, cleaned and optimized. So what does $1/day get me? LiveWatchIT “Essentials” Office Managed Services Automatic Cleanup of Temporary Internet Files and “Temp” Folder to get rid of accumulation Automatic Disk…

Attacks, i.e. LizaMoon, foiled by built-in safeguards and common sense

A note from dts|infotech to our valued clients and friends . . . You may have heard about a current news story regarding the “LizaMoon” web attack. To see what this attack actually looks like, follow this link and watch the 4 minute video. It’s…

Employee Monitoring 2: Protect your company from employee misconduct

On January 11, 2011, Thomas J. Donohue, President and CEO of the U.S. Chamber of Commerce, said in his The State of American Business 2011 speech that, “We also need stronger global rules as well as more effective enforcement efforts to address the rampant theft…

Employee Monitoring: Feedback that employees tell us they want more of

Regarding employee monitoring, one of the published goals of the non-profit, Privacy Rights Clearinghouse is to “Raise consumers’ awareness of how technology affects personal privacy.” And according to their Fact Sheet 7: Workplace Privacy and Employee Monitoring, “Employers want to be sure their employees are…

Data Recovery: Only $199.00! Is cheap what you really want, seriously?

Whenever I see advertising that claims Data Recovery for $199.00! I always think about what we went through to recover our data. And I wonder if other companies who find themselves in a similar situation really want to trust their data recovery for $199.00.

Networks: IT consultants manage your network and make you successful

My introduction to computers and networks began when the owner of the company I was working for told me I was the new network guy. He said he had over looked how important computers would become as our company grew. My response was, “I’ve never…

2010 client satisfaction survey

We want to thank all of you who took the time to submit the survey. We really want to know “how we’re doing” and this blog post is to publish the results.

new look

After many years in business we thought it was time for a different look, so we’ve come up with a new logo, videos, and a blog for our website.