August 06, 2015

In a previous posting (June 25th to be exact) we talked about three things to consider when selecting an outsourced IT service provider.  You conduct a thorough search and choose a vendor.  You can now relax, right?  Afraid not.

Now the second phase of the relationship comes into focus.  Even the strongest partnership between a client and outsourced IT vendor requires consistent attention on the client’s part.  While any good IT vendor is not going to breach that partnership, blind trust is not the way to go with any IT vendor (or any vendor for that matter). 

July 23, 2015

You’re finally doing that much anticipated – and long-time coming – upgrade of your technology systems.  You’ve allocated enough capital to make required hardware and software purchases; you’ve carved out time for training of your users; you’ve prepared yourself and your staff for the possible disruption of service; and you’ve backed up all of your data.

Ready to deploy, right?  Nope.

July 16, 2015

We’ve all been there.  You spend a week putting together the winning presentation for a new prospect.  Night before the big day you save the final version with plans to print copies the next day.  Morning arrives, you go to open the file, only to find Murphy has recently visited.  The file is corrupted.  Through no fault of your own your technology has conspired against you.  Your rising panic creates a fog as you think of how to fix this disaster.

July 09, 2015

Your business and personal digital worlds are growing daily, and that’s not going to change.  Cloud services, apps, websites, etc.; they’ve all become a consequential part of growing your business and conducting your personal affairs.  That means your connection to these myriad resources is more essential than ever before.

July 02, 2015

Technology can be an enormous expense for companies looking to stay relevant in the digital world.  The latest and greatest products and/or services (Faster! Smoother! Brighter!), however, might not be the best solutions for your employees, the people who actually use the products and/or services everyday.

New technology may disrupt processes with which your staff has grown comfortable.  It may lead to insecurity and frustration, especially if employees view it as a threat to their jobs.  Worse yet, they may ignore the technology altogether and never put to use.

June 25, 2015

Putting it mildly, choosing an IT services firm can be a stressful process. There are a myriad of factors to take into consideration, and you know going into the process that a mistake will be costly on so many levels.

With technology now the lifeblood of so many businesses, here are three critical factors to consider when making this all-important decision:

June 18, 2015

It's not often, if ever, I go to ESPN for news on an IT-related story. But the revelation earlier this week that the FBI is looking at the St. Louis Cardinals for possible hacking of a Houston Astros database just is too good to ignore. Especially when some of the "leaked" info indicates that a former Cardinal executive, Jeff Luhnow (now GM of the Astros), may have used the same passwords with the Astros he did with the Cardinals.

June 11, 2015

Technology plays a significant, if not a central, role in almost every modern business. From a solopreneur to corporate giants with employees across the globe, their respective technology infrastructures are critical to business operations and success.

June 04, 2015

The most important step when setting up your business’s wireless network is to establish its security. Your wireless network is a portal to your company’s Internet.  It is a digital entry point to everything you do. It should be very difficult for unauthorized users to gain access to that network.

May 21, 2015

Sure it’s convenient – hunkering down at your local Starbucks to do some work, sipping a latte and listening to your favorite playlist, perhaps even taking a quick break to do some online banking.

I mean, it’s easy (and free!) to connect to their Wi-Fi network, and you’re obviously being careful, right? You look around and make certain no one is scrutinizing your keystrokes as you enter your password, you’re sitting at a private table and no one is right at your elbow, so you feel you’re safe and secure. Oh, how you are so not.