When it comes to Cloud Computing many small business owners have a degree of confusion over how the Cloud works, what it is, and how to get there. The reality of the situation is that…
Uncategorized
Case Study : NIST Compliance for a Mid-sized Defense Contractor
Sub-contractors generally must comply with National Institute of Standards and Technology (NIST) security requirements if they wish to bid or work on Department of Defense (DoD) projects. This case study covers a NIST compliance project…
Best Practices for Securing Passwords
Many aspects of computer usage require passwords, including applications, websites and the computer itself. However, advances in computing power and decryption algorithms are changing the best practices for creating passwords. The United States National Institute…
5 IT solutions for Small Business Problems
Large businesses have traditionally invested heavily in managed IT services. These efforts increase the accessibility and visibility of IT services to their users, but small businesses often regard IT investments as a luxury they can’t…
Top 5 Tech Predictions for 2018
The most significant technological advancements in 2017 provide clues to what we can expect during the coming year. Many of these developments involve smartphones, which are still gaining capabilities at a rapid pace. The continuing…
Year in Review: Top IT News from 2017
The top news in IT for 2017 includes developments in artificial intelligence (AI), virtual reality (VR) and augmented reality (AR), and mesh systems. These technologies aren’t new in themselves, but advances in the past year…
Hot Tech Products for the Holidays
The holiday season is approaching quickly, so technology companies are busy releasing their latest products. The most popular high tech products this year will certainly include electronic entertainment, especially music and video. Apple is always…
Three Tips for Securing Mobile Devices for Small Business
Top 3 Tips for Securing Mobile Devices for Small Business A business’s IT security issues have traditionally been confined to a business’s physical location, but the proliferation of mobile devices in the workplace has changed…
Top Tips on Securing the Cloud
Business applications and services are moving to the cloud at a rapid pace, which makes the security of IT infrastructure a challenging business requirement. Once an organization no longer has physical control over its infrastructure,…
Understanding Microsoft Exchange Plans
Microsoft Exchange Online is a cloud-based service that provides businesses with a solution for calendar, email and contacts. It uses the same technology as Exchange Server and provides its users with a unified experience across…