The Changing World of Antivirus Protection

The Changing World of Antivirus Protection

Computer viruses and malware attacks have become daily occurrences and more complex and complicated.  If you don’t have systems that will protect, defend and respond to these attacks, your business and very livelihood are at risk. Over the past several years,...
The Aging Computer and Your Office

The Aging Computer and Your Office

Some tools just wear out.  The carpenter’s chisel loses its edge. The gardener’s mower gets old and refuses to run. Your car gets too many miles on its odometer. While you might be able to rescue or reuse some of those things, when it comes to computers and...
What is Two-Factor Authentication?

What is Two-Factor Authentication?

As cybercrime increases, we all need to be doing more pre-emptive pushback on these activities. One of the weapons in this ongoing battle is two-factor authentication. Just what is it and how can I implement it if I need to? What is it? Two-factor authentication (or...
Protecting Your Inbox

Protecting Your Inbox

These days, companies’ email systems are one of the most vulnerable places from which a cyber attack can come. this post provides some valuable in formation and solutions relating to how to deal with an attack of this type.

Should My IT Manager Have a Seat at the C-Level Table?

Should My IT Manager Have a Seat at the C-Level Table?

Take a moment and in your mind, go around the table of your last company leadership meeting. You see all of the people who run your company with you and contribute to the bottom line: Your CFO. The head of Operations. Human Resources. Anybody Missing? Is your IT...