Blog
Apple Enhances Mobile Security with iPhone 5s
Earlier this week Apple announced their new line up of iPhones. The iPhone 5c is a new model catering to smartphone users on a budget, while the iPhone 5s is their newest flagship product. The iPhone 5s features a new fingerprint sensor known as “Touch ID” designed...
Cloud Computing Trends 2013: CompTIA 4th Annual Research Report
The Computing Technology Industry Association (CompTIA) is expected to release their fourth Annual Cloud Computing Trends research study this week. This cloud computing research is based on a survey of over 500 IT and Business Professionals collected in June 2013....
Solving Infrastructure Challenges for the Mobile Workforce
If you have a mobile workforce who use mobile devices within your business you want them to be productive, connected and have secure access to your companies applications and data. According to a recent research report by the Computing Technology Industry Association,...
Cyber Attacks in the News (Again)
Cyber Attacks are in the news again. Last week domain registrar Network Solutions suffered a denial of service attempt impacting the websites of their customers. Cyber attacks like this are high profile and always in the news. This raises the questions, are small...
Business Continuity and Disaster Recovery Planning
Business continuity and disaster recovery come to mind as hurricane and fire season is upon us. This week meteorologists are reporting that Tropical Storm Chantal is looming over the East Coast and will potentially flood the southern United States. Last year we all...
IT Service for Small Business
There are many factors driving the way IT Service for small business is delivered. Small to medium sized businesses have the same IT Service challenges of larger companies such as: cyber security threats, cloud deployments and regulatory compliance issues. A small...
Managing Mobility
Mobility and mobile applications in the workplace are being driven by a number of important trends including: a wide range of mobile applications, consumerization of IT and adoption of smart phones and tablets in the workplace. Research firm International Data...
Why Achieve Network Compliance
Network compliance has many benefits for small to medium businesses. Companies processing credit card information may need to maintain PCI Compliance, while healthcare professionals may need to maintain HIPAA Compliance. Businesses recognize the need to secure and...
Getting More From Your IT With Cloud Computing
Cloud Computing adoption is on the rise for businesses looking to reduce capital expenditure and avoid software licensing. According to the Computing Technology Industry Association (CompTIA) Annual Trends in Cloud Computing Survey forty two percent of respondents...
What is Malware and Why Should I Care?
Malicious Software or Malware is a serious concern to IT Security experts and business owners alike. Malware is a category of Cyber Security threats that includes Viruses, Worms,Trojans and Botnets. It is no surprise that the Computing Technology Industry...