by Admin | Aug 25, 2012 | SMB Technology
Maintaining Network Security: For many companies, network security is necessary to achieve compliance for PCI, HIPPA and other regulatory requirements. Keeping your computer and wireless network secure is a good policy to protect your company’s critical data. Without...
by Admin | Jul 10, 2012 | SMB Technology
Bring Your Own Device (BYOD) Bring your own device (BOYD) is a recent trend where employees use their personal mobile devices including: iPhones, iPads, tablets computers and smartphones to access company information including your network, email, files and critical...
by Admin | Apr 16, 2012 | SMB Technology
One hundred years ago the ship, called “unsinkable” had its hull breached by an iceberg and caused the death of over 1500 passengers. You may think your network is “invincible” like the Titanic, however, your network security policies may cause vulnerability putting...
by Admin | Mar 28, 2012 | SMB Technology
Do you know what’s connected to your network? If not, you should! Auditing your network and creating an inventory of your IT assets catalogs all devices connected to your network including PCs, laptops, printers, routers and switches. In some cases, assets discovered...
by Admin | Feb 29, 2012 | SMB Technology
Every four years we all get something we all need in our busy lives, more time. How we use that extra day may determine whether we become more productive or efficient. Maybe that gift of an extra day will make us more relaxed. This year February 29th falls on a...