Technology Articles from MPA Networks

Backup & Disaster Recovery, Turn Emergencies into Planned Events

July 20th, 2020 by admin

A man using a tablet that shows part of the globe, with a holographic display showing a warning sign and other information

Businesses everywhere have learned that disaster can strike at any time, and they can last for unforeseeable lengths of time. Now more then ever companies need to plan and make contingencies for when the worst comes to pass. They need to utilize backup...

Read Full Story »

Posted in: Solutions

Why Are Businesses Migrating to the Cloud?

February 27th, 2020 by admin

Man in a suit extending out his hand, with a glowing blue cloud representation floating above his palm

With each passing year progressively, more businesses are switching over to the Cloud. Yet there are still companies that haven't made the leap or taken advantage of this innovative technology. Many business owners are still hesitant to shift...

Read Full Story »

Posted in: Solutions

California Wildfire Assistance with Our Cloud-Based Disaster Recovery and More!

December 3rd, 2019 by admin

Disaster recovery plan with switch set to start

Has your business been affected by the recent catastrophic California Wildfires? At MPA Networks, we not only have the solutions to assist in the recovery of your operation, but in this post, we'll also highlight some excellent relief...

Read Full Story »

Posted in: Solutions

Reinventing Traditional Business with Workplace-as-a-Service and BYOD

July 10th, 2019 by admin

Blue cloud displayed on top of a laptop keyboard

Many businesses have changed the traditional business model to adapt to the way people now choose to work. With Workplace-as-a-service, small to midsized businesses can be fully functional and successfully, without being in a physical workspace environment....

Read Full Story »

Posted in: Solutions

5 Email Disasters: How a Service Like MPA Networks Can Prevent Catastrophe

May 3rd, 2018 by admin

Dense, color-coded code in depth-of-field blur

Often, businesses don't prepare for email disasters until after one has hit. But while email may comprise just a small part of a company's day-to-day operation, an email disaster can have a staggering impact on your business. The 2016 Democratic National...

Read Full Story »

Posted in: Solutions

Addressing the Unique IT Management Needs at Law Firms

April 11th, 2018 by admin

Close of up businessman's holding a pen, wearing a black watch and a gold wedding band

Law firms face many unique IT management challenges that stem from the confidential nature of the information they work with. And that confidential data is why law firms must make the protection of information a key IT priority. Threats can come from...

Read Full Story »

Posted in: Partners and Industries

Training Employees in Data Security Practices: Tips and Topics

April 3rd, 2018 by admin

Two women working together in an office, in front of an Apple monitor

While there's plenty of technology available to keep your business's data protected, the human element is still the most important piece to consider in safeguarding your company's data. Properly training employees to understand and implement data security...

Read Full Story »

Posted in: Cyber and Data Security

5 Commonly Overlooked Workplace IT Disasters

February 28th, 2018 by admin

Stylized graphic in blue of a figure holding a giant-sized magnifying glass

Because IT staff get so invested in making sure software, networking and security elements are working, they sometimes overlook the human, environmental and contingency planning factors that can invite workplace IT disasters. In many cases, preventative...

Read Full Story »

Posted in: Cyber and Data Security

Do You Have a Crisis Management Plan for a Cyberattack?

February 8th, 2018 by admin

Illuminated hand touching a stylized chalk flowchart

A cyberattack crisis management plan is your business's best defense for minimizing cyberattack damage after technology-based preventative measures have failed. Unfortunately for most businesses, cyberattacks are not a matter of if, but a matter of when....

Read Full Story »

Posted in: Cyber and Data Security

3 Subtle Ways IT Management Makes Day-to-Day Operations More Manageable

January 22nd, 2018 by admin

Outstretched hand holding stylized, brightly-colored gears and cogs

For many businesses, it is difficult to gauge how helpful IT management can be in the workplace on a day-to-day basis — mainly because when things are going well, there's little to notice. Some of the most important benefits of an IT managed services...

Read Full Story »

Posted in: Solutions

Equifax Breach: What does it teach us about IT security?

October 3rd, 2017 by admin

Highly zoomed icon of a hand-shaped cursor clicking on a link labeled 'Security'

The 2017 Equifax hack is teaching a painful lesson about the necessity of businesses keeping up with software patches for IT security and to avoid catastrophic damage. The hack, which resulted in potentially exposing the financial information necessary...

Read Full Story »

Posted in: Cyber and Data Security

Flash Drives: A Productivity and Security Guide

September 26th, 2017 by admin

Wireless dongle, USB drive, micro SD chip, and 2 SD chips on a field of black

With proper planning, your business can take advantage of USB flash drive technology to increase productivity, while eliminating most of the medium's inherent risk. The USB flash drives likely lying around your business offer excellent opportunities to...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The System Is Down: How To Stay Online When Your Service Provider Is Offline

September 12th, 2017 by admin

Stylized icons that indicate free WiFi is available

It's easy to take a functional Internet connection for granted until it's no longer working. When that Internet connection inevitably goes down, your business could be left scrambling to figure out how to keep working until service is restored. The best...

Read Full Story »

Posted in: Solutions, Hardware and Software

Spare Computer Parts: Which Ones To Keep For Disaster Recovery

July 5th, 2017 by admin

Pile of old computer parts in a metal shipping container

It happens in every office eventually: an employee is going about their workday and suddenly their computer or monitor won't turn on. Fortunately, there's gold in those unused desktops and laptops stuck in the storage closet. Aside from the computers...

Read Full Story »

Posted in: Hardware and Software

79% of Businesses Were Hacked in 2016. Was Yours One of Them?

June 27th, 2017 by admin

Stylized graphic of a computer monitor with a pane of glass shattering in front of the screen

Getting caught off-guard in a cyber security attack is a disaster for any business, large or small—and the frequency of attacks is only getting worse. According to the CyberEdge 2017 Cyberthreat Defense Report, hackers successfully compromised...

Read Full Story »

Posted in: Cyber and Data Security

The Three Copies Rule: Why You Need Two Backups

May 3rd, 2017 by admin

An array of storage media devices, including several USB sticks, laid out on a desk

Anyone who has ever lost years of work due to computer failure will tell you that backing up your devices can save you considerable heartache and frustration. Reliable, redundant, and regular data backups are your business's best strategy for disaster...

Read Full Story »

Posted in: Hardware and Software

The Dock Returns: Anticipating Trends for Productivity Potential

April 19th, 2017 by admin

Stylized graphic of a desktop monitor, tablet, and smartphone, in black and white

Samsung's March 2017 announcement that its flagship smartphone would support first-party peripheral that makes the device work like a desktop computer could mean big changes for how people look at their productivity devices. While this is not the first...

Read Full Story »

Posted in: Hardware and Software

This Is the End: Microsoft Takes a Hard Stance on Phasing Out Older Windows Versions

April 11th, 2017 by admin

Stylized depiction of Windows 10's start menu on a desktop monitor

If your business hasn't already made the switch from Windows 10's predecessors to a new operating system, it's time to make the initiative a priority. While your IT staff doesn't need to upgrade every computer in your office, it's necessary to make sure...

Read Full Story »

Posted in: Hardware and Software

The Benefits of Laptop Docks and At-Desk Peripherals

March 21st, 2017 by admin

Overhead view of a computer user typing on a white, detachable Mac keyboard connected to a MacBook laptop

With a little bit of effort, your staff can reap all the benefits of a laptop, and many of the perks of a desktop, with a little bit of planning and some additional hardware. It's a common perception that laptops lead in portability, while desktops specialize...

Read Full Story »

Posted in: Hardware and Software

Network-Attached Storage: Data Backup and Transfer Options for Small Businesses

March 9th, 2017 by admin

File upload icon in 5 colors: gray, green, red, blue, yellow

Network-Attached Storage (NAS) servers are a great asset for small businesses managing data. For the uninitiated, NAS is essentially a streamlined server designed specifically for sharing files between devices. Because of their simplified...

Read Full Story »

Posted in: Hardware and Software

8 Spring Cleaning Tips for Your Office Computers

March 1st, 2017 by admin

Stylized green bucket, with a blue squeegee and a gray dust buster vacuum

When it comes to your office computers, a little bit of spring cleaning goes a long way. Sure, cleaning office computers can seem tedious. But think of it like preventative maintenance on a vehicle: In the best-case scenario, you'll never know all the...

Read Full Story »

Posted in: Hardware and Software

Breathing New Life into Middle-Aged Computers

February 8th, 2017 by admin

Stylized depiction of an old-style CRT monitor

Your employees' computers may not be up to speed anymore after two or three years of use, but in many cases your staff can upgrade or tune up these devices to keep pace with work demands. Upgrades can often be purchased and installed for under $100 a...

Read Full Story »

Posted in: Hardware and Software

An Expert's Guide to Avoiding Phishing Scams

January 24th, 2017 by admin

White security lock icon spotlighted on a dark field with a background of programming code

Unlike most IT security threats, phishing scams attack the human element instead of the machine element. Phishing scams try to bait a person into exposing confidential information by posing as a legitimate, reputable source, typically by email or phone....

Read Full Story »

Posted in: Cyber and Data Security

The Benefits of Backups

November 16th, 2016 by admin

Three keys with circuit board graphics applied to them

Even seasoned IT pros have made the mistake of not backing up a device—and panicked after losing countless important files because the device failed. We may know better, yes, but that doesn’t mean we’re perfect. On the flip side, we’ve all...

Read Full Story »

Posted in: Cyber and Data Security

Password Managers and Recovery Strategies

August 16th, 2016 by admin

Computer sign in dialog box ***@*******.com

Secure passwords and recovery strategies are an essential part of doing business in the digital age—and password manager programs can help streamline the process. Password managers store and, often, automate login credentials for individuals across...

Read Full Story »

Posted in: Cyber and Data Security

Looking at Data Storage Longevity

August 2nd, 2016 by admin

Oblong view of a depiction of the internal workings of a mechanical hard drive

Not all storage devices were built to stand the test of time, so it’s important for every business to ensure its data is backed up on a reliable platform. If you’ve ever needed to reference financial records or court cases from a decade ago, you’ll...

Read Full Story »

Posted in: Hardware and Software

Where's Your Company's WISP? Why You Need One NOW

June 14th, 2016 by admin

Businessman reviewing 3 papers while poised to write on one with a fancy pen

A WISP is one of the most important documents for any company doing business over the Internet—which, in this day and age, is pretty much everybody. Who's responsible for drafting and maintaining your company's WISP? Or are you even sure what a WISP...

Read Full Story »

Posted in: Cyber and Data Security

Data Breaches: Dark Times in the Golden State?

June 1st, 2016 by admin

Four brightly colored locks intertwined together in a square shape

Being the cyber-security geeks we are, we took great interest in combing through this year's California Data Breach Report, released by the Attorney General's office this past February. The report tabulates data collected from breach incidents which...

Read Full Story »

Posted in: Cyber and Data Security

New Threat Targets Older Android Devices

May 11th, 2016 by admin

Three smartphones with happy, neutral, and sad faces on them

Smartphone users can be broken down into two camps: those who can't live without lining up to buy the latest and greatest model the day it hits the stores, and those who hold on to their tried-and-true phone until it suddenly dies one morning. There's...

Read Full Story »

Posted in: Hardware and Software

Prepare Now or Pay Later: More Ransomware Attacks in the News

April 7th, 2016 by admin

Silhouette of a running man carrying a giant 1 Euro coin, against a blue digital cityscape

We're only a few months into 2016, but we've already seen two high-profile ransomware attacks—where cyber-crooks heavily encrypt a victim's computer files before demanding payment for a decryption key only they can provide. Two notable incidents grabbed...

Read Full Story »

Posted in: Cyber and Data Security

Are Macs “Ransomware-Proof”? Not Anymore

March 23rd, 2016 by admin

Clip art of a hacker in a purple shirt using a blue computer

Since Apple famously introduced the Macintosh over three decades ago, Mac users have been confident that their computers are virtually immune to ransomware and other malware threats which plague their Windows counterparts. But those days are over. ...

Read Full Story »

Posted in: Cyber and Data Security, Hardware and Software

The Death (and Second Life) of a Replaced Business Smartphone

March 2nd, 2016 by admin

Two iPhones against a shiny black background, one with a red case and the other pale blue

When it’s time to upgrade employee smartphones, your business needs to worry about backing up data, clearing the memory, and figuring out the best way to get rid of the old devices. According to Business Insider, the average smartphone upgrade cycle...

Read Full Story »

Posted in: Hardware and Software

New Ransomware Good Reminder to Practice Thorough Data Backup

February 17th, 2016 by admin

A lock with a black and yellow hazard stripe, with a key inserted into it

A new combination of a sophisticated password-stealing Trojan, powerful exploit kit, and content-encrypting ransomware is making its way around the Internet infecting Windows users. If it hits your business, you’re looking at a considerable loss of...

Read Full Story »

Posted in: Cyber and Data Security

BYOD Is Here: Where’s Your Company Policy?

September 11th, 2015 by admin

Android phone displaying an orange 'Google Play' screen, resting on a gray table next to an Apple keyboard

Once upon a time, IT administrators offered company-issued hardware to employees based upon something akin to Henry Ford's "Model T" approach: "You can have any equipment you want, as long as it's whatever we have for you." In light of the...

Read Full Story »

Posted in: Hardware and Software

The Importance of Being Proactive: Why You Need A Breach Response Plan

August 6th, 2015 by admin

Yellow, triangular shaped sign with a black exclamation point on it

Each month, Microsoft releases a new security bulletin. In May of 2015, forty-six vulnerabilities had been identified and fixed, spanning products such as Windows, Internet Explorer, and Office. In June, it was even more. While some of these vulnerabilities...

Read Full Story »

Posted in: Cyber and Data Security

Small Business Disaster Recovery Solutions

July 10th, 2015 by admin

Three keys, each with a different graphic of a circuit board on it

“Disaster”: the word itself is synonymous with trauma. Of course, even after a traumatic event, there is an opportunity to rebuild. Restoring your data is a critical part of rebuilding your infrastructure and your business after a physical or virtual...

Read Full Story »

Posted in: Cyber and Data Security

Is Tape Storage (Completely) Dead?

May 28th, 2015 by admin

Stylized graphic of an arrow pointing into a cassette tape

If you're over 40, you probably remember the original Sony Walkman—the freedom of listening to a single cassette tape in portable stereo. Even if you still have a few favorite cassette tapes packed away somewhere, where could you listen to them today?...

Read Full Story »

Posted in: Cyber and Data Security

Cyber Insurance: Good for my Company?

May 20th, 2015 by admin

Black calculator sitting on a sheet of data, next to an uncapped silver pen

We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

Disaster Recovery: Smart Ways to Work Around a Broken System

February 4th, 2015 by admin

Cartoon of a sad-faced computer and a panicked user with '!?' over his head

Computers have a knack for breaking at the most inconvenient time. Murphy’s Law is alive and well. But you don’t need to wait for IT repairs in order to get an employee back to work: smart techniques and planning can minimize your downtime so you can...

Read Full Story »

Posted in: Hardware and Software

Disaster Recovery: Is Your Data Protected From the Next Catastrophe?

November 6th, 2014 by admin

Eleven blue and white circular icons

Last month, the Bay Area commemorated the 25th anniversary of the Loma Prieta earthquake. Those of us who lived through that experience remember the sudden, unexpected jolt — and how the event disrupted our lives for several weeks afterward. Of course,...

Read Full Story »

Posted in: Cyber and Data Security, Solutions

Use IT to Increase Workplace Productivity - Get the Whitepaper!

April 21st, 2014 by admin

Cover of whitepaper with title 'Zero in on Downtime with IT Productivity'

It is vital that Information Technology enhance workplace productivity, rather than hinder it. With proper IT systems and management in place, it is possible to accomplish your work faster and with far less risk of downtime and technology inefficiencies....

Read Full Story »

Posted in: Solutions

Important IT Security Message for MPA Networks’ Clients

December 19th, 2013 by admin

Cartoon of a red haired woman using a chained up computer while a man extends his hand for payment

One Malicious Email Could Cost you Thousands of Dollars and Take Down your Entire Network – Don’t be a Victim; Learn the Facts! Ransomware viruses are on the rise and their explosive growth in the past few months has been startling.  We want to help our...

Read Full Story »

Posted in: Cyber and Data Security

Protect your Business from Cyber Threats with this 5 Point Checklist

November 21st, 2013 by admin

In bold uppercase: 'Practice Cyber Safety' with the last word in red

About half of all small business owners believe their business is too small to be a potential victim for virtual thieves and hacking. The facts, however, say something quite different. The majority of cyber attacks are actually perpetrated against...

Read Full Story »

Posted in: Cyber and Data Security

5 Things you should do TODAY (and everyday) to preserve your IT systems

November 6th, 2013 by admin

Close up of a keyboard with a stethoscope resting on the left side

The 5 basic tips below are essential to maintaining the health and efficiency of your network, servers, and computer systems. Please consult an expert IT Consultant or Managed Service Provider for more information about protecting your IT systems. ...

Read Full Story »

Posted in: Solutions