December 16th, 2015 by admin
Before you take your teenage kids to see the new Steve Jobs biopic, ask them what Jobs' first successful product was. Don't be surprised if they answer "the iPod"! For most of their generation, the original Macintosh is ancient history.
Today's Mac...
Read Full Story »
Tags: infrastructure, Mac OS, productivity, security threats, software updates
Posted in: Hardware and Software
December 10th, 2015 by admin
Apple announced the iPad Pro in September of 2015. Microsoft announced the Surface Book just a month later. Both devices are blurring the lines between tablets and laptops, offering interesting new opportunities for technology use in the workplace and...
Read Full Story »
Tags: cost savings, Mac OS, Microsoft Windows, mobile devices, productivity
Posted in: Hardware and Software
December 2nd, 2015 by admin
Your business can take a productivity hit and incur unnecessary expenses because of a very common, often overlooked problem: dust buildup in computers.
Dust inside computers can decrease their efficiency and even their operational lifespans.
These...
Read Full Story »
Tags: cost savings, productivity, tips and tools
Posted in: Hardware and Software
November 24th, 2015 by admin
Earlier this year, the U.S. government revealed a massive cyber security breach which may well bump the infamous Target and Sony attacks down to "small potatoes." The database of the Office of Personnel Management (OPM)—essentially a central HR...
Read Full Story »
Tags: biometrics, identity theft, passwords, security threats
Posted in: Cyber and Data Security
November 19th, 2015 by admin
IT professionals are more concerned than ever about malicious software infections since smart mobile devices hit the mainstream. Many businesses have been relatively open to the idea of integrating smart devices into their workflow as a way to...
Read Full Story »
Tags: Android, BYOD, iOS, mobile devices, Samsung, security threats
Posted in: Hardware and Software
November 12th, 2015 by admin
Chances are you probably have a few USPS "forever" stamps that have been sitting in your desk drawer for a while. When was the last time you actually used them to "snail mail" something—a bill payment or an important letter? Most bills are paid online...
Read Full Story »
Tags: email, encryption, HTTPS, managed IT services, security threats
Posted in: Cyber and Data Security
November 5th, 2015 by admin
Weak IT security generally revolves around the following theory: "We'll keep hackers out of our network—everything's okay until something bad happens."
But strong security operates from an assume breach mindset: The hackers have already infiltrated...
Read Full Story »
Tags: antivirus, malware, managed IT services, security threats, software updates
Posted in: Cyber and Data Security
October 27th, 2015 by admin
Now that the dust has settled around the release of Windows 10, your SMB may be looking to increase productivity by upgrading your OS. Still, you should proceed with caution.
The latest version of the operating system offers a more secure computing...
Read Full Story »
Tags: compliance, managed IT services, Microsoft Windows, software updates, tips and tools
Posted in: Hardware and Software
October 20th, 2015 by admin
The well-publicized recent hack of the Ashley Madison website will probably earn a spot in a "Hacking Hall of Shame"—alongside the infamous Sony and Target breaches—for the sheer amount of grief it may cause millions of marriages. Most of the...
Read Full Story »
Tags: encryption, managed IT services, passwords, security threats
Posted in: Cyber and Data Security
October 16th, 2015 by admin
Online security breaches can be expensive and productivity-killing events. When a nefarious third party acquires an employee password, it’s no party at all.
Many online businesses have begun using Two-Step Verification, also known as Two-Factor Authentication,...
Read Full Story »
Tags: cloud platform, mobile devices, passwords, security threats, two-factor authentication
Posted in: Cyber and Data Security
October 6th, 2015 by admin
The big news out of Microsoft over the past couple of months is the much-ballyhooed release of Windows 10. While “Win10” finally addresses those annoying shortcomings of its predecessor Windows 8 (as we've discussed), it still hasn't corrected a dangerous...
Read Full Story »
Tags: Adobe, antivirus, Apple, Mac OS, Microsoft Windows, security threats, software updates, tips and tools
Posted in: Cyber and Data Security
September 18th, 2015 by admin
Last spring, Hillary Clinton received a barrage of criticism after it was revealed that she used a private email server during her tenure as Secretary of State—seemingly at odds with government security protocols, if not federal laws. Clinton would...
Read Full Story »
Tags: BYOD, managed IT services, security threats, tips and tools
Posted in: Cyber and Data Security
September 11th, 2015 by admin
Once upon a time, IT administrators offered company-issued hardware to employees based upon something akin to Henry Ford's "Model T" approach: "You can have any equipment you want, as long as it's whatever we have for you."
In light of the...
Read Full Story »
Tags: backup and disaster recovery, BYOD, cloud platform, mobile devices, security threats, Wi-Fi
Posted in: Hardware and Software
September 4th, 2015 by admin
In our ever-expanding universe of high-tech acronyms, perhaps one you've recently heard is IPv6. What exactly is it? Why do some IT people embrace it as the foundation of a "new Internet," while the mere mention of it gives others an instant headache?...
Read Full Story »
Tags: consulting services, infrastructure, managed IT services, security threats
Posted in: Hardware and Software
August 27th, 2015 by admin
In this third installment of our blog series on Desktop-as-a-Service (DaaS) and Cloud-hosted virtual workspaces, we'd like to pass along a few pointers about when and how to plan a successful structured deployment within your organization. Everything...
Read Full Story »
Tags: cloud platform, infrastructure, managed IT services, tips and tools
Posted in: Hardware and Software
August 19th, 2015 by admin
Back in July, we talked about the emergence of Cloud-based Desktop-as-a-Service (DaaS). From overall cost to scalability, mobility, and security, more IT decision-makers are recognizing DaaS as simply a better alternative to traditional networks...
Read Full Story »
Tags: cloud platform, cost savings, infrastructure, managed IT services, scalability
Posted in: Hardware and Software
August 6th, 2015 by admin
Each month, Microsoft releases a new security bulletin. In May of 2015, forty-six vulnerabilities had been identified and fixed, spanning products such as Windows, Internet Explorer, and Office. In June, it was even more. While some of these vulnerabilities...
Read Full Story »
Tags: antivirus, backup and disaster recovery, cost savings, firewall, malware, managed IT services, security threats, software updates
Posted in: Cyber and Data Security
July 30th, 2015 by admin
We've recently received quite a few questions regarding "virtual workspaces." Particularly in light of the imminent release of the next version of Windows (which, as we've discussed, won't come cheaply for enterprise users), will virtual workspaces...
Read Full Story »
Tags: cloud platform, cost savings, infrastructure, managed IT services, mobile devices
Posted in: Hardware and Software
July 22nd, 2015 by admin
When we conduct our complimentary IT assessment for a prospective customer, one question we're frequently asked is "Can we do anything to cut down on the noise in our server room?"
Most older office facilities in the Bay Area simply weren't designed...
Read Full Story »
Tags: consulting services, infrastructure, managed IT services, tips and tools
Posted in: Hardware and Software
July 16th, 2015 by admin
We've spent plenty of time here talking about safeguarding your company against phishing and other forms of cyber-attack. As we've discussed, the first line of defense against phishing is to make sure your employees remain vigilant by avoiding email...
Read Full Story »
Tags: Adobe, malware, managed IT services, phishing, ransomware, security threats, software updates, tips and tools
Posted in: Cyber and Data Security
July 10th, 2015 by admin
“Disaster”: the word itself is synonymous with trauma. Of course, even after a traumatic event, there is an opportunity to rebuild. Restoring your data is a critical part of rebuilding your infrastructure and your business after a physical or virtual...
Read Full Story »
Tags: backup and disaster recovery, cloud platform, compliance, HIPAA, infrastructure, security threats
Posted in: Cyber and Data Security
June 24th, 2015 by admin
As the Bay Area moves into the warmest months of the year, you can enjoy the summer knowing your annual home spring cleaning is behind you—when you tackled all those chores in (literally) one clean sweep over a weekend. With that taken care of, now’s...
Read Full Story »
Tags: consulting services, cost savings, infrastructure, managed IT services
Posted in: Hardware and Software
June 11th, 2015 by admin
April 22 marked the annual worldwide observance of Earth Day. This made us think about the role small businesses play in the "Go Green" movement. Many companies have a genuine concern for preserving our planet's natural resources—even if many hotels...
Read Full Story »
Tags: cloud platform, consulting services, cost savings, managed IT services, productivity
Posted in: Hardware and Software
June 4th, 2015 by admin
Let's face it—the humor on Saturday Night Live is pretty much hit-or-miss these days. But one classic SNL sketch from the late '90s remains our favorite: Nick Burns, Your Company's Computer Guy.
Why are Nick's condescending remarks toward his fellow...
Read Full Story »
Tags: consulting services, infrastructure, managed IT services
Posted in: Solutions, Hardware and Software
May 28th, 2015 by admin
If you're over 40, you probably remember the original Sony Walkman—the freedom of listening to a single cassette tape in portable stereo. Even if you still have a few favorite cassette tapes packed away somewhere, where could you listen to them today?...
Read Full Story »
Tags: backup and disaster recovery, cloud platform, infrastructure, managed IT services, security threats
Posted in: Cyber and Data Security
May 20th, 2015 by admin
We've spent a lot of time on this blog talking about cyber-attacks—from nuisance hacking to data theft to virtual electronic terrorism—and the steps your company can take to defend itself. But what if, despite all your best efforts, you one day discover...
Read Full Story »
Tags: antivirus, backup and disaster recovery, encryption, firewall, malware, ransomware, tips and tools
Posted in: Cyber and Data Security, Solutions
May 13th, 2015 by admin
It was about a year ago that Microsoft officially ended support (most importantly, automatic security patches) for Windows XP. Particularly for business users, running a computer on XP after April 8, 2014, became about as wise as leaving keys dangling...
Read Full Story »
Tags: biometrics, Microsoft Windows, security threats, software updates
Posted in: Hardware and Software
May 1st, 2015 by admin
Apple TV, typically used as a video content streaming device for Netflix, YouTube, and iTunes, is fairly common in homes across the U.S. However, this crafty little device that can fit in your palm also has some impressive applications in an office setting...
Read Full Story »
Tags: Apple, iOS, productivity, screen mirroring, tips and tools
Posted in: Hardware and Software
April 16th, 2015 by admin
A friend called me recently to gripe about his personal email account. His ISP has done a pretty good job of virtually eliminating the annoying spam he used to receive (remember your inbox way back when?), but now he's the target of two particularly...
Read Full Story »
Tags: Apple, email, managed IT services, phishing, security threats, software updates
Posted in: Cyber and Data Security
April 1st, 2015 by admin
You probably know President Obama recently hosted a high-profile cyber-security summit at Stanford. The basic idea was to discuss how to expand the federal government's role in combating cybercrime against American businesses—from simple theft to outright...
Read Full Story »
Tags: antivirus, firewall, security threats, software updates
Posted in: Cyber and Data Security
March 20th, 2015 by admin
How would you react if your company's next phone bill revealed a major cost spike—to the tune of over $100,000? It's actually happening now to small businesses across the U.S., thanks to international VoIP toll fraud—perhaps the fastest growing cyber-threat...
Read Full Story »
Tags: cost savings, firewall, managed IT services, passwords, security threats, VoIP
Posted in: Cyber and Data Security
March 12th, 2015 by admin
We've talked recently about the potential dangers of the rapidly expanding Internet of Things, or IoT. As we discussed, the IoT consists of embedded sensors collecting data from dozens of devices in your daily life—your car, your health and fitness equipment,...
Read Full Story »
Tags: Internet of Things, managed IT services, security threats
Posted in: Hardware and Software
March 4th, 2015 by admin
When the Health Insurance Portability and Accountability Act (HIPAA) took effect in 1996, a number of legal "gray areas" existed in that original law. At the top of the list: to what extent was a law firm obligated to protect the confidentiality of Protected...
Read Full Story »
Tags: compliance, HIPAA, law firms, managed IT services
Posted in: Partners and Industries
February 20th, 2015 by admin
You probably remember the 2001 blockbuster remake of Ocean's Eleven starring George Clooney and Brad Pitt. While George and Brad's grand scheme—robbing a secret multi-casino vault underneath the Las Vegas Strip—may have been pure Hollywood, a key element...
Read Full Story »
Tags: security threats, software updates
Posted in: Hardware and Software
February 12th, 2015 by admin
What was cutting-edge in the 1990s is still relevant today — at least, when it comes to Email technology. According to a new PewResearch report, 61 percent of office workers say Email is “very important” to their work productivity. That same study placed...
Read Full Story »
Tags: email, law firms, managed IT services, mobile devices, productivity
Posted in: Hardware and Software
February 4th, 2015 by admin
Computers have a knack for breaking at the most inconvenient time. Murphy’s Law is alive and well. But you don’t need to wait for IT repairs in order to get an employee back to work: smart techniques and planning can minimize your downtime so you can...
Read Full Story »
Tags: backup and disaster recovery, cloud platform, cost savings, managed IT services, productivity
Posted in: Hardware and Software
January 28th, 2015 by admin
Internet of Things (IoT) devices provide a powerful way to utilize technology to enhance everyday machines in your home or office, from wrist fitness bands to refrigerators to thermostats. The ability to monitor your home security cameras while you’re...
Read Full Story »
Tags: firewall, Internet of Things, managed IT services, security threats
Posted in: Cyber and Data Security
January 21st, 2015 by admin
Several years since you probably first heard about it, "the Cloud" remains among the trendiest buzzwords in the tech world—particularly here around Silicon Valley. Several of our Bay Area law firm clients have approached us asking if migrating their...
Read Full Story »
Tags: cloud platform, cost savings, HIPAA, law firms, managed IT services
Posted in: Solutions, Partners and Industries
January 14th, 2015 by admin
It doesn’t take a psychic to know that one of your business goals is improving efficiency and productivity. You can do both with an IT managed service provider. MSPs specialize in finding technical solutions to streamline your work environment and preemptively...
Read Full Story »
Tags: cloud platform, consulting services, cost savings, managed IT services, productivity
Posted in: Solutions
January 7th, 2015 by admin
The holiday season means more than shopping and gift giving. It also now marks prime season for cybercriminals and hackers around the world — and they're coming after small businesses in the U.S.
"Targeting" Target—via Small Businesses
You may have...
Read Full Story »
Tags: cloud platform, firewall, malware, managed IT services, ransomware, security threats, software updates
Posted in: Cyber and Data Security