IT Consultant
-
Importance of Compliance in Business
01/01/18Compliance is a critical component of any security program, but up until recent, was one that was often overlooked. The year 2018 is...
Read blog
-
Protect Those New Devices
12/26/17Now that most the Christmas presents have been unwrapped, many of you are left trying to figure out those new shiny devices you...
Read blog
-
Microsoft has made some advancements that cover its entire suite of productivity apps. Microsoft has supercharged Office 365 with more artificial intelligence (AI) features....
Read blog
-
Just when you think you have seen it all, a new spider ransomware changes the game. Attackers behind a new ransomware campaign are...
Read blog
-
How is Ransomware Really Spread?
11/28/17When you are discussing something where you can't really view it with your eye, such as ransomware, it is hard to really understand...
Read blog
-
If you are one of the other million viewers of the ABC hit drama Grey's Anatomy and tuned in last week, you saw...
Read blog
-
GDPR Compliance
11/14/17GDPR (General Data Protection Regulation) is a regulation that requires businesses to protect the personal data and privacy of European Union (EU) citizens...
Read blog
-
2W Ideas You Can Use – October 2017
10/31/17Moving Your On-premise Epicor ERP System to the Azure Cloud Scale your entire network, including your Epicor ERP system, to 99.995% uptime. Azure...
Read blog
-
Are You Properly Managing Your Data?
10/26/17Stop for a minute and think about your personal devices. I am a Samsung user for both my tablet and cellphone and I...
Read blog
-
Krack Wi-Fi Security Vulnerability
10/18/17Apple, Google, Microsoft and other technology companies have been rushing to address issues related to the Krack (Key Reinstallation Attack) Wi-Fi security vulnerability....
Read blog