Does Your Business Still Rely on Old-School Technology?

Posted by Jeremy Kushner on Oct 25, 2016 8:00:00 AM

When is the last time someone tried to reach you via pager rather than a text message? Or the last time you reached for a floppy disk to save an important document? Doesn't even the thought of these seemingly prehistoric technologies kind of make you cringe?

While advances in technology have certainly streamlined many business processes allowing the companies to save both time and money, many organizations still utilize antiquated technologies each and everyday for the few business objectives that haven't evolved past these old school devices—and experts say that some of these antiquated technologies likely won't be going away anytime soon.

So, which technologies are we talking about exactly? Let's take a closer look at the archaic technologies that are still being used in today's business settings and why:

Read More

Topics: General Interest

The Nuts and Bolts of Modern Email Encryption

Posted by Jeremy Kushner on Oct 18, 2016 8:00:00 AM

Enterprises must devise a strategy of implementing email encryption for users who frequently send sensitive data. In the past, many businesses would use PGP cryptography to securely send private data using email services.

With PGP, both the sender and receiver must retain the encryption/decryption keys on their systems in order to exchange emails. While PGP email encryption is still in use today, the implementation of PGP is cumbersome and confusing.

In addition, your administrators will lack the tools they need effectively audit privileged communications. This begs the question: How do organizations achieve a balance between security and usability?

Read More

Topics: General Interest

Does your Business Have an ITAM Strategy?

Posted by Jeremy Kushner on Oct 11, 2016 8:00:00 AM

As your organization begins to grow, keeping track of your assets becomes a critical task. Although most employees can be trusted, IT equipment can mysteriously disappear prompting many CIOs to inquire about how they can better keep track their investments in technology.

Your IT staff must embrace asset tracking by making it a part of their daily routine. When new equipment is issued, the IT department must inbound the equipment and save the serial number, make, and model in database.

Larger organizations will take this a step further by putting a unique bar code on each device that has been deployed. When assets are moved or reassigned, the IT staff will log this change in their database.

In this article, we will examine the best practices of asset management.

Read More

Topics: Managed IT Services, Managed IT

Is an Onsite Data Center Right for Your Business?

Posted by Jeremy Kushner on Oct 4, 2016 8:00:00 AM

Growing organizations require enterprise infrastructure that meets and exceeds the demands of their users.

One of the biggest decisions facing CIOs is whether or not they should build their data center onsite. With cloud hosting vendors and data center co-location providers vying for your business, many IT decision makers are left crunching the numbers in order to determine which solution is best.

When you begin weighing the pros and cons of placing your data center infrastructure onsite, decision makers must consider all the angles in order to ensure a successful rollout. A recent survey conducted by the Uptime Institute suggests that over 1 and 3 enterprises will exhaust their onsite data center facilities in the coming years.

With so much on the line, how can CIOs know that they are making the right decision for their organizations?

Read More

A Closer Look at Veeam Backup & Replication

Posted by Jeremy Kushner on Sep 27, 2016 8:00:00 AM

Since organizations are overwhelmingly using virtual machines (VMs) as opposed to bare metal servers, having a solution to backup and replicate your data is essential. Veeam Backup & Replication is the industry's leading hypervisor disaster recovery tool.

In a matter of minutes, your organization can spin up a replica backup of your virtual machines if your underlying infrastructure suddenly fails. Veeam also gives system administrators the ability to perform file level recovery from backups. This feature lets you view and restore individual files on virtual machines that may have been inadvertently deleted.

Veeam Backup and Replication gives enterprises the flexibility they need to rapidly recover from disaster recovery scenarios. Here's a few ways that Veeam has solved those "oh crap" moments.

Read More

Get the Most out of Windows 10 for Enterprise

Posted by Jeremy Kushner on Sep 20, 2016 8:00:00 AM

Organizations have recently begun deploying the popular Microsoft Windows 10 operating system to desktops, laptops and mobile devices.

Now that Windows 10 has been installed on hundreds of millions of devices worldwide, both administrators and end users must learn how to get the most out of their new Windows 10 operating systems.

Here are 6 ways that you can get the most out of Windows 10:

Read More

Topics: General Interest

What's Your Mobile Device Security Policy?

Posted by Jeremy Kushner on Sep 12, 2016 8:52:34 AM

As working out of the office or from home becomes more popular and common within the American workforce, organizations of every size are implementing a BYOD (Bring Your Own Device) policy to provide end users with remote connection ability — essentially, allowing them to use even their personal laptop, desktop, mobile phone, or tablet to get work done while not at the office.

While this development is well underway, we have found that many organizations aren’t updating their security policies to keep up with the increasing use of personal devices for workplace connections. Mobile device security has become more important than ever, and it is essential that your organization put policies in place to protect your important data from corruption or even cyber attacks like ransomware infections.

It’s not enough just to have the policy in place, either — you’ll need to test, evaluate, and revise these policies on a regular basis to ensure your network remains secure. Any device that connects to your network could pose a threat, so it’s imperative that you build a security policy that gives your users the ability to work effortlessly while protecting the integrity of your organization’s network.

What are mobile device security best practices you could implement to up your current security level? Let’s take a look.

Read More

Topics: IT Security

Quantum Computing and the Future of Technology

Posted by Jeremy Kushner on Sep 5, 2016 10:54:42 AM

Quantum computing is a nascent technology that has the potential to change the way organizations use and implement computing products. Although theories pertaining to quantum computing have been around for several decades, the technology never really made it into the mainstream up until a few years ago.

You’re probably wondering, “What is quantum computing, and how will it impact my business?" Quantum computing remains a rapidly evolving technology, so it's worth taking a look at a few of its intricacies.

Read More

Topics: General Interest

Why Your Business Should Be Using RAID

Posted by Jeremy Kushner on Aug 30, 2016 6:13:40 AM

No, we're not talking about the common insect killer that most likely comes to mind. RAID is an acronym for Redundant Array of Independent Disks. With RAID, your servers can remain functional even if one or more disks in your cluster fail.

A standard used in enterprise servers for decades, the original purpose of RAID was combining inexpensive disk drives into an array that would provide a single storage unit with higher capacity, fault tolerance, and increased disk I/O speeds. As the technology has matured, Raid is now being used to ensure redundancy of Network Attached Storage (or NAS) devices. These storage appliances are common in large enterprise network computing environments.

Read More

Topics: Managed IT

The Internet of Things: Is It Hype or Something More?

Posted by Jeremy Kushner on Aug 23, 2016 6:58:14 AM

Many of us have heard the term "the internet of things" bandied about these days, whether it's in articles in WIRED, the Atlantic, Forbes, or in other spots around the web. Even the best attempts at simplifying just what the internet of things (or IoT) is, though, tend to fall a bit short.

The best way we have to explain it is that the IoT is a term given to an emerging technology, one based around using cloud-connected devices to gather data from sensors that will be used for further analysis. Organization can use the data garnered through the IoT to make cost-saving decisions based around a more intelligent data-gathering base. How does this affect your business? Let's take a deeper look.

Read More