Quantcast
Channel: IT Articles – In-Touch
Browsing latest articles
Browse All 42 View Live

Image may be NSFW.
Clik here to view.

How To Print Using Your Mobile Device.

While paper printouts are no longer needed as they used to be, there are still times when you want one, such as a map with directions, or a backup copy of an airline reservation. Many people assume...

View Article



Image may be NSFW.
Clik here to view.

What HIPAA Compliance Risks Is Your Business Exposed To When Using Mobile...

Communicating with patients via mobile devices, such as a Blackberry or iPhone, has become a fast-growing trend among health care providers. A recent survey of almost 3,800 physicians revealed that an...

View Article

Image may be NSFW.
Clik here to view.

Mobile Device Management Solutions Don’t Always Work.

What IT Decision Makers Need To Know. IT departments use Mobile Device Management (MDM) software to monitor, manage and secure employee’s mobile devices that are used for work purposes.  MDM...

View Article

Image may be NSFW.
Clik here to view.

Microsoft and Adobe Both Release Critical Updates

Last week, Adobe released security fixes for its Shockwave and Flash media players. Additionally, Microsoft released seven patch bundles that address at least 34 different vulnerabilities found in...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Announces Hyper-V Improvements In Windows Server 2012 R2

Last month’s Microsoft’s TechEd Event included a standout presentation regarding the new Hyper-V improvements to come with Windows Server 2012 R2.  Public-preview releases are available now, and the...

View Article


Image may be NSFW.
Clik here to view.

Are You Taking Advantage of Microsoft Lync 2013?

Microsoft Office programs can be found in businesses throughout the world, and their subscription-based cloud service Microsoft Office 365 – is increasing in popularity with  clients daily.  The...

View Article

Image may be NSFW.
Clik here to view.

Preparing For The End of Windows XP —5 Steps To Take

On April 8th, 2014, Microsoft will officially end all support, security fixes, vulnerability patches and software updates for Windows XP. Any PC running on the operating system after April 2014 will be...

View Article

Image may be NSFW.
Clik here to view.

Data Loss and Recovery Are An Increasing Concern For Business Owners

Protecting your business data is critical. Data backup and recovery are essential parts of running a business.  Every business owner should understand these three things: Everyone is capable of making...

View Article


Image may be NSFW.
Clik here to view.

It is Heaven: Using the Cloud to Challenge Big Business

Has anyone suggested you begin moving your business to the cloud? Cloud data storage or cloud computing? What is this, anyhow? And isn’t it something for huge companies? In the last post we explained...

View Article


Image may be NSFW.
Clik here to view.

BYOD: Why is This Concept So Attractive to Employees?

  Bring Your Own Device, or BYOD, to work was an idea a few years ago that is becoming a reality very fast. To use your personal smartphone, tablet or laptop for work seems increasingly natural....

View Article

Image may be NSFW.
Clik here to view.

Disaster Recovery Plans: Do You Have One?

Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t the resources to address such “unthinkables.”...

View Article

Image may be NSFW.
Clik here to view.

Be Proactive: How to Avoid Potential Network Failures

For small- to medium-sized businesses (SMBs), an IT network failure can be devastating because they don’t have the resources of large corporations to bounce back from such disasters. Preparation...

View Article

Image may be NSFW.
Clik here to view.

Business Disaster: What Threatens Small Businesses the Most?

There are many threats to the integrity of a small business, and not all of them are as dramatic as a cyberattack or a hurricane. Every small business needs to do a risk assessment to determine all...

View Article


Image may be NSFW.
Clik here to view.

Loss of Data: Causes and Prevention

The adoption of technology from the simplest of matters to the most complex problems has rendered us heavily dependent on it. We love paying our bills minutes before they are due. We enjoy seeing...

View Article

Image may be NSFW.
Clik here to view.

Outsourcing? Really, It’s OK: How it can save time and money

Almost by definition, small business owners and entrepreneurs cringe at the concept of outsourcing. Those who start their own companies like the control and autonomy it provides them. Unfortunately,...

View Article


Image may be NSFW.
Clik here to view.

Penetration Testing vs. Vulnerability Testing Your Business Network

Hearing “all of your confidential information is extremely vulnerable, we know this because…” isbad news, but whatever follows the ellipses determines just how bad. Consider two scenarios.   “All of...

View Article

Image may be NSFW.
Clik here to view.

Data Breaches are a Question of When, Not If

You hear on the news all of the time about big cyber attacks on large corporations, and evengovernment agencies.The trouble with this news coverage is that is suggests a distorted view ofwhere cyber...

View Article


Image may be NSFW.
Clik here to view.

What is Ransomware and How Can it Affect Your Business?

This cyberattack scheme hasn’t garnered nearly as much attention as the usual “break-in-and-steal-data-to-sell-on-the-Internet version,” but it can be even more debilitating.Ransomware attacks have...

View Article

Image may be NSFW.
Clik here to view.

Data Security: A People Problem

Phishing Scams – A People Problem There are some things that only people can fix. There are many security risks to which your data is susceptible, but there is one method that remains a wonderfully...

View Article

Image may be NSFW.
Clik here to view.

IT Defense In Depth Part I

In the 1930s, France built a trench network called the Maginot Line to rebuff any invasion. The philosophy was simple: if you map out all the places an enemy can attack, and lay down a lot of men and...

View Article

Image may be NSFW.
Clik here to view.

IT Defense in Depth Part II

Defense in Depth Part II In our last blog we started talking about the different layers of security necessary to fully defend your data and business integrity. Today we will look at the human aspect...

View Article


Image may be NSFW.
Clik here to view.

You’re Fired! Now Give Me Your Password

“You’re FIRED!” ( now give me your password) Losing an employee is not usually a good experience. If they leave voluntarily, you lose a valuable asset. If they have to be fired, you have the arduous...

View Article


Image may be NSFW.
Clik here to view.

Business Trade Shows Part I: Before the Event

Going to a tradeshow for the first time? Don’t make the mistake of viewing this as a 1-2 day discreet marketing event. Instead, view your exhibit at a tradeshow as the central feature of a much longer...

View Article

Image may be NSFW.
Clik here to view.

Business Trade Shows Part II: During the Event

We’re back. In the last post, we talked about building momentum toward a trade show exhibition. Today, let’s look at your efforts during the show itself. You already should have sent out a reminder...

View Article

Image may be NSFW.
Clik here to view.

Business Trade Shows Part III: After the Event

So, you made it back home from the show. You’re exhausted and work has backed up in your absence. Here is where the entire investment in the show can go down the drain. Follow-up is critical. Every...

View Article

Browsing latest articles
Browse All 42 View Live




Latest Images