Technical

Posts discussing a variety of technical topics such as security, infrastructure, applications, servers, VoIP, assessments, data backup and recovery, server migrations, cloud, etc.

Outsourcing? Not Only OK – It Can Save Time and Money!

Outsourcing? Not Only OK – It Can Save Time and Money!

By on Jan 10, 2020 in Technical | 0 comments

Almost by definition, small business owners and entrepreneurs cringe at the concept of outsourcing. Those who start their own companies like the control and autonomy it provides them. Unfortunately, that preference for control and autonomy may have some bad side effects when it comes to managing the IT infrastructure of their business. Small business don’t...

Read More
Understanding Managed Services and Their Benefit to SMBs

Understanding Managed Services and Their Benefit to SMBs

By on Dec 17, 2019 in Technical | 0 comments

Small to medium sized businesses (SMBs) receive a lot of calls each day from slick sales people peddling the next technology trend that’s going to save them money and revolutionize how they do business. They’re all too quick to caution that if you don’t listen to them, you’ll fall behind the times, and eventually be swimming in a sea of debt...

Read More
Five Tips to Deflect a Ransomware Attack

Five Tips to Deflect a Ransomware Attack

By on Oct 21, 2019 in Security | 0 comments

Ransomware is malicious software designed to lock computers or data storage until a ransom is paid – keyword malicious. The cyber-criminals who write the code for these attacks mean business, to the tune of millions of dollars lost annually. Here are five tips that could help deflect a ransomware attack on your small to medium sized business.

Read More
5 Tips to Spot a Phishing Email

5 Tips to Spot a Phishing Email

By on Jul 24, 2019 in Security | 0 comments

Phishing emails are an attempt to obtain sensitive or personal information such as usernames, passwords, financial or personal details by scammers who have disguised themselves as a legitimate business or person. The intent is to use this information for illegal purposes. While the hacking world is constantly changing and evolving its methods to fool the end user, below are 5 things to look for that are immediate red flags an email is a phish.

Read More
The Dark Web is Making Businesses Less Secure

The Dark Web is Making Businesses Less Secure

By on Jun 13, 2019 in Security | 0 comments

What many businesspeople might not understand is the role that the Dark Web plays in driving these threats. By providing criminals a safe place to exchange information and access the resources they need, the Dark Web helps perpetuate and spread many of the most dangerous threats sweeping the Internet, leading to direct financial damage on businesses in Ohio and elsewhere.

Read More
4 Ways to Protect Your Business from IoT Vulnerabilities

4 Ways to Protect Your Business from IoT Vulnerabilities

By on May 23, 2019 in Security | 0 comments

Welcome to 2019; where the Internet of Things (IoT) is, well, a common thing now. The phrase, coined all the way back in 1999 by Kevin Ashton refers to the subcategory of devices that have computing mechanisms embedded in them to send and receive data via the Internet. Smart locks, smart mirrors, Alexa, home monitoring systems and on and on. The list of qualifying and life improving must have’s is ever growing. The impact of utilizing these devices has far reaching implications as well.

Read More