Category Archives: CEO Blog

Stop by our CEO’s blog to read about current business trends, technology releases and tips to a safe computing environment.

0

Building Better Network Security

Securing a business network has become more challenging over the years as the threats to a small business has increased.  Small businesses used to think that hackers were not interested in their data, so it is not as important for a small company to invest in network security.  The opposite is actually true, that small companies are a big target Continue Reading...
0

Internet Speeds Start to Change the Cloud Landscape

One of the largest hurdles for businesses is to move their computer infrastructure to the cloud — essentially moving their servers to data centers — has been the speed and reliability of the Internet connections serving their offices.  Users are accustomed to connectivity that is generally 1 gigabit per second (gb/s) or 1,000 megabit per second (mb/s).  Even when users Continue Reading...
0

Adding Value to Your Business with Technology

I attended a conference recently on the topic of adding value to your business.  Every business will have to transition ownership at some point in it’s life and a business owner is going to want to create as much corporate value as possible.  Obviously a track record of profitability, growth and excellent service is essential, but there is much to Continue Reading...
1

Office 365 Review

Due to high pressure from other online service providers such as Google and Apple, Microsoft released Office 365 in June 2011.  It’s flagship business design of running an onsite Windows Server, Windows desktop software and Office application suite was quickly becoming much more expensive and hard to manage for small businesses.  Google Apps, for example, gave companies an inexpensive option Continue Reading...
0

Local Network Security

Most of the news stories recently about computer security relates to Internet hacking, but there is generally a root cause of all hacking, and it often comes from internal network policies.  There are many elements involved with keeping your data secure, including: preventing social engineering, local security requirements, and user training.  Some of the steps required to provide good network Continue Reading...