News & Tips

twitter logo

#BestBackupTip: Never set a one-time full with perpetual incrementals!

About 2 weeks ago from Blade Technologies's Twitter via Influitive

 

10 Tips for a Strong, Secure Password

10 Tips for a Strong, Secure Password

January 22, 2015

Passwords provide the first line of defense against unauthorized access to your computer. The stronger your password, the more protected your computer will be from hackers and malicious software. You should make sure you have strong passwords for all accounts on your computer. If you’re using a corporate network, your network administrator might require you

Read more »

10 Reasons to Fire Your IT Guy

10 Reasons to Fire Your IT Guy

January 19, 2015

You’re focused on running your business – how can you know when your support just isn’t measuring up? 10 Reasons to Fire Your IT Guy

Read more »

Best Practice – 7 Layers of Cyber Security

Best Practice – 7 Layers of Cyber Security

January 8, 2015

As IT professionals we all learn that everything begins at the bottom, with the physical level. Likewise, when it comes to IT security, physical security is the foundation for our overall strategy. Some organizations, distracted by the more sophisticated features and security products, may overlook the importance of ensuring that the network and its components have been

Read more »

The Five Most Glaring Holes in Small Business IT Security

The Five Most Glaring Holes in Small Business IT Security

December 31, 2014

As an IT service provider to small and medium-sized business, we continue to see a few common problems among new customers. The following five issues keep many businesses from achieving their full potential: -Backup and Disaster Recovery (BDR) -Adherence to Security Protocols -Outdated Equipment -Unsecured Mobile Devices -Lack of IT Security   The Five most

Read more »

Understanding Security in Office 365

Understanding Security in Office 365

December 26, 2014

The core of the O365 security approach is: Built in security Privacy by design Continuous compliance Transparent operations To understand more about Microsoft Office 365 please read the following white paper from Microsoft: Security in Office 365 Whitepaper

Read more »