Blog

28
Aug

How Long Should You Retain Email?

If you Google this question, you will find some very thoughtful responses. As for me, I try to determine the value of each email immediately after having read it, deciding whether to delete or keep it. At the end of the day, I like to focus on the emails that came in that day and …

30
Jul

GDPR and Its Effects on Business Owners

As a professional services business owner who provides IT services to organizations in Rhode Island, Massachusetts, and Connecticut, I never expected that I would spend 40-50 hours becoming intimately acquainted with a new law passed by the European Union. But that’s exactly what I have done since the rollout of the General Data Protection Regulation …

28
Jun

Go Phish

Phishing and spear phishing continue to be lucrative enterprises for hackers. An effective strategy to prevent these attacks is a layered security approach with technical layers like hardened firewall configurations, anti-virus software, and email and web content filtering solutions. Fortunately, legitimate technology developers and support organizations are continuing to develop great technology tools to help …

11
May

Why Investing in Your Users Pays Dividends

Information Technology professionals have long heard the expression that the “best way to secure a computer is to pull the plug.” Barring the benefits to your electric bill, let’s face it – that is not a practical solution. Computer viruses, which pose the biggest challenge with information security, have been around for a long time. …

16
Apr

Is Your IT Partner a Passive Player or a Proactive Leader?

Several years ago, after providing a check to a merchant for a service I received, the clerk handed the check back to me attached to my receipt. It was marked ‘void.’ During a subsequent conversation with my banker, he explained the process, mentioned that check scanning was available through them and asked if I was …

10
Mar

Buyer Beware: There is no universal standard for the “Managed Service Program”

In our industry, ad-hoc network support services have become obsolete in favor of a more pro-active, managed approach to network support and security. This evolution occurred due to the growing frequency and increasingly sophisticated attacks to our data networks. Many organizations are now offering “managed service programs” (MSPs). Unfortunately, if you’ve seen one managed service …

20
Nov

Automating Processes. Securing Data.

“Tastes great! Less filling!” That 1987 advertising campaign condensed the advantages of Miller Lite beer down to four short words. If I had to choose just four words to define the advantages of Information Technology (IT), I’d say “Automating Processes. Securing Data.” With all of the talk about hacking and data breaches, data security is …

19
Oct

Business Outsourcing: Hurting or Helping Business Growth?

In the October 6-12, 2017 issue of the Providence Business News, Eli Sherman wrote a well-researched piece on outsourcing titled “Outsourcing helps keep businesses competitive, but is it hurting job growth?” Let’s explore that question. A business has two options when it comes to staffing its company: either hire the talent with W-2 employees or contract with a firm that …

18
Sep

Breach Fatigue Or a Call to Action?

Here we go again, another major breach of private data. This time possibly impacting 40% of the people in the US. Someone, or perhaps several someones, may now have my name, Social Security number, birth date, address, credit card numbers and possibly my driver’s license number; and yours too. What to do now? The first …

6
Sep

Can You Really Afford Not to Have a Backup Plan?

According to Symantec SMB, 50% of SMBs admit to having no backup and disaster recovery plan in place. 41% of those surveyed confessed that they had never even given much thought to implementing a disaster recovery or business continuity plan. If you are one of them, then you really need to think about whether you …