August 20, 2014

The Death of the Traditional IT Model

For decades now, there has been two opposing choices in managing IT- do it yourself, or outsource it. With increasingly technical, business and compliance complexity, the […]
March 5, 2014

Still on Windows XP? Now you really HAVE to upgrade. Really.

Okay, I get that you may not like change. I understand that Windows XP is like a trusted friend who’s been at your side for a […]
November 1, 2013

Surplus IT Budget? Lucky You!

It’s that time of year: Time to decide what to do with surplus IT budget. If you find yourself with some surplus in your IT budget […]
October 30, 2013

Cryptolocker: Malware Just Got a Bit Nastier!

Traditionally the kinds of virus and malware we see on client computers is fairly benign. While it may disrupt the flow of business, it is generally […]
October 24, 2013

Is Bad Tech Costing Your Company?

I was reading an interesting article that asked the question “Is Bad Tech Costing Your Company” and it really brought home the reality of ‘old school’ […]
July 29, 2013

One Security Lesson Microsoft Learned Well

Last week, a group of hackers were all over the web for taking Forbes staff reporter, Andy Greenberg, on a joy ride in a Ford Escape and Toyota Prius (check out the video below). The purpose of this joy ride: To highlight the security vulnerabilities found in many of the most common cars. And the more that are connected, the more this will become a critical issue. An issue that has been mostly ignored by the auto industry.
June 12, 2013

The Impact of BYOD on IT Complexity

In the world of technology, the methods of delivery change over time as technology evolves, but the goal has remained the same - to produce valuable information and data in as efficient and cost effective a manner as possible. The goal of workplace computing is enhanced productivity. Cloud and mobility are simply tools that further enable this goal. But, as with all seemingly simple concepts comes complexity.
June 3, 2013

MDM with Exchange 2010 and 2013

A lot of talk these days surrounds Mobile Device Management, why you need it and how you can use it to help control your mobile workforce.  […]
May 15, 2013

More BYOD Considerations

As we continue on our discussions around BYOD, one topic that comes up time and again is the potential issues around these mixed use devices. The mixing of personal and professional data creates some questions and issues that really do bear some analysis and discussion before making any final decisions regarding BYOD in your business.
May 3, 2013

Keeping Your Devices Secure

Part of keeping your device secure is making sure that if it is lost or stolen, other people cannot access your data. Both IOS and Android […]