September 16, 2020

Why You Need Both Software and Hardware Firewalls

Software and Hardware Firewalls A firewall sounds like a pretty intense thing; unless you’re an action-movie stuntman. Yet when it comes to internet security, you may not have as much firewall protection as you need. Many internet security products bundle […]
February 12, 2020
Custom built computers

A Custom-Built Computer Can Be a Good Deal

A Custom-Built Computer Big-box stores have big names and aisles of computers on offer. They post tempting deals on pre-built computers. But how does buying one of those computers compare to purchasing a custom-built one? When you shop in a […]
December 19, 2019
Equipment Failure

Your Equipment Fails – What’s Next?

What’s Next? You invest heavily in information technology. You depend on your equipment to support your business. Then, the equipment fails. It’s inevitable. Only cockroaches survive forever. You’re left scrambling to find a replacement solution for essential tech. It’s a […]
September 4, 2019

Security Patches – The Better Way to Update

The Better Way to Update Updates often come at the worst moment. You go to shut down your laptop to rush to a meeting, and you get a “Windows is updating. Do not power off” message. Argh! Or you leave […]
August 28, 2019

To Backup or To Archive? ‘Tis The Question

To Backup or To Archive? Hamlet worried about whether to be or not. You may be more preoccupied with whether backup or archiving is better for your business. You know you need to secure your data, but how? This article […]
April 4, 2019

Cloud Storage or Local Server – The Best of Both

Cloud Storage or Local Server – The Best of Both Cloud computing is the biggest buzzword in business today, and for good reason too. The cloud provides many a new-found freedom to do and achieve more than ever before. Greater […]
February 19, 2019

Is Your Physical Security as Good As Your Cyber-Security?

Is Your Physical Security as Good As Your Cybersecurity? Headlines are often made by firms that have been hacked by “elite” cyber-criminals. These events sound high tech, sophisticated, and interesting. The truth is almost always an amateur attacker chancing their […]