(985) 635-4380
(504) 267-2880
    

Amazon CEO Jeff Bezos’ Secret To Avoiding Email Overwhelm

Posted on August 1st, 2017 by

Do you look at your inbox and want to cry? If so, you’re not alone. According to widely cited Radicati Group research, the average person gets 120 business emails every day. If you don’t manage your emails, you could end up in another statistical majority. People spend at least 14 percent of their workday on […]

Read More →

The Dirty Loophole That Lets Insurance Companies Refuse to Cover a Cybercrime Theft in Your Business

Posted on July 1st, 2017 by

As hacking hit the headlines in the last few years — most recently the global hack in May that targeted companies both large and small — insurance policies to protect businesses against damage and lawsuits have become a very lucrative business indeed. Your company may already have cyber insurance, and that’s a good thing. But […]

Read More →

How To Keep Your Employees From Leaking Confidential Information

Posted on June 1st, 2017 by

Back in 2014, Code Spaces was murdered. The company offered tools for source code management, but they didn’t have solid control over sensitive information — including their backups. One cyberattack later, and Code Spaces was out of business. Their killer had used some standard techniques, but the most effective was getting an unwitting Code Space […]

Read More →

9-Step Checklist To Ensure Your Data Is Safe

Posted on May 11th, 2017 by

Use This 9-Step Checklist To Ensure Your Data Is Safe, Secure And Recoverable Summer is upon us… Time for a stroll in the park…softball…fishing…a few rounds of golf… Yet how could you possibly relax if some random bit of malware, software glitch or cyber-attack catches you off guard just as you’re walking out the door? […]

Read More →

7 Ways To Dodge A Data Disaster

Posted on April 4th, 2017 by

You stride into the office early one Monday morning. You grab a cup of coffee, flip on your computer and start checking e-mail… A note pops up that rivets your attention: “Your files have been encrypted. Send $5,000 within five days or they will all be destroyed.” You start sweating as your throat constricts and […]

Read More →

21 Questions to Ask Your Computer Company

Posted on August 9th, 2016 by

Choosing the wrong computer consultant to support your network can be incredibly frustrating and expensive, and could end up costing you in downtime, data loss and expensive repair bills, not to mention the headaches and frustration! Here’s an embarrassing (and little-known) fact about our industry: it is not regulated like many other professional service industries, […]

Read More →

The Interesting Underbelly of Internet Advertising

Posted on December 21st, 2015 by

There’s an interesting underbelly of the Internet that is advertising. Have you noticed lately when you browse the internet for a product or service and then jump over to Facebook to check your feed that those same products and services are now advertised there? It all boils to down large ad networks and 3rd party […]

Read More →

There’s an uptick in the latest version of ransonware infections. Be diligent!

Posted on March 12th, 2015 by

This article points to an uptick in the latest version of the Cryptowall virus – a nasty program that encrypts the files on your computer and business network and holds them ransom. Please be extra diligent when opening email (even if they appear to be from familiar sources) and surfing the web. Being a victim […]

Read More →

Are your Computers In Danger?

Posted on October 3rd, 2013 by

As many of you are probably already aware, Microsoft will no longer be supporting Windows XP, Exchange 2003, or Office 2003 as of April 8th, 2014.  Because of the risk associated with unsupported software, we want to start the dialogue now to help you make the proper replacements.  Although this is not a situation where […]

Read More →

Do You Know Your RTO?

Posted on March 8th, 2013 by

  How long can your business survive without access to critical company applications and files that run daily operations? What do you do if your accounting system files become corrupt? In acronym form, the amount of time your business can survive without access to this crucial information is referred to as your Recovery Time Objective […]

Read More →
Logos