Articles posted by Janet Gehring

IT planning and budgeting

Shape the Future of Your Business with IT Planning and Budgeting

Your IT planning and budgeting process has importance beyond the numbers and spreadsheets. The technology you use and how you implement it will help shape the future of your business, including your day-to-day operations, how you engage with customers, and how you outpace your competition.
Read More
Mitigate Social Media Risks

How to Mitigate Social Media Security Risks

Social media is an effective way for small businesses to level the playing field in the challenge of increasing brand awareness.  It’s affordable, allows message control, provides interaction, and can generate business leads.  Unfortunately, it also presents security risks.  Here’s how to mitigate social media security risks in your small business.
Read More
network secure from ex-employees

Is Your Network Secure from Ex-Employees?

Is your network secure from ex-employees?  When someone leaves your company, how do you remove their access to your business data? Particularly with mobile devices, an ex-employee may have emails and contact information on a smartphone that may belong to them, not you.
Read More
Managed services good fast cheap

Can Managed IT Services Be Good, Fast and Cheap?

Can you have good, fast and cheap all at the same time?  This question has plagued businesses for years (maybe even yours).  When you’re evaluating managed IT services, what’s more important - knowledgeable service, quick response, or low price?
Read More
IT Disaster Recovery

Why Your Business Needs an IT Disaster Recovery Plan

Every business IT plan needs a tested strategy for IT disaster recovery, including backup. Here’s what you need to know about how IT disaster recovery is different from data backup, why your business needs both, and how to get started.  
Read More
Build a Positive Cybersecurity Culture

How to Build a Positive Cybersecurity Culture

Did you know that up to 90% of cyberattacks stem from some type of human error?  Bad guys aren’t primarily trying to hack your tech – they’re trying to hack you and your team.  That’s why we can’t rely on technology alone.  Keep your organization safer by building a positive cybersecurity culture that helps reduce human errors.
Read More
Business Risks from the Internet of Things

Can Your Coffee Maker Hack Your Server?

Can your smart coffee maker hack into your server?  Consider this:  your smart coffee maker at home (or at the office) is likely connected to the same network you use for your computer.  If a bad guy can get to your coffee maker, he can get to your network.  Be aware of the business risks from the Internet of Things (IoT). 
Read More
How your browser affects your online privacy

How Your Browser Affects Your Online Privacy

What’s your favorite browser?  How you use a browser affects your online privacy.  Let's look at the information browsers and websites gather and how you can better protect your privacy online.
Read More