BLOG

Scary IT

Scary IT

Author’s Note: I write my own blogs. That’s unusual.  Blogs are often authored by a service and then reposted, especially in IT, or written by AI from a few key words. Instead, I choose the topics that might be of most interest to our clients and write to them –...

read more
Changing Face of IT Support

Changing Face of IT Support

Author’s Note: I write my own blogs. That’s unusual.  Blogs are often authored by a service and then reposted, especially in IT, or written by AI from a few key words. Instead, I choose the topics that might be of most interest to our clients and write to them – to...

read more
Best Remote Access – VPN, ZTNA or SASE?

Best Remote Access – VPN, ZTNA or SASE?

Until just recently, there was really just one secure remote access method – Virtual Private Network, or VPN.  But in the last few years, there are two new remote access methods you’ve heard of or will shortly – ZTNA and SASE. A quick overview of these access...

read more
Global IT Meltdown – More to Come

Global IT Meltdown – More to Come

We have seen the public impact of the recent global IT meltdown – days of cancelled/delayed flights, 911 systems that were down, and other government and commercial organizations essentially put on hold. Unfortunately, this is very unlikely to be the last such...

read more
Physical Security in the Cyber Era

Physical Security in the Cyber Era

We all have gone into a high security building and saw those large cameras pointing down at us.  In those same buildings, we’ve seen doors that were opened with the whisk of a little white card. But now, the convergence of computer networks and this physical security...

read more
Say Goodbye to Passwords

Say Goodbye to Passwords

Well, maybe not yet, but it’s definitely moving in that direction.  The basic tenant of current security is that you authenticate using 3 types of information: Something you are, such as a username or email address. Something you know, such as a password or PIN. ...

read more
IT Budgeting

IT Budgeting

Being August, it’s time again to think about budgeting for the next year. For most businesses, IT may just be a one- or two-line item on the budget. But that can lead to IT actuals being substantially off budgets. This isn’t because of bad management, but due to the changing nature of IT,, especially if all its various aspects aren’t considered.

In this article, I’ll review our recommended budgeting approach.….

read more
Remote Worker Cyber Security – Phase 2

Remote Worker Cyber Security – Phase 2

So, your company is implementing a hybrid work model where your staff works from home a few days a week.  Or maybe your company is going fully remote and closing the office.  By this time, your company has probably updated their Information Security Policy...

read more
Business Password Management

Business Password Management

With the rapid increase in data breaches and ransomware attacks, proper password and authentication management is vital for companies to protect their local and cloud assets.  But with that importance also comes increased complexity and the need to deal with more...

read more