According to Forbes, approximately 2 million Americans leave their jobs every month. Regardless of whether you are in a small business or a Fortune 500 company, there are critically important steps that I.T. administrators should take when an employee leaves. Even if the employee voluntarily left on great terms, it is critical to offboard the employee properly. A recent study found that 89% of employees still had access to their company’s network and data after being let go. If someone can still log in to servers, access confidential data, or even just tweet in the company’s name, they can wreak havoc in ways that reflect very poorly on the company - and on the I.T. staff within the company responsible for network and data security. Insider attacks, including those by terminated employees, can be very costly and damaging. An organization in the U.S. faces an average of 3.8 insider attacks per year. We have put together a checklist of steps that should be completed immediately upon an employee departure.
The ever-increasing need for technology in schools is driving a greater demand for a wide range of I.T. support. Similar to a growing business, schools need I.T. experts to help plan, architect, deploy, support and manage their I.T. environments. Wireless networks, security, content filtering, high-speed broadband, storage and device management are just a handful of the technology solutions that schools have become reliant upon. However, the majority of schools struggle with finding the budget and expertise to achieve their I.T. objectives.
Are your computers at home as secure as those you use at the office? In most cases, the PCs or Macs we use at home do not have the same level of protection as what businesses typically provide.
Businesses and organizations depend on information to survive and to ensure business continuity. However, in I.T. protecting information from an ever-growing array of potential disasters is an ongoing challenge. It’s not enough to simply have a backup of your data – there are some critical steps that should be taken to effectively prepare your organization for when that disaster happens. Below are four practical and important areas to address when putting together a Business Continuity and Disaster Recovery (BCDR) plan.
In the world of technology, there are new products and solutions coming to the market every day. Every once in a while, a new technology appears that stands out and disrupts the space it is in. The Datto Siris 3 is such a product - so much so that I’ve started call it the swiss army knife of data protection and business continuity. Not only is it a powerful business continuity solution, but it is one of the most effective tools in the fight against ransomware.
Cities, counties, and other local government entities are facing many of the same modern day challenges and opportunities that are impacting businesses. Technology is evolving rapidly, constituents are demanding better and faster solutions, and budgets are limited. Many of the city managers and county CIOs we work with are recognizing the need to re-think their IT plans and strategies. Dozens of cities here in Southern California are currently in the process of architecting new Information Technology Strategic Plans (ITSPs).
The vast majority of data breaches have occurred through compromised authentication. Although having a strong password is an important part of security, this is only one step to securing your network and data. That’s why multi-factor authentication is so important and why security experts today are strongly recommending it for critical business systems.
Wouldn't you like to be more productive at work?
For most of us, increased productivity means making more money, spending more time on what matters most (family, friends, etc.), and simply just feeling better. Many of us seek to increase productivity with elaborate and complicated methods.
Computer networks today have grown up. They may not get all the glamorous headlines that the Cloud, IOT or Virtual Reality grab today, but it’s hard to argue the fact that today’s network is more important to an organization’s success than ever before. A robust network that addresses security, performance and reliability enables better information sharing, more collaboration, improved productivity and reduces risks. As more devices connect and the need for local and cloud applications and secure data access expand, a well-architected and managed network is a competitive advantage.
If you are the Operations Manager of a medium sized business, you know that efficiency is a key factor in the overall performance of your company. Many, if not all, I.T. companies will tell you that their solution or services will “increase efficiency” for your company.
What they don’t tell you is that it requires a specific set of systems and processes on their part to deliver on this promise. The vast majority of I.T. service providers do not have the necessary operations in place to support and maintain your business properly.
So, how can I.T. make your medium sized business operations more efficient?