712.581.7700

Do You Have an Effective BYOD Policy?

According to new IDC data, vendors shipped 327.6 million smartphones in the third quarter, an increase of 25.2%, when compared to the same quarter last year. This means that global smartphone shipments have topped 300 million shipments for the second quarter in a row....

Bright Outlook for Cloud Computing

According to CompTIA’s IT Industry Outlook 2014, cloud computing is even more on the rise since last year. As Generation Y (20-34 years old) infiltrates the work force and members of the Baby Boomer generation reach retirement age, there have been noticeable changes...

Can You Survive a Network Security Attack

Businesses are under constant attack from a variety of network security threats.  Cybercriminals hack databases for passwords for unauthorized access to your network.  Undetected Malicious software (malware) can trap and forward passwords. Viruses can infect your hard...

Heartbleed Bug: What a Business Owner Should Know

The name Heartbleed OpenSSL Vulnerability (aka Heartbleed bug) is as scary as it sounds. Some reports say up to two thirds of all secure websites (e.g. those with a web address starting with a green https://) are using OpenSSL.  It has been reported that Google was...

Target Privacy Data Breach: Part 2

Target Retailers were just involved in the second largest credit card data breach in United States history. Today Target announced the data breach that occurred over Thanksgiving weekend now exposes upwards of 70 million credit and debit cards. Target also disclosed...
Skip to content