Uncovering the Hidden Costs of Legacy Systems

“I’m in favor of progress. It’s change I don’t like.” — Mark Twain

Any CIO or IT manager thinking about upgrading legacy equipment would agree. Many who were forced to shelve upgrade plans during the 2008 economic downturn now face a vastly different digital world where they must embrace change or lose ground to competitors.

It’s a tough decision to say the least. Business hardware and software carry a hefty price tag. Plus, companies must rebuild the legacy equipment infrastructure without undermining everyday operations. In a recent Forbes article, one Nationwide executive aptly compared the task with changing tires on a moving car.

[More]

Reasons for Company Executives to Take Security Training

We read about this all to often - a top executive at small and not so small organizations get scammed or spoofed into providing critical company information or make payments that are not legitimate. Of course we also see other employees getting tricked as well. 

For most companies the individuals at the top actually pose the most risk, due to having the most access to sensitive information and critical systems. They need to be the most aware, but when we and others conduct security awareness training, some executives and organizations leaders are noticably absent!

[More]

Maximizing Your IT Resources with IT Services

Why use The Computing Center or any other IT Services Company when many believe they can do it all themselves? Certainly some can or hire technology people for their staffs.This article discusses what we call a hybrid approach to IT Services - do some of the work internally while having an outsourced technology services company available for certain specialty work. 

Of all the professions in this world, you’d be hard-pressed to find one with a more pervasive DIY spirit than IT. From cobbling together your first network of 300+ machines to tapping into your first private cloud deployment, there’s a unique satisfaction brought about when you build it yourself.

That said, IT outsourcing services shouldn’t be a taboo topic, especially when your IT resources need to be smartly allocated. There are some things you simply won’t be able to tackle effectively and efficiently. Fortunately, others can, which can help you make the most of your resources.

[More]

Why software updates & patches are important

You’re probably no stranger to those little pop-up windows. They tell you software updates are available for your computer, laptop, tablet, or mobile device.

You might be tempted to click on that “Remind me later” button. Don’t do it. Or, at least don’t put off updating your software for long.

Software updates are important to your digital safety and cyber security. The sooner you update, the sooner you’ll feel confident your device is more secure — until the next update reminder.

Why are software updates so important? There are a lot of reasons. Here are 5 that show why it’s important to update software regularly.

[More]

Cybersecurity for Small Business

Mention the word “ransomware” at a meeting of small business owners and you’ll feel the temperature in the room drop by 20 degrees. A ransomware attack is a chilling prospect that could freeze you out of the files you need to run your business. When FTC staff met with business owners across the country, you cited ransomware as a particular concern. New resources from the FTC can help protect your company from this threat.

Ransomware: How It Happens

What is a ransomware attack? It can start innocently enough. An employee clicks on a link, downloads an email attachment, or visits a website where malicious code is lurking in the background. With just one keystroke, they inadvertently install software that locks you out of your own files. The cyber crook then demands a ransom, often in the form of cryptocurrency. But even if you pay, there’s no guarantee that hackers will live up to their end of the bargain. They may pocket the payment and vanish without unlocking your files. Meanwhile, the information you need to run your business – and confidential data about your customers and employees – is now in criminal hands.

[More]

More Entries