Blog

Am I Spending Too Much Money on Technology for My Small Business?

it consultant working on a project for a small business

Business Owners and executives work hard to align spending with company objectives.  They budget carefully to make the most out of every dollar.  However, if you’re the owner or CFO of a small business and don’t have an IT background, how can you be confident in your IT budget allocation?  Many owners ask themselves, “Am […]

TikTok Security Concerns

Youth opening up tik tok on her phone

With the recent congressional hearing on TikTok security and data privacy rules, we thought we might take a slight deviation from our typical coverage to discuss a topic that is on a lot of lips.  Along with some comical moments that highlighted almost complete ignorance from several members of congress on how the internet works, […]

IT Service Provider Red Flags

reg flags

Recent conversations with potential clients about their current IT providers have once again highlighted some of the common red flags we see in our industry.  If you’re struggling with any of these items, it might be an indication that there are serious organizational issues with your current IT provider that aren’t easily resolved.  If you […]

IT Strategy for Growth by Acquisition

Recently we’ve been having a lot of conversations with companies that operate on the strategy of growth by acquisition.  They span various industries.  Property management, skilled nursing, assisted living, and most recently volleyball clubs.  Regardless of the business vertical they are all buying new properties/facilities/clubs to fuel their growth.  With that comes some potentially unique […]

How To Send Encrypted Email in Outlook

It provider using encrypted email

There are a lot of business reasons why you may want to send encrypted email.  It could be sensitive financial data, or personal information about employees.  Maybe you work in healthcare and need to send personal health information that is protected by HIPAA.  There could be several other reasons.  There’s also not only one way […]

A Beginner’s Guide to Pen Testing

Pen test

Digital inclination has brought about a new wave of cybercrime, with cyberattacks increasing at an unprecedented rate. Statistics from Abnormal revealed that phishing had a growth rate of 48% from previous years as of June 2022.  Unfortunately, small and medium businesses (SMBs) are a common target for cybercriminals, accounting for 43% of cyberattacks in 2019 […]

Dangers of Connecting to Public Wi-Fi

free WIFI drawing on a side of a wall

We’ve been told for some time that there are dangers associated to connecting to free public Wi-Fi.  What are those dangers?  Could they put your data at risk?  We’ll look at a few of the most common threats associated with public Wi-Fi, and how to stay protected. MITM Attack One of the biggest dangers with […]

First Seek To Understand

To succeed in solving complex problems, you must learn active listening.  The entire objective when sitting with a client is to seek to understand.  Not only understand the problems they’re facing, but WHY they are a problem.  What are their motivations for wanting a solution?  Listen more and speak less.  Ask for clarification and questions […]

Inertia and Technical Debt in IT

E=mc2 can a chalkboard

In a discovery meeting with a potential client this week we discussed a long list of challenges they have with their current IT provider.  Really long.  They have been with them for over 7 years.  Then he raised an interesting objection.  He said, “I just don’t want to leave one set of problems for another […]