One of the skills crucial to the success of businesses today is digital literacy. This isn’t the proficiency of reading and reciting gadget labels, but according to Cornell University, “the ability to find, evaluate, utilize, share, and create content using information technologies and the Internet.
Seven tips to Master Microsoft Excel
How to best utilize mobile tech for staff
Love it or hate it, mobile technology in the workplace is here to stay. While more and more companies are utilizing it as a way to up their productivity, there is a right and a wrong way to go about it. Here are four tips to help you successfully integrate mobile devices into your organization […]
Strong Relationships, Like a Strong Foundation of Technology, Mean Business!
Relationships are important. Not only in personal matters, but also in business. Businesses live and die based on the success or failure of a lot of things, including business relationships.
One of our newest clients is a real estate and financial investment company that has a long and successful history due to a number of key things, including their ability to forge, maintain and enhance strong relationships with their clients.
Mobile Technology Connecting the World
It’s no secret that mobile technology has come a long way since 1978. When the first cell phone call (ever) was placed, Motorola’s beige-brick took the first step towards becoming the staple we all but depend on today. Connecting the globe one phone call at a time was just the beginning though.
IT Security Tip #16: A WARNING if you handle, process or store client credit cards
Quick Tip: Handle credit card data with utmost security… or else!
Why? If you handle, process or store credit cards in any manner, you are required to comply with PCI DSS, or Payment Card Industry Data Security Standards. This is a set of LEGAL requirements you must abide by to maintain a secure environment.
VoIP: 5 security tips for SMBs
As SMBs continue their steady transition away from traditional telephony services in favor of VoIP, threats of cybercrime and fraud are more common than ever before. Risks to VoIP systems are distinctly unique from those posed to your other networks and understanding how to combat them is critical.
Enterprise level virtualization for clients
Virtualization has permanently changed the world of IT and computing and bringing with it the overhaul of IT architecture and workflow. One would think that it would reach its saturation point sooner or later but with constant innovation and development, virtualization has permeated and penetrated deep as to reach the client level.
Speaking of Dots…
The .dot file extension (DOcument Template) is used by Microsoft Word to store document templates. A template is a document type that creates a copy of itself when you open it. Templates contain pre-formatted settings and allow users to recreate documents with pre-defined margins, headers, fonts and page styles to maintain consistency AND save time.
Ransomware adopting self-replication
Although some may have hoped that the threat of ransomware was on the decline, the reality is that it’s quite the opposite. Until now, attacks seemed to be targeted directly at its victims, but Microsoft warns that may no longer be true. With their discovery of self-propagating ransomware it’s vital to fully understand the possible […]
Law Firm Gets Quality Advice and Service from IT Radix
Clients of law firms demand the highest quality of professional services and responsiveness to their needs, and in turn, law firms expect the same from their vendors. IT Radix recently welcomed into its fold just such a law firm.
However, this law firm was not demanding enough of its previous IT support firm, and they should have been.