Lunchtime Tech on the Go

Are you meeting someone for lunch and have a little extra time on your hands before your lunch buddy arrives? Here are some tech tools that can keep you productive even when you’re not in the office.

Smartphone – Today’s smartphones can easily do double duty as your office phone and lightweight internet-enabled PC in a pinch.

My Grown-Up Christmas List

You might recall the 1992 song, “My Grown-Up Christmas Wish” written by David Foster and his then wife, Linda. Natalie Cole was the first to record this holiday standard, but it was Amy Grant’s version that became the big hit. The lyrics showcase an adult writing to Santa and asking for much more than material things: the end to war, friendship for all and love that would never end.

Be Smart and Protect the Halls

While you’re decking the halls, why not protect them at the same time! We talk a lot about business security and how the internet can spell trouble if the right precautions aren’t put into place. As we swing into the holidays this year with Christmas and the new year right around the corner, it’s worth considering your home network.

Dating Your Tablet to Find the Perfect Match

While Cathy is happily married to her husband, Doug, for 25 years, she is often dating different tablet devices in search of the perfect portable companion.  We decided to play The Dating Game and have Cathy “date” some of the latest tablets.  When it comes to tablet selection, as in life, you don’t really get to know someone until you spend some time with them.

Warning When Hiring Temporary and Seasonal Staff

Many businesses leverage temporary or seasonal staff.  The benefits are obvious—expertise and additional resources/capacity when you need it. With the advances in technology, utilizing these types of personnel is even easier.  However, what may not be so obvious are the network security risks; in particular, the increased potential for compromised sensitive data or loss of control of the data.

Step 3 to Enhancing Your IT Security – Mobile Device Security

Are your employees’ personal smartphones connected to your business network? They are 100% up to date, right? Unsure? Mobile technology is a prime target when it comes to security.

Protect your network by implementing technical solutions to “sandbox” your mobile devices or enforce your organization’s mobile device security policies.

Cleaning Out Our IT Habitats (Part III)

Enhancing the security of your online accounts is important for staying safe online.

Turn on two-factor authentication on critical accounts like email, banking and social media.
Secure your router by making sure it has a strong password and does not broadcast who you are through its name (e.g., “the Jones Family” or “123 Elm Street”).
Make better passwords by combining upper and lower case letters with numbers and symbols.