A Case Study in Disaster Preparedness and Business Recovery

In 1981, a book with a memorable title, When Bad Things Happen to Good People, was released and quickly became a bestseller.  The book was written after the premature death of the author’s young son.  One of the key points in the book is that sometimes there is no reason for things.

Like Planning a Royal Wedding, Planning Your Computer Network Is Complicated

The British are eagerly looking forward to the royal wedding of Prince Harry to Meghan Markle—it will surely be a well-run affair, but just think of all the planning and details! Your computer network may not be as glamorous as a royal wedding but planning it can be just as complicated as a royal wedding.

Step 3 to Enhancing Your IT Security – Mobile Device Security

Are your employees’ personal smartphones connected to your business network? They are 100% up to date, right? Unsure? Mobile technology is a prime target when it comes to security.

Protect your network by implementing technical solutions to “sandbox” your mobile devices or enforce your organization’s mobile device security policies.

Stick with Us and You Won’t be Sorry!

The title of the board game, Sorry!, comes from the many ways in which a player can thwart the progress of another, while apologetically saying, "Sorry!" That may be all fun and games, but when it comes to businesses who don’t have an IT management and support plan in place, there’s only so much you can do to reactively fix a disaster.