IT Radix is a Breath of Fresh Air for Local Specialty Chemicals and Natural Materials Firm

One of IT Radix’s newest clients is an innovative specialty chemicals and natural materials provider. They manufacture high-quality materials used in the personal care, industrial and food/nutrition industries. Having up-to-date technology as a key driver of business efficiency and productivity is important to them.

IT Security Tip #21: Don’t download ANYTHING you’re not authorized to download

Quick Tip: Check before you download.

Why?  So you have a big file you need to get over to your printer YESTERDAY and you can’t get it to “send” via email because the file is too big. What should you do? The right thing to do is contact your IT department (us!) so we can assist by installing a secure, commercial-grade file-sharing application.

IT Radix Helps Growing Marketing/PR Firm Continue Down the Road to Success

We just welcomed another growing Marketing and PR firm into the IT Radix client family. This exciting firm offers a full range of public relations and other marketing services to a host of major firms in the pharmaceutical and other industries. Communications strategists and problem solvers, this agency has grown and as has their reliance on technology.

The Truth About Email Archiving Systems

HOST:  Hello again everyone and welcome to To Tell the Truth!  Today we have three contestants each who is prepared to tell us the key reason why organizations today should have a system for archiving email!  Contestant #1…

CONTESTANT #1:  I have a law degree and I can tell you that clearly the most important reason to archive email today is for the purposes of Regulatory Compliance.

IT Security Tip #20: How to keep your team from unintentionally causing a security breach

Quick Tip: Make security a habit, through Security Awareness Training and Testing.

Why? With so many access points, from cell phones to laptop and home computers, how can anyone hope to keep their network safe from hackers, viruses and other unintentional security breaches? The answer is not “one thing” but a series of things you have to implement and constantly be vigilant about, such as installing and constantly updating your firewall, antivirus, spam-filtering software and backups.

TMI…When Sharing Word Documents

Do you realize that your Microsoft Word document may contain hidden and personal information that you may not want to share with others?  Confidential information is stored in the document properties or document itself (e.g., comments from reviewers, revision marks from tracked changes, details about the author, date when a document was created, headers, footers and hidden text).

When sharing electronic copies of Microsoft Word documents, it is a good idea to remove this metadata before sharing with others.