Podcast Episodes

16. Having A Great Relationship With Our Customers Is Key

16. Having A Great Relationship With Our Customers Is Key

I can't remember any meeting I've ever sat in with a potential client who asks us about our certifications. Most of our clients don't even know what those certifications are, or what's required to get that certification, and how it applies to them. When I was at EDS,...

15. Multifactor Authentication Could Save Your Bacon

15. Multifactor Authentication Could Save Your Bacon

Two-factor authentication or multifactor authentication is making a huge push over the past couple of years, but it's been around for a while. The reason it's making such a big push here lately is because Microsoft is starting to push that out to their Office 365...

14. Do Your Laptops Have Encryption Enabled? They Should!

14. Do Your Laptops Have Encryption Enabled? They Should!

Your phone and tablets, those are a little easier to secure in that most people either have a pass code or face ID or fingerprint identification. That's pretty secure. That's about as secure as it can get out there. You can do face ID on your laptop with Windows now,...

13. Password Best Practices for Ultimate Security from Hackers

13. Password Best Practices for Ultimate Security from Hackers

When it comes to passwords, there's some pretty hard and fast rules on what you should and shouldn't use as far as length of password and types of characters. What I like to tell people, and what even a lot of our business clients have started doing, is use a Password...

12. Are You Updating Your Hardware and Firmware? You Should Be!

12. Are You Updating Your Hardware and Firmware? You Should Be!

The hardware you use your for businesses, a router and a firewall, switches, wireless equipment, all of this, even though it's hardware it also requires updating to keep security. Typically, for your computer, you have updates for hardware, but other hardware network...

10. The $140,000 Phishing Trip (Almost!)

10. The $140,000 Phishing Trip (Almost!)

Earlier this week we had a client who got phished. They received an email, and it looks like it's from one of their officers in the company. And the interesting thing was they had been emailing with this officer about a particular product sale they were working on...

7: How Did That Happen? An I.T. Business Startup Story

7: How Did That Happen? An I.T. Business Startup Story

I didn't start off as a computer guy, in fact, I was working in accounting and financial services. Today I share the story of how I fell into I.T. management. Or rather how I was invited into the position because, well, I was young and knew how to re-boot a computer...

6: Ransomware Revisited – It’s Not a Matter of If, But When

6: Ransomware Revisited – It’s Not a Matter of If, But When

Ransomware is back in the news. Over the July 4 holiday weekend, small businesses around the world were targeted by hackers demanding ransoms. These supermarkets, schools, libraries, and dentists were unfortunately vulnerable to an attack such as this, which is more...

3: Tackling I.T. Issues On Your Own Can Cost You More Than You Save

3: Tackling I.T. Issues On Your Own Can Cost You More Than You Save

We have a few clients that like to think of themselves as technically inclined, they like to tinker. They sometimes think they know that they know how to tackle their technology because they set their kids X-Box up on their Wi-Fi network at their house over Christmas....

Five Interdependent Hacks to Lead the Creation of a Learner-Centered Culture

Struggling with your office I.T.?

Schedule a call with Kelly today and start to gain the peace of mind you deserve!