401-921-3100

Blog

Cybersecurity For Today’s Network Threats

The threats to your network and your phone are increasing each and every year. According to the independent IT-security institute, ...

Spear Phishing and Fake URLs

Spear phishing attacks are often more successful than regular, broad-based phishing attacks because of the way hackers are able to ...

How Long Should You Retain Email?

If you Google this question, you will find some very thoughtful responses. As for me, I try to determine the ...

GDPR and Its Effects on Business Owners

As a professional services business owner who provides IT services to organizations in Rhode Island, Massachusetts, and Connecticut, I never ...

Go Phish

Phishing and spear phishing continue to be lucrative enterprises for hackers. An effective strategy to prevent these attacks is a ...

Why Investing in Your Users Pays Dividends

Information Technology professionals have long heard the expression that the “best way to secure a computer is to pull the ...

Is Your IT Partner a Passive Player or a Proactive Leader?

Several years ago, after providing a check to a merchant for a service I received, the clerk handed the check ...

Buyer Beware: There is no universal standard for the “Managed Service Program”

In our industry, ad-hoc network support services have become obsolete in favor of a more pro-active, managed approach to network ...

Automating Processes. Securing Data.

"Tastes great! Less filling!" That 1987 advertising campaign condensed the advantages of Miller Lite beer down to four short words ...

Business Outsourcing: Hurting or Helping Business Growth?

In the October 6-12, 2017 issue of the Providence Business News, Eli Sherman wrote a well-researched piece on outsourcing titled ...

Breach Fatigue Or a Call to Action?

  Here we go again, another major breach of private data. This time possibly impacting 40% of the people in ...

Can You Really Afford Not to Have a Backup Plan?

According to Symantec SMB, 50% of SMBs admit to having no backup and disaster recovery plan in place. 41% of ...

Reflecting on fourteen years of IT solutions and services

You hear it all the time: ”where did the time go?” or “it seems like only yesterday...”. Lately, I can ...

It takes a community to secure your company’s data

Back in the day, IT security was the job of a computer tech. Whether that resource worked directly for your ...

What the Wanna Crypto attack teaches us

When I first started providing microcomputers to businesses in 1980 (we didn’t call them PC’s until 1982), upgrades and security ...