Technology

GROW: 3 Ways to Use Business Intelligence Tools

Posted in Technology on November 14, 2013

Business intelligence (BI) is a set of theories, methodologies and processes that transform raw data into useful information. Sounds complex, right? It’s not. The beauty of BI is that there are tools available to do the heavy lifting for you—and your employees are left with only the relevant information they need to make strategic decisions, improve performance and overall, grow their business. [More]

GROW: Expanding Your Understanding of Internet Security

Posted in Technology | Security on November 5, 2013

For all the help the Internet can provide, the it is also a danger. Endpoint security companies like Kaspersky Lab detect cyber attacks every moment of every day. In fact, just in Q2 of this year, Kaspersky Lab products detected 577,159,385 attacks launched from online resources around the world. Here are some basic tips on how to be safe online. [More]

GROW: 5 Reasons to Consider Co-Sourcing Your Organization's IT

Posted in Managed IT Services | Managed Security | Technology on October 30, 2013

According to a 2012 Gartner report, approximately 67 percent of an IT department’s budget is spent “keeping the lights on.” When organizations get to this point, they must consider what can be done to do more than meet required service levels. Some organizations could consider embracing a modified outsourcing, or co-sourcing, model to help grow the business. Here are five reasons why. [More]

Creating and Enforcing an Adequate Password Policy (Part 2)

Posted in Technology | IT Infrastructure | Security | Strategic IT Planning on October 25, 2013

Still prevalent are systems that require only a user name and password to gain access to privileged information. Unfortunately, there are thousands of hackers worldwide anxiously and actively attempting to steal or circumvent this weak form of security. This is a lucrative attack vector for the hacking community and will continue to be a popular exploit until the user community becomes more aware of this formidable threat. Not until the user community recognizes the threat and discontinues the use of weak passwords will this attack vector begin to abate. [More]

Creating & Enforcing an Adequate Password Policy

Posted in Tech Tips | Technology | IT Infrastructure | Security on October 16, 2013

One of the most frequently used access control mechanisms is the simple password. Entering a password that is subsequently compared to a record in a “private” data repository often is the only mechanism used to both identify a user and authorize a user to access a program. It can be a very weak form of security if appropriate password policies are not created and enforced. [More]

Cloud Backups: What They Are, Why You Need Them

Posted in Tech Tips | Technology | Cloud & Hosting Solutions on September 24, 2013

Many organizations are still not familiar with cloud backups and the value they could provide, even though traditional backup methods are known for being flaky, unreliable and poorly monitored internally. To help you understand the basics about cloud backups, here are a few of the common questions we are asked. [More]

How to Use VirusTotal to Find Malicious Software: Part 2

Posted in Tech Tips | Technology | IT Infrastructure | Security | Strategic IT Planning on September 17, 2013

The capabilities and utility of VirusTotal are impressive—enough in fact that Google recently purchased the company. However, as with any tool, it can be used for good or for ill. In the latter case, when an attacker deploys a piece of malicious software (perhaps as an email attachment), they hash the file first. Read on to understand what a hash is, how it works and how to calculate its value. [More]

Windows XP Expiration Date: A Great Opportunity for Your Organization

Posted in Technology | Cloud & Hosting Solutions | IT Infrastructure | Virtualization | Strategic IT Planning on September 12, 2013

According to several articles in online technology magazines, 38 to 45 percent of PCs connected to the Internet are still on Windows XP. This is, to be blunt, not good. In case you haven't heard, Windows XP is on its way out. On April 8, 2014, Windows XP will reach end-of-support, meaning it will no longer receive critical updates or patches to protect your computer and your network from dangerous malware, viruses and spam. [More]

Fall into Microsoft Dynamics CRM 2013 for Happier Sales & Marketing Teams

Posted in ERP & CRM Software | CRM Software | Microsoft Dynamics CRM | Technology on September 10, 2013

With the lazy days of summer gone, Microsoft is ready to get you back at your desk exploring the highly anticipated next version of Microsoft Dynamics CRM, formerly named Orion, which will be available this fall. The new version, Microsoft Dynamics CRM 2013, should put a smile on marketers' faces as it centers on engaging with customers and clients. [More]

How to Use VirusTotal to Find Malicious Software

Posted in Technology | IT Infrastructure | Security | Strategic IT Planning on September 9, 2013

For those of us who watch technology in the news it is apparent that our networks are under an increasing load of attacks ranging from the automated to the highly personal. As a network defender―whether in a technical or managerial/oversight role―it is easy to get swept up in the allure of various vendors selling a technological magic bullet to protect your network. And while those blinking light boxes can be very effective at what they do, they are not the only tool available. [More]

Employees: Your Biggest IT Security Risk

Posted in Technology | IT Consulting | Security | Strategic IT Planning on August 8, 2013

Your corporate data is more accessible to more of your employees than ever. This is true for a host of reasons―mobile devices and the growth of BYOD, a growing trend of remote and flexible work options, increased pressure to be more productive, etc. Unfortunately, these trends mean your employees are doing things that unintentionally put your data at risk every single day. [More]

Let's Talk Tech: Finding Your Perfect Hosting Match

Posted in Technology | Cloud & Hosting Solutions | Managed Hosting Solutions | Strategic IT Planning on July 25, 2013

When looking for your private cloud hosting "perfect match," there are several factors most organizations consider. These factors include price, security and adherence to regulations. But just like dating, there are a few key questions to ask and consider before committing to a long-term relationship. Tune into the latest edition of Let’s Talk Tech to learn what to look for in a perfect hosting match. [More]

The Risk of Disruption to Your Supply Chain

Posted in Technology | Disaster Recovery & Business Continuity | Strategic IT Planning on July 23, 2013

According to a recent survey, 75 percent of respondents (mostly supply chain risk operators) experienced an "unexpected major supply chain disruption" in the past two years. These disruptions can happen due to a number of reasons, but some are more prevalent than others. Mark Wilson, director of information risk management at Sikich discusses the missing element during the disaster recovery planning phase for many organizations. [More]

Cloud Hosting: A Strategic Advantage for Nonprofits

Posted in Not-for-Profit | Technology | Cloud & Hosting Solutions | Strategic IT Planning on July 15, 2013

With increasing competition and scrutiny on the allocation of funds, nonprofits today must work harder than ever to gain not only volunteers and donations, but also a strategic advantage that helps the organization win grants, provide performance metrics to its board, decrease its overhead ratio and prove its effectiveness to the public. Developing a technology roadmap, including integrating a cloud hosting model, is essential to maintain and improve operational effectiveness. [More]

What are the Best Reporting Tools for Microsoft Dynamics GP?

Posted in Technology | Accounting & ERP Software | Microsoft Dynamics GP on July 10, 2013

When it comes to using business software, people always want to learn about finding better, easier reporting tools. It is important to know which reporting tool is best suited for a particular task, like reconciling general ledger journal entries or analyzing costs and profits per customer. Reporting tools have their strengths and challenges, so we recently offered an in-depth look at eight popular reporting tools for Microsoft Dynamics GP. [More]



©2017 All Rights Reserved.
Disclaimer: This material has been prepared for general informational purposes only and is not intended to be relied upon as accounting, tax, or other professional advice. Please refer to your advisors for specific advice.