Business Uses for Twitter

Welcome to microblogging, a new form of Internet communication that has interesting business possibilities. Twitter started as a personal service, where members answered the question “What are you doing?” in 140 characters or less. While many tweets, as the messages are called, broadcast mundane inanities about snacking or napping, increasingly proponents are using Twitter to […]

What 2009 Rings in for IT Budgets

What will the financial crisis mean to your business’ IT budget? Will there be pressure to make existing IT systems go farther? On the other hand, is this a good time to buy? Read the story on Inc. Technology… Published with permission from Source.

Microprojectors: Small But Mighty

Whether it’s to clinch a sale, show off a new product or discuss a potential acquisition, the digital projector is major part of everyday corporate work. Welcome to the era of the microprojector. Read the story on PCW Business Center… Published with permission from Source.

10 Hot Technologies for 2009

What are the new technologies that stand to change the way you do business in 2009 and beyond? Here are at 10 to consider. Read the story on Inc. Technology… Published with permission from Source.

Wi-Fi Security: Block Rogue Access Points

Wireless networks have moved to the small business arena, helping offices spread Internet connectivity and mobility at a low cost, but bringing security concerns. Unauthorized access points can undercut your Wi-Fi security. Read the story on Inc. Technology… Published with permission from Source.

Mobile Broadband: The New “WiFi”

Notebook computer vendors are now more aggressively pushing to have you buy a mobile wireless card that’s built into your computer. Nothing to lose, nothing to break – and you might just get a sweet deal. Read the story on Small Biz Technology… Published with permission from Source.

How Much Ink Is Left in That Dead Cartridge?

You’ve probably had this experience: Your printer tells you it’s time to change the cartridge, but you dismiss the message and keep printing. Days or weeks later, you’re still using the same cartridge and thinking to yourself that rumors of its death were greatly exaggerated. Read the story on… Published with permission from […]

Do you need network monitoring?

Real eyes catch threats in real time There are different levels of cyber security that best suit different types of organization. For example: If you manage a small bakery, you can probably get by just fine without 24/7 network monitoring. On the other hand, if you run a less delicious and more complex type of […]

The More You Know …

Employee education can help you avoid viruses and phishing Threat-savvy team members are one of the key elements of a secure organization. If your employees aren’t prepared and watching for suspicious emails or websites, you’ve left yourself wide open for some expensive attacks like: Viruses Ransomware Phishing scams Internet safety training often falls to the […]

Bringing It Home: Breaches and Phishing Hit Texas and New Mexico

There’s an interesting phenomenon in psychology known as “The Just World Effect.” Basically, we have such a hard time accepting our own vulnerability that we blame people for the unfortunate events that befall them. The underlying belief is that bad things only happen to people (or organizations) that had it coming in one way or […]