Blog

8 ideas for celebrating Mother’s Day and Father’s Day in Rochester

8 ideas for celebrating Mother’s Day and Father’s Day in Rochester

Interestingly enough, the two national celebrations recognizing mothers and fathers followed wildly different paths through history. Mother’s Day was officially recognized by Congress all the way back in 1914 after an aggressive campaign by Anna Jarvis.

Simple Ways To Protect Yourself Against Online Criminals and Hackers – 22

Simple Ways To Protect Yourself Against Online Criminals and Hackers – 22

IT Security Tip #22: The #1 threat to your security is…YOU! And your employees.

Like it or not, human beings are our own worst enemies online, inviting hackers, viruses, data breaches, data loss, etc., through the seemingly innocent actions taken every day online.

5 Fantastic ideas for motivating your employees

5 Fantastic ideas for motivating your employees

What percentage of your staff would you rate as highly motivated and engaged with their day-to-day work. 75%? 50%? As of March 2016, Gallup averaged employee engagement at just 34%.

So many factors can demotivate employees, and as the size of your staff grows and diversifies, the list of factors only gets longer.

Simple Ways To Protect Yourself Against Online Criminals and Hackers – 21

Simple Ways To Protect Yourself Against Online Criminals and Hackers – 21

IT Security Tip #21 - 3 rules to keeping your data safe in the cloud

If you’re using any kind of cloud application (and these days, who isn’t?), you are right to be concerned about data privacy and security. The company hosting your data is ultimately responsible for keeping hackers out of THEIR network, but most cloud breaches are due to USER ERROR. So it’s important that you, the user, are being smart about security.

Simple Ways To Protect Yourself Against Online Criminals and Hackers – 20

Simple Ways To Protect Yourself Against Online Criminals and Hackers – 20

IT Security Tip #20: You’ve been HACKED! What’s the first thing you should do?

No matter how diligent you are about security, there’s always a chance you can get hacked. That’s why you need to put a plan in place NOW to protect yourself and your CLIENTS, so damage is minimized.

Why you should become HIPAA-compliant, regardless of legal obligation

Why you should become HIPAA-compliant, regardless of legal obligation

The Health Insurance Portability and Accountability Act (HIPAA) was passed in 1996 to streamline the use and dissemination of healthcare information. That sure sounds nice, but HIPAA is increasingly being associated with complex compliance regulations rather than streamlining data.

Self-taught Machines Can Keep You Safe From Cybercrime

Self-taught Machines Can Keep You Safe From Cybercrime

Most small businesses face tens of thousands of security threats per week, whether they realize it or not. The volume of these threats is so overwhelming that we have dedicated engineers whose full time jobs are to monitor and manage these threats on all of our client's networks.

How the speed of a click has changed business forever

How the speed of a click has changed business forever

Before the rise of email in the early 90s, customers had two options for doing business: either place a phone call during business hours (only to wait on hold), or drive to a brick-and-mortar shop. Some people still choose to do business this way, but compared to modern alternatives, they’re slower than molasses.

Content filters don’t just keep employees on task, they keep your company data safe

Content filters don’t just keep employees on task, they keep your company data safe

Recently, a shocking report was released on a topic every business owner prays will never need to be addressed: pornography in the workplace. The report revealed that more than 100 federal employees were regularly visiting adult websites at the office, some for six hours per day, while others were downloading tens of thousands of images to their hard drives.

Get More From Your Existing IT Network Through Virtualization

Get More From Your Existing IT Network Through Virtualization

In its simplest form, virtualization is tricking computers into thinking hardware and software exist where none actually does. Sounds simple enough, right? Not quite. No matter how you design your virtualized infrastructure, you’re in for a long road of incredibly complex hardware purchasing decisions, software administration, and frequent revisions to your system.