Blog

January 20th, 2015

A recent article on CNN points out a tech blip that could shut down The Leap second could stall your businesswebsites in the summer of 2015. The ‘leap second’ will occur on June 30 of this year because the “Earth’s rotation has slowed” meaning that “we’re all living about a second ahead of where we should be.”

(more…)

January 12th, 2015

Avaya Works With Google To Create Seamless Call Systems

According to a recent post on The Age, the Google Chromebook is now a viable tool for secure, remote calling across major Internet providers, despite its default Google Chrome settings, thanks to a recent project with Avaya.

(more…)

January 6th, 2015

Tech Experts: Managed Service Providers Create Efficiency, Cut Costs

A recent article on CyberTrends points out the benefits of third–party IT managed service providers—exactly what your company might need to get off on the right foot in 2015.

(more…)

November 26th, 2014

Internet in Africa

In a recent post on IT News Africa last week, the site reported that Internet.org—an initiative of Facebook’s Mark Zuckerberg—is “in talks with Avanti, a UK-based satellite operator regarding a project that will essentially provide free Internet services in Africa.”

(more…)

October 17th, 2014

IT Security Audit. Radiate Technologies.

We often take information security for granted. As long as all systems are a “go” we don’t worry much about the inner workings of our systems or network. The sharing of information within a business, however, makes it necessary for IT security to continuously be analyzed to avoid leaking of information or a system-wide meltdown due to viruses or internal errors.

(more…)

October 6th, 2014

Don't take your laptop to bed

We’re all a little guilty of this, right? We take our laptop computers to bed, either to relax while we get work done or just to watch our favorite show before bed, but the fact is taking your laptop to bed can cause a myriad of health problems for you and tech problems for your laptop.

(more…)

October 3rd, 2014

Computer destruction rewuired for financial institutions

Sensitive information in the wrong hands could lead to identity theft, which is why financial institutions are held to a high standard when it comes to protecting customers’ personal, financial information. Likewise, when it comes time to make a hardware or software change, federal mandates require the proper destruction of this information. This leave several business owners and operators wondering how to best go about disposing of old computer and hardware that have personal, financial information.

(more…)

September 10th, 2014

Avoid a data disaster

Pop quiz: Do you know when hurricane season is? Many people associate hurricanes with the warmer weather months, but the fact is, September is only halfway through the season, which runs through the end of November.

Our home hubs in Charleston, Columbia and Baton Rogue that service clients all along the east coast, are no stranger to inclement weather, so it is important for these businesses and those like them to have a business continuity plan.

(more…)

September 3rd, 2014

Write the perfect password to keep your business accounts safe

Your business is your livelihood, and the locks that protect it are your passwords. We’ve already written about why a hacker may be trying to hack your small business, and this is a very real threat, as business moves towards a more digital platform.

Let’s first start with the basics, and then move on to more advanced solutions that will help keep your accounts and information safe.

(more…)

August 20th, 2014

Why Hackers Hack Into Small Medium Businesses

When you think of the term “hacker,” what pops into your mind? If you’re like most people, it is the classic Hollywood image of a man in a back room, steadily typing away, or a secret military operation.

While large-scale hacking attempts do exist, and international cyber hacking by national governments is making the news, the truth is small and medium-sized business are prime targets for hackers.

(more…)