Blog

January 29th, 2015

Transferring From Your Old Computer To Your New Computer

As we have previous posted, individuals and companies reinvest in a new computer(s) about once every 4-5 years. Before you make the big switch, make sure you know how to best transfer over your data, contacts and settings from your old computer to your new computer. Below are simple instructions are transferring from PC to PC, Mac to Mac and PC to Mac.

(more…)

January 20th, 2015

The Leap second could stall your businessA recent article on CNN points out a tech blip that could shut down websites in the summer of 2015. The ‘leap second’ will occur on June 30 of this year because the “Earth’s rotation has slowed” meaning that “we’re all living about a second ahead of where we should be.”

(more…)

January 12th, 2015

Avaya Works With Google To Create Seamless Call Systems

According to a recent post on The Age, the Google Chromebook is now a viable tool for secure, remote calling across major Internet providers, despite its default Google Chrome settings, thanks to a recent project with Avaya.

(more…)

January 6th, 2015

Tech Experts: Managed Service Providers Create Efficiency, Cut Costs

A recent article on CyberTrends points out the benefits of third–party IT managed service providers—exactly what your company might need to get off on the right foot in 2015.

(more…)

November 26th, 2014

Internet in Africa

In a recent post on IT News Africa last week, the site reported that Internet.org—an initiative of Facebook’s Mark Zuckerberg—is “in talks with Avanti, a UK-based satellite operator regarding a project that will essentially provide free Internet services in Africa.”

(more…)

October 17th, 2014

IT Security Audit. Radiate Technologies.

We often take information security for granted. As long as all systems are a “go” we don’t worry much about the inner workings of our systems or network. The sharing of information within a business, however, makes it necessary for IT security to continuously be analyzed to avoid leaking of information or a system-wide meltdown due to viruses or internal errors.

(more…)

October 6th, 2014

Don't take your laptop to bed

We’re all a little guilty of this, right? We take our laptop computers to bed, either to relax while we get work done or just to watch our favorite show before bed, but the fact is taking your laptop to bed can cause a myriad of health problems for you and tech problems for your laptop.

(more…)

October 3rd, 2014

Computer destruction rewuired for financial institutions

Sensitive information in the wrong hands could lead to identity theft, which is why financial institutions are held to a high standard when it comes to protecting customers’ personal, financial information. Likewise, when it comes time to make a hardware or software change, federal mandates require the proper destruction of this information. This leave several business owners and operators wondering how to best go about disposing of old computer and hardware that have personal, financial information.

(more…)

September 10th, 2014

Avoid a data disaster

Pop quiz: Do you know when hurricane season is? Many people associate hurricanes with the warmer weather months, but the fact is, September is only halfway through the season, which runs through the end of November.

Our home hubs in Charleston, Columbia and Baton Rogue that service clients all along the east coast, are no stranger to inclement weather, so it is important for these businesses and those like them to have a business continuity plan.

(more…)

September 3rd, 2014

Write the perfect password to keep your business accounts safe

Your business is your livelihood, and the locks that protect it are your passwords. We’ve already written about why a hacker may be trying to hack your small business, and this is a very real threat, as business moves towards a more digital platform.

Let’s first start with the basics, and then move on to more advanced solutions that will help keep your accounts and information safe.

(more…)