Is the Security of your Network Up to Date?


The never ending evolution of cyber threats prompts IT security departments to look beyond the process of defending a network they are responsible for; IT techs are now getting more involved in what is termed as computer proactive maintenance.

Highlights of what we share with our readers based on our experice is:

– 20% of companies are still behind security best practices;

– Most companies are not aware that BYOD devices do represent an IT securty risk if they are not properly part of a network policy.

– Some companies believe that the endpoint security protection they have is enough to protect their network from the spread of malware.

Continue reading


How IT and Help Desk Solve Technical Problems


IT spending on cloud is booming and there is no way to stop this trend, at least in the immediate future. Total spending on cloud infrastructure topped $ 34 billions in 2016, which accounted the 30 per cent of the total amount spent on IT infrastructure.

The public cloud services will continue to rise in 2017 to around 200 billion.
Over the last few years corporations had to adjust to the changes required by the fast advances in the technological field.

Continue reading


Tips for Troubleshooting your Scanner


Cannot scan from your printer? A couple of days ago we have visited a client of us in Greenwich Connecticut whose Epson printer was not performing scanning functions. Every printer and scanner react differently on every computer because the software that makes the printer work is different. However, within this constantly changing scenario, some rules for troubleshooting a scanner do never change and come into play every time there is something to troubleshoot on a network.

Continue reading


Does It Still Make Sense to Do a Backup?


With the new advances in technology and the rise of cloud services users may be asking themselves if it is still worth backing up computer data.

First off, only a few are aware that there are two types of backup: a back up of the files, which retrieves only contacts and the main files of the computer (but not its file system), and the image backup that takes care of creating an entire image of the computer that can be restore into the same machine in case of hard drive failure, especially when users bought an oem version of the Operating system and do not have the entire installation CD.

Continue reading