Hi, this is Tom Hermstad with HD Technologies. This is the hiring internal I.T. series. And this is the second part in the series, and it’s about technical expertise and competency as it relates to hiring the engineer. Then on the…
Cybersecurity Training for Employees
Your company’s mission is to provide products and services — but there’s a lot more to it. You can make all the widgets that you want, but if you don’t protect them you can lose everything. Ignoring potential threats and vulnerabilities…
The Cybersecurity Risks of Working from Home
When it comes to cybersecurity, there is not much room for error. Those who fail to adequately secure their IT environment, including remote access employees, may regret their neglect. As more people are working from home rather than at the office, cyber…
Password Vault – Internet Security Strategy
Everyone knows the importance of passwords. From ancient days, secret passwords have been used to authorize entry for those who know them. Those who could not accurately state the password were restricted access and may even have been considered enemies. That’s…
Incremental Backup
Regular backup of data is essential, especially for businesses. Without a consistent backup solution, you have no way to recover data in the event of a disaster. Doing a full backup of all files gives you a good foundation for restoration, but…
System Image Backup
Any business that has suffered a data loss and survived knows the importance of a good backup strategy. Many businesses assume it will never happen and have no backup services or inadequate backup plans. Simply backing up information to discs or…
Backup Solutions
Backup Solutions- How to pick the best one for your business Regardless of size, every business needs good backup solutions. Every year, thousands of businesses across the United States lose months or even years of their data because of system crashes…
Why You Need Network Documentation
You may be bored enough to read the cereal box some morning when you’re eating breakfast, but it’s not particularly exciting literature. Neither is network documentation. But like the cereal ingredients’ description on the box, good documentation will tell you exactly…
Best Security Practices for Remote Access Users
In the time of Covid-19, many businesses have been forced to ask their employees to work from home. As a result, the work from home (WFH) model may become a permanent alternative for many workers who can effectively complete their required tasks…
Mobile Device Management with Office 365
Mobile Device Management is important when it comes to your overall technology security strategy. If you have a fleet of phones in use by your employees out in the field, then you basically have an added level of exposure for each…