HD Tech - SecurITy Delivered
HD Tech Blog

Cybersecurity Tips, IT Insights & Industry News

Practical advice from HD Tech — your Cyber Lifeguard since 1996.

2026 Cloud Security Checklist for Regulated SMBs
Cybersecurity

2026 Cloud Security Checklist for Regulated SMBs

Use this 2026 cloud security checklist for regulated SMBs to strengthen compliance, protect sensitive data, and reduce cybersecurity risks.

Read more
How CFOs Can Evaluate IT ROI More Effectively in 2026
Managed IT

How CFOs Can Evaluate IT ROI More Effectively in 2026

Learn how CFOs can measure IT ROI in 2026. Discover smarter ways to evaluate technology investments, reduce risk, and improve operational efficiency.

Read more
Why Plain-English IT Is a Compliance Advantage in 2026
Cybersecurity

Why Plain-English IT Is a Compliance Advantage in 2026

Why does plain-English IT matter for compliance? Plain-English IT means explaining technology, cybersecurity, and compliance requirements in clear, understandable language instead of technical jargon. In 2026, this approach helps businesses follow security policies correctly, respond to incidents fa

Read more
The Real Cost of IT Downtime in 2026: What SMBs Need to Understand
Cybersecurity

The Real Cost of IT Downtime in 2026: What SMBs Need to Understand

By Tom Hermstad | President, HD Tech | 30+ Years in IT Security 322 Main St #4, Seal Beach, CA 90740 | 877-540-1684 Last updated: March 2026 The Real Cost of IT Downtime in 2026: What SMBs Need to Understand IT…

Read more
The Evolution of Help Desk Support in 2026: What’s New, What’s Next
Cybersecurity

The Evolution of Help Desk Support in 2026: What’s New, What’s Next

What does modern help desk support look like in 2026? Help desk support in 2026 has evolved far beyond basic password resets and troubleshooting. Today’s IT help desk services combine automation, cybersecurity monitoring, remote support, and proactive system management to keep…

Read more
Your Employees Are Already Using AI: How to Secure AI Adoption in Your Business
Cybersecurity

Your Employees Are Already Using AI: How to Secure AI Adoption in Your Business

Are employees already using AI without approval? Yes. In most organizations, employees are already using tools like ChatGPT, Copilot, Claude, or Gemini for emails, document summaries, research, and data analysis — often without formal oversight or policy. Is employee AI usage…

Read more
How Construction Companies Are Using AI to Analyze RFPs, Proposals & ERP Data
Cybersecurity

How Construction Companies Are Using AI to Analyze RFPs, Proposals & ERP Data

Can construction companies safely use AI for RFPs and proposals? Yes — when AI tools like Microsoft Copilot are deployed inside a secure Microsoft 365 tenant and governed by clear usage policies. Public AI tools should never be used for confidential…

Read more
Why Law Firms & Accounting Firms Need a Formal AI Usage Policy Before Adopting Copilot or ChatGPT
Cybersecurity

Why Law Firms & Accounting Firms Need a Formal AI Usage Policy Before Adopting Copilot or ChatGPT

By Tom Hermstad, CEO of HD Tech — We manage your tech so you can manage your business. If your firm is talking about Microsoft Copilot or ChatGPT but doesn’t have a written AI usage policy, you’re not leading — you’re…

Read more
How Defense Contractors Can Use AI in a CMMC‑Compliant Environment
Cybersecurity

How Defense Contractors Can Use AI in a CMMC‑Compliant Environment

By Tom Hermstad, CEO of HD Tech — We manage your tech so you can manage your business. If you handle Controlled Unclassified Information (CUI) and you’re playing with Copilot or Claude in a commercial tenant, you’re not “innovating” — you’re…

Read more
Is Your ‘IT Guy’ Putting You at Risk? 5 Red Flags to Watch For
Cybersecurity

Is Your ‘IT Guy’ Putting You at Risk? 5 Red Flags to Watch For

Why relying on one IT person isn’t enough in 2026 Many small to mid-sized businesses still rely on a single in-house technician or a part-time contractor to manage their IT. While that person may be hardworking and trusted, today’s cybersecurity landscape,…

Read more
Managed IT for Manufacturers: How to Scale Without Compromise
Cybersecurity

Managed IT for Manufacturers: How to Scale Without Compromise

Why IT matters more as manufacturing operations grow In 2026, manufacturers face dual pressures: increasing production demands and tightening cybersecurity and compliance standards. Whether you’re expanding to new facilities, integrating IoT devices, or adopting ERP systems, your IT infrastructure m

Read more
What Every Healthcare CEO Should Know About HIPAA in 2026
Cybersecurity

What Every Healthcare CEO Should Know About HIPAA in 2026

Why HIPAA still matters in a post-pandemic, cloud-first world As healthcare organizations accelerate digital transformation, HIPAA remains a core compliance framework—not just a legal obligation, but a business-critical standard. In 2026, the law continues to evolve in response to telehealth expansi

Read more
Why Hybrid Cloud Wins in 2026: A Real-World MSP Breakdown
Cybersecurity

Why Hybrid Cloud Wins in 2026: A Real-World MSP Breakdown

What is hybrid cloud — and why are businesses choosing it? A hybrid cloud combines the flexibility of public cloud platforms (like Microsoft Azure or AWS) with the control of private infrastructure or on-premises servers. In 2026, this model is the…

Read more
The Cost of Downtime in 2026: What SMBs Need to Understand
Cybersecurity

The Cost of Downtime in 2026: What SMBs Need to Understand

What does IT downtime actually cost a small business? While the financial impact of downtime varies by industry and size, the real cost extends far beyond lost revenue. Small to mid-sized businesses (SMBs) face consequences like delayed client deliverables, eroded customer…

Read more
What Is Endpoint Protection — And Why It’s No Longer Optional
Cybersecurity

What Is Endpoint Protection — And Why It’s No Longer Optional

What exactly is endpoint protection? Endpoint protection refers to the cybersecurity tools and strategies used to secure individual devices — or “endpoints” — like laptops, smartphones, desktops, and servers that connect to your network. These tools monitor for threats, block malicious…

Read more
Cybersecurity for Construction Firms: The 2026 Compliance Playbook
Cybersecurity

Cybersecurity for Construction Firms: The 2026 Compliance Playbook

Why does cybersecurity matter in construction? Construction firms are no longer just targets of physical theft — they’re also being targeted by cybercriminals who see blueprints, bid data, and contractor portals as valuable entry points. With growing digital adoption across project…

Read more
Top 3 Tech Risks for Law Firms in 2026 (and How to Mitigate Them)
Cybersecurity

Top 3 Tech Risks for Law Firms in 2026 (and How to Mitigate Them)

Why are law firms prime targets for cyber threats? In 2026, law firms face increasing digital exposure — managing client data, handling sensitive case files, and operating in hybrid work environments. According to the American Bar Association (ABA), over 25% of…

Read more
Beyond the Firewall: A Cybersecurity Checklist for Orange County Defense Contractors
Cybersecurity

Beyond the Firewall: A Cybersecurity Checklist for Orange County Defense Contractors

What’s the most critical cybersecurity step for OC defense contractors? A comprehensive gap assessment to meet CMMC and NIST 800-171 requirements. HD Tech offers this strategic evaluation to help identify vulnerabilities before they become compliance failures. How does HD Tech ensure…

Read more
Is Your LA Accounting Firm’s Data Secure? A Guide to Client Data Protection and Compliance
Cybersecurity

Is Your LA Accounting Firm’s Data Secure? A Guide to Client Data Protection and Compliance

How can LA accounting firms protect client data?  By utilizing Managed Detection and Response (MDR), Endpoint Detection and Response (EDR), and Microsoft 365’s advanced compliance tools—all monitored 24/7 by the HD Tech help desk. Why is compliance critical for LA accountants? …

Read more
Improving Project Efficiency with Managed IT for LA Construction Companies
Cybersecurity

Improving Project Efficiency with Managed IT for LA Construction Companies

How can managed IT improve construction efficiency in LA? Managed IT services streamline project management through secure cloud access, robust mobile device support, and 24/7 remote help desk availability. This approach minimizes costly delays on Los Angeles job sites, ensuring smooth…

Read more
Cybersecurity for the Construction Site: Protecting Orange County’s Construction Sector from Ransomware
Cybersecurity

Cybersecurity for the Construction Site: Protecting Orange County’s Construction Sector from Ransomware

Why is ransomware a threat to OC construction firms? Ransomware can lock critical project data—such as blueprints, contracts, and payroll—bringing job sites to a standstill and costing millions in project delays. How does HD Tech secure construction data? We deploy enterprise-grade…

Read more
Choosing a Cybersecurity-Focused IT Provider in Irvine, CA: A Checklist for Accounting Firms
Cybersecurity

Choosing a Cybersecurity-Focused IT Provider in Irvine, CA: A Checklist for Accounting Firms

What should accounting firms in Irvine look for in an IT provider? Seek a partner with proven expertise in regulatory compliance (such as CMMC and HIPAA), comprehensive 24/7 remote support, and deep proficiency in securing platforms like Microsoft 365 to safeguard…

Read more
The 5 Biggest Cybersecurity Compliance Mistakes Defense Contractors Make (And How to Avoid Them)
Cybersecurity

The 5 Biggest Cybersecurity Compliance Mistakes Defense Contractors Make (And How to Avoid Them)

I’m Tom Hermstad, CEO of HD Tech, your Cyber Lifeguard in Seal Beach, CA. With over 30 years of experience safeguarding businesses, we’ve seen defense contractors navigate the choppy waters of cybersecurity compliance. In this blog, we dive into the five…

Read more
What Is ITSM and Why Should You Care?
Cybersecurity

What Is ITSM and Why Should You Care?

IT Service Management (ITSM): A Strategic Approach to Business Technology In today’s business landscape, technology is the engine of productivity and growth. However, without a structured approach, managing IT can quickly become chaotic and reactive. This is where IT Service Management…

Read more
The Real Cost of a Ransomware Attack in Orange County
Cybersecurity

The Real Cost of a Ransomware Attack in Orange County

The True Financial Impact of Ransomware Attacks in Orange County Ransomware attacks cost businesses far more than just the ransom payment—even a single event can result in multi-million-dollar losses, extended downtime, and lasting reputational damage. Recent industry reports estimate the average…

Read more
MSP vs. IT Support: Which Solution Best Grows Your Business?
Cybersecurity

MSP vs. IT Support: Which Solution Best Grows Your Business?

In today’s business environment, reliable technology is essential to success. The question many business owners face is: should you work with a Managed Service Provider (MSP) or stick with traditional IT support? Understanding each option’s strengths can help you make the…

Read more
IT Services vs. Managed Services: What’s the Real Difference?
Cybersecurity

IT Services vs. Managed Services: What’s the Real Difference?

I get this question almost daily: “Tom, what’s the real difference between IT services and managed services?” It’s a fair question. Both sound technical. Both involve computers. Both cost money. But here’s the truth—the difference could determine whether your business survives…

Read more
HD Tech: Your Partner for 30 Years of Expert Managed IT Services
Cybersecurity

HD Tech: Your Partner for 30 Years of Expert Managed IT Services

For three decades, HD Tech has been delivering managed IT services to businesses across LA and Orange County, helping them operate at peak efficiency while keeping technology risks in check. As we celebrate our 30th year in business, we’re proud to continue providing professional…

Read more
HD Tech: Your Right of Boom Cyber Preparedness Partner
Cybersecurity

HD Tech: Your Right of Boom Cyber Preparedness Partner

In today’s digital-first business world, cyber threats are no longer a distant concern—they are an inevitable reality. As a managed security services provider serving Southern California, HD Tech delivers more than just managed IT services and professional IT support. Our mission…

Read more
Why Your Business Can’t Afford to Skip Managed Cybersecurity in 2025
Cybersecurity

Why Your Business Can’t Afford to Skip Managed Cybersecurity in 2025

In 2025, cyber threats are more advanced, more frequent, and more expensive to recover from than ever before. For business owners, the stakes couldn’t be higher—data breaches, ransomware attacks, and phishing schemes can bring operations to a halt in minutes. The…

Read more
Immutable Backup: Modern Data Protection
Cybersecurity

Immutable Backup: Modern Data Protection

Understanding the Power, Benefits, and Verification of Truly Tamper- Proof Backups In a world where cyber threats grow more sophisticated by the day and ransomware attacks can cripple organizations overnight, safeguarding your digital assets is more mission-critical than ever. Traditional backup…

Read more
Stop Wasting Money: The Smart Way to Outsource IT Management in 2025
Cybersecurity

Stop Wasting Money: The Smart Way to Outsource IT Management in 2025

Running a small business today means keeping up with a fast-paced, technology-driven world. The reality is, IT infrastructure has become the backbone of nearly every business operation—handling everything from data storage to cyber security. But here’s the challenge: maintaining an in-house…

Read more
Modernizing Productivity: How a 4-Year PC Refresh Cycle Powers Efficiency, Security, and Growth
Cybersecurity

Modernizing Productivity: How a 4-Year PC Refresh Cycle Powers Efficiency, Security, and Growth

Exploring the Real-World Benefits of Proactive Device Replacement for Exceptional Businesses In a world where technology evolves at breakneck speed, relying on outdated computers can quietly erode productivity, increase operational risks, and sap the spirit of high-performing teams. To stay ahead,…

Read more
Understanding Endpoint Security: The Layers to Proactive PC Protection and Monitoring
Cybersecurity

Understanding Endpoint Security: The Layers to Proactive PC Protection and Monitoring

Exploring the Critical Components and Modern Solutions for Defending Computer Systems In today’s digital ecosystem, the humble computer, whether a personal device, a workstation, or a point-of-sale system, forms the backbone of organizational productivity and data stewardship. Beneath their familiar

Read more
Prevention is NOT Preparation [PART 3]
Cybersecurity

Prevention is NOT Preparation [PART 3]

Prevention is NOT Preparation Think Preparation AND Prevention Preparation – it’s easier to write a check than to spend time – preparation takes time from high level people at your company. Check out all 3 videos -> PART 1 | PART 2 | PART 3

Read more
The Anatomy of a Cyber Attack, an Act of War [PART 2]
Cybersecurity

The Anatomy of a Cyber Attack, an Act of War [PART 2]

Bycatch This is an Act of War Check out all 3 videos -> PART 1 | PART 2 | PART 3

Read more
The State of Cybersecurity: Part 1
Cybersecurity

The State of Cybersecurity: Part 1

Sobering Statistics: The Reality of the Situation: Check out all 3 videos -> PART 1 | PART 2 | PART 3

Read more
Why We Do What We Do
Cybersecurity

Why We Do What We Do

Although we do a lot of fixing broken printers and helping people with outlook problems, that is not what gets me up in the morning. Nope. I mean, we have to do it, but that’s not what gets me going and…

Read more
Problems with the MSP Industry
Cybersecurity

Problems with the MSP Industry

Here with you today to talk about another taboo subject, which is, what are the problems with the managed services industry and these things that I’m going to relate to come from me actually talking with prospective customers and customers about…

Read more
Pricing in the Managed Services Industry
Cybersecurity

Pricing in the Managed Services Industry

Tom Hermstad with H&D Technologies here, here to talk about a taboo subject, pricing in the managed services industry. When you’re going to get a contract to maintain your computer systems, how do we price? First thing is you got to have…

Read more
2025 Top Things to Think About
Cybersecurity

2025 Top Things to Think About

Being prepared, we have a saying at H&D Technologies, It’s not if it’s when if they want to get to you they will. So what you do is you prepare for that eventuality of when they get in, what are you going to…

Read more
IT Department Risk Management
Cybersecurity

IT Department Risk Management

Hey, Tom Hermstad with H&D Technologies here to give you another little tech vlog from H&D we call it. And I’ve been doing a number of different vlogs on the technical hiring process you need to be thinking about when you…

Read more
What Is Security Compliance?
Cybersecurity

What Is Security Compliance?

If you are intelligent and creative, you can very often find a way to accomplish things that others can’t. Some talented people become trailblazers in their field, consistently meeting goals that they have set for themselves. But left to ourselves, doing…

Read more
Four Major Types of Cyber Threat
Cybersecurity

Four Major Types of Cyber Threat

When assessing the risks of a security breach, it helps to know what you are up against. Cyber threats can come in many different forms.  Understanding the nature of these threats will help us to be more prepared to defend against…

Read more
Hiring Internal IT Staff – Technical Expertise
Cybersecurity

Hiring Internal IT Staff – Technical Expertise

Hi, this is Tom Hermstad with HD Technologies. This is the hiring internal I.T. series. And this is the second part in the series, and it’s about technical expertise and competency as it relates to hiring the engineer. Then on the…

Read more
Cybersecurity Training for Employees
Cybersecurity

Cybersecurity Training for Employees

Your company’s mission is to provide products and services — but there’s a lot more to it. You can make all the widgets that you want, but if you don’t protect them you can lose everything. Ignoring potential  threats and vulnerabilities…

Read more
The Cybersecurity Risks of Working from Home
Cybersecurity

The Cybersecurity Risks of Working from Home

When it comes to cybersecurity, there is not much room for error. Those who fail to adequately secure their IT environment, including remote access employees, may regret their neglect. As more people are working from home rather than at the office, cyber…

Read more
Password Vault – Internet Security Strategy
Cybersecurity

Password Vault – Internet Security Strategy

Everyone knows the importance of passwords. From ancient days, secret passwords have been used to authorize entry for those who know them. Those who could not accurately state the password were restricted access and may even have been considered enemies. That’s…

Read more
Incremental Backup Solutions for Businesses
Cybersecurity

Incremental Backup Solutions for Businesses

Regular backup of data is essential, especially for businesses. Without a consistent backup solution, you have no way to recover data in the event of a disaster. Doing a full backup of all files gives you a good foundation for restoration, but…

Read more
System Image Backup & Data Protection
Cybersecurity

System Image Backup & Data Protection

Any business that has suffered a data loss and survived knows the importance of a good backup strategy. Many businesses assume it will never happen and have no backup services or inadequate backup plans. Simply backing up information to discs or…

Read more
Business Backup Solutions: Protect Your Data
Cybersecurity

Business Backup Solutions: Protect Your Data

Backup Solutions- How to pick the best one for your business Regardless of size, every business needs good backup solutions. Every year, thousands of businesses across the United States lose months or even years of their data because of system crashes…

Read more
Why You Need Network Documentation
Cybersecurity

Why You Need Network Documentation

You may be bored enough to read the cereal box some morning when you’re eating breakfast, but it’s not particularly exciting literature. Neither is network documentation. But like the cereal ingredients’ description on the box, good documentation will tell you exactly…

Read more
Best Security Practices for Remote Access Users
Cybersecurity

Best Security Practices for Remote Access Users

In the time of Covid-19, many businesses have been forced to ask their employees to work from home. As a result, the work from home (WFH) model may become a permanent alternative for many workers who can effectively complete their required tasks…

Read more
Mobile Device Management with Office 365
Cybersecurity

Mobile Device Management with Office 365

Mobile Device Management is important when it comes to your overall technology security strategy. If you have a fleet of phones in use by your employees out in the field, then you basically have an added level of exposure for each…

Read more
Ransomware and Small Business
Cybersecurity

Ransomware and Small Business

Held for Ransom Are you aware of the danger of ransomware? As defined on our blog, ransomware is malware (MALicious softWARE) that locks all of the data on your network with encryption. The perpetrators then demand a ransom to unlock your data….

Read more
Passwords aren’t enough-setup MFA and SSO now!!
Cybersecurity

Passwords aren’t enough-setup MFA and SSO now!!

You are unique in this world, with an identity that no other person has. But sometimes you are called upon to verify your identity in order to access certain services. An identification card may be required for you to cash a…

Read more
What is your backup policy? Do you even have one?
Cybersecurity

What is your backup policy? Do you even have one?

If you are practicing proper computer security measures, then you are running routine backups. Do you have a policy for your backups? Is it written down? If so, then add it to your official policy manual so anyone can easily understand and…

Read more
IT Terms: User Risks
Cybersecurity

IT Terms: User Risks

Get IT We know that all the IT (Information Technology) lingo can be confusing. Occasionally we like to post the definitions to terms that we use often. This post is specific to risks that employees encounter often that can completely derail…

Read more
User Security Training – Book it Today
Cybersecurity

User Security Training – Book it Today

Arming Your Employees With Basic User Security Training Is Job One From desktop to mobile to cloud–technology changes quickly and so do the threats and security measures designed to mitigate them. The best way to arm your staff is thru comprehensive…

Read more
How to Maximize Your MS Office 365 Investment
Cybersecurity

How to Maximize Your MS Office 365 Investment

Microsoft Office 365 offers an expansive selection of apps to add functionality that will increase your productivity and efficiency. Of course, you want to use the best suite of software you can after all your business runs on it! One of…

Read more
The Importance of Proactive IT Maintenance
Cybersecurity

The Importance of Proactive IT Maintenance

“Be prepared” is a good motto to live by, especially when it comes to managing IT environments.  Every element in your IT architecture is subject to failure. It would be foolhardy to think that everything will continue as is without problems….

Read more
10 IT Security Terms Everybody Should Know
Cybersecurity

10 IT Security Terms Everybody Should Know

If you want to become acquainted with a particular subject, you must first learn the basic terminology. IT security has its own special terms that are important to the understanding of cyber threats and how to deal with them. In this…

Read more
Firewalls  Keep Your  Kingdom  Safe
Cybersecurity

Firewalls  Keep Your  Kingdom  Safe

As the name implies, a firewall is an outside barrier to your network and a necessary part of your network security arsenal. A firewall has the capability to both fortify your cyber kingdom, keeping unwanted information or predators out, and virtually lower the…

Read more
Hiring Internal IT Staff – Resume Vs Experience
Cybersecurity

Hiring Internal IT Staff – Resume Vs Experience

Hey, this is Tom Hermstad with HD Technologies. This is the hiring internal IT staff series. And this first one is on the resume versus experience and how the two rarely meet. The big problem comes when most companies go to…

Read more
System Administrator – The Fundamental Rule
Cybersecurity

System Administrator – The Fundamental Rule

Orange County IT Best Practice • System Administration The #1 System Administrator Rule: Why Your Business Needs Exactly ONE Here’s the counterintuitive truth most Orange County businesses get wrong: you should have exactly ONE system administrator—not two or three. Multiple system…

Read more
Secure Your Internet with a VPN
Cybersecurity

Secure Your Internet with a VPN

Secure anonymity is the name of the game when you are doing business over the public Internet. If you work with HD Tech and need to access your business data remotely, we setup VPN (Virtual Private Network) access for you. A VPN protects…

Read more
You Will Be Hacked! Better Get Ready!
Cybersecurity

You Will Be Hacked! Better Get Ready!

Recently I went to a security conference and the FBI Agent there said there are two types of businesses: those that have been hacked and those that have been hacked but don’t know it. OUCH! Have you ever endured the tragedy…

Read more
Small Business Cyber Threats Explained
Cybersecurity

Small Business Cyber Threats Explained

If you think IT security problems are only caused by teenage hackers in their basements, you’re underestimating the scope of possible threats. While guarding against intrusion by curious geeks, every company needs to be on the lookout for security issues arising…

Read more
Triple Your Cyber Security at the Weakest Level
Cybersecurity

Triple Your Cyber Security at the Weakest Level

“It’s not paranoia if they are really after you.” – Tagline for the movie “Enemy of the State” Is your business as safe as it can be from cyber crime? Cyber crime is a real threat and the more digital our universe…

Read more
HR Policies for Tech
Cybersecurity

HR Policies for Tech

The horror of hacks to businesses The scariest part of horror movies is the first scene that shows the fiendish slasher is in the same house or even as close as the same room with the hero or heroine. Many times,…

Read more
Backup, Monitor, Verify – 3 Business Survival Habits
Cybersecurity

Backup, Monitor, Verify – 3 Business Survival Habits

Backups are the single most important survival habit for your business. Period. Everything runs through your computer system.  If that system is down-especially for an extended period, you run the risk of your business failing. Studies show that over 70% of…

Read more
What Fits in a Petabyte?
Cybersecurity

What Fits in a Petabyte?

Maybe Apple can use this for icloud! A Petabyte is the latest size hard disc for servers created by Intel. 1 petabyte (PB) = 1048576 gigabytes (GB). This is great news for your server room as it will greatly reduce the…

Read more
Consequences of Switching Small Business 365 Plans
Cybersecurity

Consequences of Switching Small Business 365 Plans

This is an operational update to all my friends in the MSP community but can also be useful to anyone that has small business based office 365 plans. As of December 1, 2015 Microsoft has begun to force all small business…

Read more
Why Choose Office 365 for Your Business
Cybersecurity

Why Choose Office 365 for Your Business

Blog Why Office 365? Posted by hdtech On March 13, 2015 https://www.facebook.com/v2.6/plugins/share_button.php?app_id=144240632325488&channel=https%3A%2F%2Fstaticxx.facebook.com%2Fx%2Fconnect%2Fxd_arbiter%2F%3Fversion%3D46%23cb%3Dfd9261b30a0e5a2b3%26domain%3Dwww.hdtech.com%26is_canvas%3Dfalse%26orig

Read more
What to think about before a VOIP installation
Cybersecurity

What to think about before a VOIP installation

These days many business are looking at VOIP (Voice Over Internet Protocol) Phone Systems. Instead of carrying calls on conventional phone lines, the voice is carried encrypted across the internet. While VOIP is usually the  way  to go, there are things…

Read more
Business IT Security Services & Consulting
Cybersecurity

Business IT Security Services & Consulting

Technology poses security risks from within and outside every business. H&D Technologies can provide offsite IT security it security service and protection services along with monitoring and consulting services to eliminate risk. Inside Are you worried about the security risks associated with employ

Read more
Continuity and Disaster Recovery
Cybersecurity

Continuity and Disaster Recovery

Continuity refers to the ability to get your systems running quickly during an outage. When your server goes down and can’t be brought back up – now what? If you have regular, non-image based backups, here are the steps: *Also remember…

Read more
Business Password Security Guide
Cybersecurity

Business Password Security Guide

We ran across this interesting article on passwords and it prompted us to write this review on password security for your business. The premise of the article is that a computer program can be created to crack the typical passwords we are all…

Read more
Run – Don’t Walk – to Hard Disk-Based Backups
Cybersecurity

Run – Don’t Walk – to Hard Disk-Based Backups

This is the second installment in the backup series, the first being on the use of tape. We are currently in the best place for backups in the 30 years I’ve been doing IT. Disk-based backups are awesome! The best! If…

Read more
Backups: Beware of Tape!
Cybersecurity

Backups: Beware of Tape!

You’re going to be hearing a lot on backups in the coming weeks, a favorite topic and one that often is ignored by business owners. Besides the work you perform on your systems, backups are the most important thing you can do to…

Read more
Top 10 IT Priorities (5 Now, 5 Later)
Cybersecurity

Top 10 IT Priorities (5 Now, 5 Later)

The days of having an actual hardware server for each business function (file storage, database, email) are over, you can now run multiple ‘virtual’ machines on one server. Virtualization is a big topic, suffice it to say you need to research…

Read more
Business Cloud Backups Explained
Cybersecurity

Business Cloud Backups Explained

It’s Sunday, and I’m looking outside at the gray ‘June gloom’ day in California, and I’m thinking about clouds. Why not talk about ‘cloud’ backups? Firstly, a quick update on the cloud. The term gets bandy about a lot these days,…

Read more
Microsoft moving to outsourced IT model
Cybersecurity

Microsoft moving to outsourced IT model

Microsoft recently announced that it has forged a deal with Infosys Technologies to manage all of its IT operations. This is a tremendous confirmation for the effectiveness of the outsourced IT model. A large, well known, technology company like Microsoft would…

Read more
BYOD – the good vs. the ugly!
Cybersecurity

BYOD – the good vs. the ugly!

If your company has opened its doors to the use of personal mobile devices, iPads and tablets for work purposes you are one of the many who are beginning to allow them into work.  Productivity is enhanced if an employee is…

Read more
Proactive IT Support & Monitoring Services
Cybersecurity

Proactive IT Support & Monitoring Services

When I tell people what I do, they invariably respond…I get it you fix computers. Nothing could be further from the truth. While we do, in the course of a normal day, ‘fix’ peoples computers (which encompasses servers, desktops, laptops, network…

Read more
Backups, Backups, Backups
Cybersecurity

Backups, Backups, Backups

…You have backups in place, right? Lets start with some simple questions to refine your answer. 1) do you get a report daily that shows that your backups worked?2) do you check to ensure your backups include the data you need…

Read more