When you know it is time to change IT providers

How do you know when it is time to change IT providers? Do you wait until some unforeseen disaster? Until you find out all their best techs have left? Until your competitors are moving past you due to higher levels of tech enabled productivity?

Changing IT providers is right up there with finding a new accounting or legal group to work with.

The bad guys are real and your lack of technology strategy is making it easy for them

The bad guys are real, especially on the Internet.  In fact, the bad guys of the Internet are worse  than those in real life.  At least you can SEE the ones in real life and defend yourself or flee.  The baddies of the Internet come into your house, sit on all the furniture, make a mess, and steal your stuff….all while you are in the kitchen hanging out unaware!

No amount of security will stop them from attempting to break in and nothing is foolproof.

Quit trying to “get all the good” out of your computers

Business managers continue to want to justify getting all the "good" out of their capital equipment purchases.  Computer equipment should no longer be put in this category.  Computers replaced on a 4 year lifecycle will deliver higher productivity for your staff, reduced (or no) downtime, and more overall profit for your business.

Common sense is not so common when it comes to security

The saying, "common sense is not so common" applies to IT security more than we would like to admit. We all have our areas of expertise, but it is now 2021, which means you are participating in IT security whether you like it or not. Here are three common sense ideas you can commit to right now that will make your IT experience more secure.

Stringfellow Technology Group acquires CTC Networks

Stringfellow Technology Group (“Stringfellow”), based in Nashville, TN, has acquired CTC Networks (“CTC”) based in Franklin, TN.  CTC was founded in 1993 and provides managed technology services to the healthcare, manufacturing, and life science industries.

Email Basics: Be Secure

Email was not designed with security as a requirement. In fact, all "security" that involves email was bolted on after the fact. Here are four areas that were bolted on that should be part of your secure email basics.

Utilize MFA, for real

We have beat on this drum for over five years now, and people are still not using it.

M365 Security: Securing devices and applications with Intune

The remote work shift puts the management of devices, applications, and data front and center in the security discussion. The firewall, local Active Directory, and VPN solutions typically don't scale or take into account the vast number of variables when users want to work from any device at any time.