It starts with a notification…

A notification in your pocket dings and lets you know someone is trying to log into your email.

That’s weird, you think, I didn’t do that.

Upon closer inspection, you notice the login request is coming from Paris, France. Something’s not right.

Disaster Recovery Services: What Are They and Why They’re Necessary

Disaster planning within the healthcare industry, or any industry for that matter, is a lot of hoping for the best while preparing for the unexpected. Part of that preparation is assembling some form of a plan for when the inevitable happens. This is where disaster recovery (DR) and disaster recovery services come in.

4 Motivators for Stuck Tech Projects

4 Motivators for Stuck Tech Projects
Technical people tend to focus on details. And when it comes to technology consulting there are a lot of details. For example, the minimum system requirements for a server, the firewall ports that are required for an application, the space included in a wireless network.

Five Ways Your Team Can Boost Productivity with Azure AD

Everyone wants a more productive team, but with Azure AD you can deliver a lot of time saving benefits without much additional cost or another server. You may not recognize Azure AD as something you use, but if you use Microsoft 365, you’re already in Azure and you’re already using Azure AD. Azure AD is Azure Active Directory, Microsoft’s user and group management tool.

Keep the I, outsource the T

IT is two separate and distinct areas, Information, and Technology.  Most organizations only focus on the "T" resulting in reduced profits and productivity.  Let us look at the two sides of this and understand what needs to stay in-house, and what a partner should handle.

Are you waiting on your MSP to catch up on security?

Many MSPs are struggling to keep up with the security needs of their customers.  The volume of incidents, cost of implementing security solutions, and a reactive approach puts a lot of pressure on them.  In the meantime, issues pop up everywhere, further reducing their ability to get a plan together.

Does your IT plan include EDR?

Today's threats change too quickly for ant-virus products to keep up.  By the time a virus is added to the "bad" list on your computer it has changed to something else to avoid detection.  This game of cat and mouse is stacked heavily in favor of the cat!  All major anti-virus vendors are now shifting to an Endpoint Detection and Response (EDR) approach, and so should your business.

When an IT Coordinator makes sense

A mature technology partner and an internal IT Coordinator deliver higher productivity at a lower cost than a fully staffed IT department.  Remember the librarian coming to your classroom with the TV cart?  It wasn't that the teacher could not setup and plug in the TV.  It was just easier to schedule and have the librarian bring it.

Are you hiring for technology roles of the past?

Are you hiring for technology roles of the past?  Below are three roles that your business needs to evaluate and consider outsourcing based on today's technology landscape.  This is not an easy process, as there are PEOPLE in these roles that typically have reached the end of their careers or cannot obtain a similarly compensated role elsewhere.

Do you have a cyber attack response plan?

If your business suffered a (successful) cyber attack today how would you respond?  There are no cyber police to call, nor is there a fire department to come put out the flames.  A disaster recovery plan is NOT the same as a cyber attack response plan.

Boost Your Technology Profile Today
With Stringfellow Technology,
Group’s IT Solutions For SMBs

Our robust IT solutions will ensure your business stays secure, connected, and productive at all times

Learn More