Managed IT: Right for my Business? Part 3

This is part 3 of a 4 part series exploring the difference between a one, two or three man IT support model and a managed IT support contract. The author has over 30 years working as an IT leader with some of the best run companies in the world. He has worked both sides of the fence – as a company IT employee and for outsource providers. He’s seen successful engagements and failures. This experience informs ...

Continue Reading
0

Mobile for ERP – Welcome Espresso!

OGSE_ERP.jpg

In today’s ubiquitous mobile environment, end users have high expectations. With the real time data analytics and reporting capabilities from ERP products like SYSPRO, smartphones can now play a major interface role. The SYSPRO Espresso architecture enables full customization of the ERP interface by both the user and developer. As an Executive who requires immediate access to C-level information as well as users who are not office bound, Espresso provides customization ...

Continue Reading
0

Managed IT: Right For My Business? Part 2

This is part 2 of a 4 part series exploring the difference between a one, two or three man IT support model and a managed IT support contract. The author has over 30 years working as an IT leader with some of the best run companies in the world. He has worked both sides of the fence – as a company IT employee and for outsource providers. He’s seen successful engagements and failures. This experience informs ...

Continue Reading
0

Managed IT: Right for my Business? Part 1

This is part 1 of a 4 part series exploring the difference between a one, two or three man IT support model and a managed IT support contract. The author has over 30 years working as an IT leader with some of the best run companies in the world. He has worked both sides of the fence – as a company IT employee and for outsource providers. He’s seen successful engagements and failures. This experience informs this series.

First let me ...

Continue Reading
0

Mobile Applications Considerations

The capability to create mobile applications may be more in reach than you think. The availability of software tools to help create native or hybrid applications on mobile platforms (iPhone, Android) is huge and rapidly expanding. Building Business-To-Business or Business-To-Consumer mobile applications has never been more affordable.

Most business owners may think that custom mobile applications are out of their reach – too complex or costly. Today, this is just not the case. There are endless possibilities ...

Continue Reading
0

Cyber Crime Unit: St. Joseph County Police

I recently attended the St Joseph County Cyber Attack Response Crime Symposium sponsored by the St. Joe County Chamber of Commerce. Cyber Crimes Investigator Mitch Kajzer with the St. Joseph County Prosecutor’s Office presented.

About 40 people with varied backgrounds and job descriptions attended. Most were business leaders and few in IT. I was disappointed that the classroom wasn’t packed. This may be indicative of the fact that our regional businesses still don’t take cybercrime seriously. ...

Continue Reading
0

Med Jacking

Risk Assessment is the core requirement for achieving HIPAA Security compliance. This risk assessment tries to identify and mitigate sources for ePHI data loss in your network. While PCs, laptops, servers, PDAs, network printers and other network devices may be obvious points of failure, you should also include medical devices in your assessment.

Medical devices can be either wireless or wired. They can be broken down into four general categories: consumer health monitoring, wearable, embedded and stationary ...

Continue Reading
0

The Next Largest Cyber Breach Ever

After stealing over 100 million customer email addresses from the likes of JPMorgan Chase & Co, E*Trade Financial Group, Scottrade Financial Services and Dow Jones & Co, thieves sent fraudulent email correspondence touting the value of penny stocks.

That correspondence had the effect of driving up the price of those stocks which the thieves had previously purchased at a low price. Once the stocks increased in value, the thieves sold their position and pocketed the profit. These hackers and their conspirators ...

Continue Reading
0

Hacker Gets Arrested in TalkTalk Hack

They got him! Police have arrested a 15-year-old boy in Northern Ireland in connection with the hacking of the TalkTalk website.

TalkTalk is a broadband services company located in the UK. The TalkTalk website was down and stock in the company fell more than 12% when the news of the hack broke. Response from the authorities was almost unprecedented; illustrating that cybercrime will be vigorously addressed. The joint investigation that nabbed the ‘perp’ involved the Police Service of Northern Ireland (PSNI) ...

Continue Reading
0

PageConnect: Making Printing Easier

If printing needs could be as simple as clicking OK on the computer screen, a lot of worried minds would be eased. The simple act of making a copy or documents for co-workers and clients has many additional layers involved at the decision-making level of a business. From toners to types of paper, it can be an aggravating adventure to keep your company’s printing needs running efficiently.

But what’s the solution? Businesses want to make the best bottom-line decision and not ...

Continue Reading
0
Page 3 of 6 12345...»