Latest Articles
Articles 81 to 90 | Page 9 of 31
26 March 2019
-
Office 365 Popularity Grows…as does its potential vulnerability
Since its introduction, Microsoft’s Office suite products have clearly been the tools of choice for most of the world’s businesses – most of us using at least one of the applications on a daily basis.
-
The (Free) First Step to Better IT!
In over 30 years in IT, I still encounter many business owners and IT-decision makers who find themselves spending too much of their valuable time dealing with staff technology problems and continually looking for work-arounds to the IT issues.
06 March 2019
-
Passwords: Can we live without them?
For thousands of years, passwords have been used as a means of authentication; a way in which people could be confident that security was maintained.
-
How setting up SOPs can help you deal with IT points of failure
Creating Standard Operating Procedures (SOPs) covering your core technology is valuable even within a small business.
-
Cogendo Achieve ISO 27001 Certification for PerformanceHub
Cogendo, the makers of PerformanceHub, a highly rated online employee performance management tool, have been certified for ISO 27001.
04 March 2019
-
Urgent Call to Action if You Are Using Windows 7
Are you using the Windows 7 operating system on your PCs and laptops? If so, it is time to take action and start planning an upgrade to Windows 10.
-
Windows Server 2008 R2 Approaching End of Life
Are you still using Windows Server 2008 R2 within your business IT environment? If so, it’s time to start planning a migration strategy as the server technology approaches its end of life.
14 February 2019
-
TechNexion PICO-IMX8M -MINI
Ideal for harsh environments and enclosed spaces
08 February 2019
-
February 2019 - VersaLogic Announces Android Eval Kit with i.MX6 SBC
VersaLogic's new Android Eval Kit provides an easy way to evaluate Arm/Android performance and includes everything needed to run the Android OS on a high-reliability embedded system, including a quad core i.MX6 Arm-based computer board and touch-screen display.
14 January 2019
-
Advancing Your IT Strategy: How to Identify Critical Vulnerabilities and Points of Failure
In a recent blog, we looked at the five steps required to develop an effective IT strategy. In this article, we will take a deeper look into one of these key stages: how to identify critical vulnerabilities and points of failure.
Articles 81 to 90 | Page 9 of 31