Macro viruses… if you’ve been in IT for a few years, that term may have you thinking back to the 90’s. That's when malicious code embedded in Office documents would do annoying, if not destructive, things -- like sending itself to the first 50 people in your address book.
Managing Inventory is the second of a 10 part series reviewing the Top 10 IT concerns in 2018. In the last article we addressed the 10th largest IT issue and the challenges. We continue to look for ways to make your business agile.
#9 Business Issue: Managing Inventory Effectively
First of all, a well-functioning inventory management system, is crucial for successful business.
To help make your business agile, over the next few weeks, we are going to look at the top 10 challenges for small to medium size businesses (SMB’s) around IT priorities and challenges. This is the first in the series on making your business agile.
Starting at #10:
#10 Business Issue: Creating Innovative Products
First, the key to any successful business is the ability to come up with new ideas.
Malware outbreaks have been in the news lately. Entire companies crippled by serious malware infections. They have paid ransoms to hackers in order to get their data back and their systems online.
Of course, you need to have good antivirus, firewall, and spam filtering solutions in place in order to prevent infections in the first place.
This week’s attack is a Gmail scam.
The victim receives a text asking whether they’ve requested a password reset for their Gmail account. And, if not, to reply with the word ‘STOP’.
It is easy to see how employees could respond without thinking.
The topic of tech addiction is gaining momentum. In February, a gathering of Silicon Valley alumni, whistleblowers and Washington lobbyists in the US capital, heard warnings of potential links between tech addiction and sleep disruption, poor academic performance, anxiety, depression, obesity, social isolation and suicide.
The latest hacker scam is March Madness! It seems that hackers like to capitalize on current popular events. Recently, it was the Winter Olympics, Valentine’s Day – well, now it’s March Madness!
So, hackers are now spoofing popular March Madness websites, and that includes bracket sites and live game streaming.
A computer without a firewall is like leaving the doors open, the windows down and the keys in the ignition of your car. You might as well leave a sign that says “steal me!”
Protecting your computer systems from malicious users intent on disrupting your operations or -- even worse -- stealing your private data or intellectual property must be an IT priority.
When an office moves, especially when IT moves, it may actually be more stressful than moving your home and family. One thing is for sure -- the IT and telephone systems are the lifeblood of any company. If these systems aren’t working and the phones aren’t ringing then you can’t run your business.
Everyone agrees that there are many benefits to cloud computing, but whether to manage resources in a private or public cloud solution is the question.
Public Cloud Computing
Public clouds such as Amazon EC2 and Microsoft Azure have a number of benefits:
Utility Model – With a Public Cloud, users pay by the hour for computer resources.