General Computing Executive Commentary

  1. Help Your Brick-And-Mortar Retail Customers Make Mobile Work For Them
    2/27/2014

    It’s no secret that mobile technology has changed our lives. We are now able to be in contact with anyone and access the tiniest minutia of information from nearly anywhere in the world using our increasingly sophisticated smartphones and tablets. And increasingly, these mobile capabilities are also transforming another aspect of modern life: how consumers shop.

  2. 3 Ways Hospitals Can Help Ensure HIPAA Compliance
    2/27/2014

    The Health Information Portability and Accountability Act (HIPAA) is 13 years old. During that time, the acronym, HIPAA, has become synonymous with patient privacy. Every patient receives the doctor or hospital’s privacy policy during an initial visit and terms like protected health information (PHI) have become part of the everyday healthcare vernacular.

  3. Top 10 Wireless Site Survey Tips And Common Mistakes To Avoid
    2/18/2014

    Wi-Fi wireless networks are ubiquitous these days: changing the way we work, the way we communicate, and our expectations of how we access the information we need, wherever we are. Wi-Fi is pervasive in all things mobile — the devices we carry to communicate — and can be found almost everywhere, e.g., home, work, cafés, fast food restaurants, hotels, schools, hospitals, retail stores, manufacturing, subways, trains, and airplanes.

  4. 5 Reasons MSPs Should Sell Microsoft Office365
    2/13/2014

    Some managed services providers (MSPs) are still on the fence about Microsoft Office 365.  Here are five reasons for them to take the leap — sooner rather than later.

  5. What It Takes To Prevent Cyber Attack
    2/10/2014

    Dan Ross of Promisec says companies that rely only on anti-virus/anti-malware detection cannot keep up with an ever-changing threat landscape and would not have detected these types of changes on end user computers or POS devices. It was only after it was discovered that the anti-virus and anti-malware products could be updated to provide the proper protection. To prevent against this type of breach, companies must be able to detect changes to services, processes, and registry files. 

  6. Are Your SMB Customers Safe From Cyber Attack?
    2/5/2014

    Tim Gillen of Terrapin Networks and a member of The ASCII Group lists some measures MSPs can take to help protect their SMB clients from cybercrime.

  7. 6 Important Things To Consider When Evaluating A BDR Vendor
    2/5/2014

    David Maffei of Carbonite lists important factors channel partners should consider when selecting a data backup and disaster recovery vendor for their clients.

  8. BYOD Risks to Watch Out for in 2014
    2/4/2014

    Andreas Baumhof of  ThreatMetrix explains the cybersecurity implications that BYOD has for businesses and consumers in 2014 and how to manage BYOD risks.

  9. MSPs Thrive In The Cloud With Flexible Foundation Platforms
    2/3/2014

    Satish Hemachandran of Cbeyond explains the opporunity managed services providers have to advise their clients and solve business problems with unique technology solutions — especially helping their SMB clients make decisions about cloud-based services.

  10. Keeping Customers In The Age Of The Cloud
    1/31/2014

    Andrew Harrover of Matrix Computer Consulting, a member of The ASCII Group, shares the importance of talking with your clients about cloud-based offerings and how it can strengthen your role as their trusted advisor.