General Computing Executive Commentary

  1. 5 Things Every MSP Needs To Know About Cybersecurity
    11/10/2014

    It turns out factory workers enjoy scrolling through their Facebook News Feed as much as you and me. Maybe that doesn’t exactly raise eyebrows, but this should: connecting to the social media site via a flat network that controls all facets of production.

  2. Can You Prove Your Commitment To Cloud Security With Compliance Standards?
    11/7/2014

    Managed services providers (MSPs) can host companies or access providers that offer IT services. These services can include fully outsourced network management arrangements, such as IP telephony, messaging and call center management, virtual private networks (VPNs), managed firewalls, and monitoring/reporting of network servers. So, in all aspects of the service, the client data is saved or managed over the Internet to reach the MSP. MSPs need to know how to keep the client data safe while it is saved in their environment.

  3. Are You Drifting? The Danger Of Settling For “Good Enough”
    11/7/2014

    One of the mantras at HTG is the persistent pursuit of excellence rather than attempting to attain the ever elusive state of perfection. We prefer action and movement rather than the paralysis that naturally results from constant analysis.

  4. How To Develop The Best BYOD Security For Your Customers
    11/7/2014

    Bring your own device (BYOD) is no longer a trend but a fixture in today’s business world.  Employees are now purchasing the latest smartphones, and employers — your clients — are taking advantage of that situation. Because of the savings in hardware and software purchases for the employer coupled with instantaneous access to employees, an “open door” policy has erupted towards these devices; yet security policies have not caught up and are leaving IT departments with growing concerns.

  5. Looking Ahead To 2015: 3 IT Operations Predictions For MSPs
    11/6/2014

    Shorter days and cooler temperatures mean that we are in the home stretch of 2014. With that in mind, now is a great time for MSPs and solutions providers to celebrate their successes, reflect on the challenges they faced over the last 12 months, and look ahead to what they hope to accomplish in the New Year.

  6. 6 Essential Steps To Managed Backup Success
    11/6/2014

    A couple hours of downtime can do a lot of damage — just ask any major retailer or small business owner. It means lost revenues, loss of customers — and the permanent loss of data. Combine that with the estimated cost of downtime for a small-to-midsize business (SMB) — a staggering $12,500 a day — and you’ve got an invoice that few organizations can afford to pay.

  7. Never Enough Time? 5 Key Professional Processes To Automate
    11/6/2014

    The last 10 years have brought endless new technology into our personal lives. We no longer use maps, phone books, or disposable cameras because smartphones have automated these tasks to require little more than the click of a button on our iPhones.

  8. 3 Tips On How To Become A Microsoft SQL Server Licensing Hero
    11/4/2014

    Recently during a staff meeting, a team member was discussing a boot camp he had just attended focused on Microsoft licensing. He told us that the lead instructor had explained that the licensing status of Microsoft Enterprise customers generally falls into one of two categories: out of compliance or spending more on software licensing than necessary. Of course, virtually all SQL Server users would likely prefer to be in the category of: in compliance and not spending one penny more than necessary on SQL Server software licensing. But as you may already know, getting there is the tricky part.

  9. How To Spot A Cloud Poser
    11/4/2014

    Cloud computing enables people and companies to access applications from any computer. But the cloud has created a new group of “cloud posers,” software developers who make bold (and untrue) claims about the performance of the cloud-based applications they manage. Can you spot a cloud poser?

  10. The Future Of Fraud Protection: Tokenization-As-A-Service
    11/4/2014

    According to Gartner, 10 percent of overall IT security enterprise product capabilities will be delivered in the cloud by 2015. Furthermore, 27 percent of those surveyed indicated they were considering deploying tokenization as a cloud service. Gartner believes regulatory compliance measures, such as those related to the Payment Card Industry Data Security Standard (PCI DSS), are driving increased interest in Tokenization-as-a-Service.

Newsletter Signup
Newsletter Signup
Get the latest channel trends, news, and insights
By clicking Sign Me Up, you agree to our Terms and that you have read our Privacy Policy.