Downloads

  1. What’s Your Number? A Business Value Conversation
    6/22/2016

    In the April HTGWAY, I talked about two legacies that we’ll leave as business owners – a personal legacy and a business legacy. Both are critical and obviously related. But let’s focus on the reality of how most of us view our business in regard to provide a legacy – it is a major (if not the major) source of funding four our retirement and future. It’s that simple for most, if we miss in creating enough value in our company we will fall short in having enough dollars to fund our lifestyle in retirement the way we wish it to be.

  2. Connected Retail Stores Are Putting Pressure On Network Resilience
    6/21/2016

    In our role as an IT equipment reseller and supplier, we’re charged with providing network connectivity solutions for many retailers with brick and mortar stores across the country. One of the more interesting trends we’ve been witnessing has been the unyielding expansion in the scope of what those retailers rely upon connectivity to achieve.

  3. 4 Ways To Deal With Cybersecurity Risks
    6/21/2016

    Web application security is a very hot topic these days. So what do CISOs need to know in order to deal with related risks?

  4. Protect Yourself From Cybercrime: 6 Best Practices To Implement Now
    6/20/2016

    Today, most companies have at least a basic awareness of the need to reduce their vulnerability to cybercrime. There is also increasing awareness of the need to be prepared for the possibility they will be the victim of an attack. These are good first steps, but there is a wide disparity of understanding about what exactly those actions and preparations should include, as well as how much emphasis and resources should be dedicated to them.

  5. Life Imitating Art: Understanding The Dangers Of XSS Attacks
    6/17/2016
    Cross-site scripting, or XSS, is a vulnerability so common that not only is it number three on the OWASP top 10, but it also just become a real-life storyline related to the popular hacking TV drama Mr. Robot. When the USA Network launched the website promoting season two of Mr. Robot, a white hat hacker also immediately uncovered an XSS vulnerability that would have allowed an attacker to gather users’ Facebook information.
  6. Crypto Ransomware: Fighting A Real Problem With Real Solutions
    6/16/2016

    Crypto ransomware has come a long way over the past 2½ years and no single solution can stop it 100% of the time. But the right recovery and mitigation strategies can help MSPs keep businesses a step ahead of this virulent threat and ensure their clients are effectively protected.

  7. The Payments Industry Has Gone Vertical And They’re Building Shareholder Value On The Backs Of ISVs And VARs
    6/15/2016

    I’ve spent over a decade advising payments service providers on growth strategy and value creation. For many years, much of the growth and enhanced shareholder value was created inorganically through successfully executed horizontal acquisition strategies whereby payments service providers have acquired other payments service providers. By Adam T. Hark, Co-Founder, Preston Todd Advisors

  8. 3 Steps For Developing An Effective Cloud IT Strategy
    6/15/2016

    Even though you might not be aware of it, your organization most likely is using cloud technology in some capacity. It could be a Dropbox account used by an employee to share video files with a client, a virtual machine hosting an application, or employees using cell phones to send files or collaborate on shared documents.

  9. Lagging Security Indicators And The Future Of Security Services
    6/13/2016

    Security breaches in the retail sector are a common occurrence due to the large amount of credit card information available to hackers accessing unprotected systems and networks. Developed in 1996 — but just now being implemented — EMV, chip and sign technology is starting to help retailers reduce their reliance of valuable credit card data. However, how often do we walk into a store to make a purchase just to feel silly because we don’t know if the chip reader is enabled or not?

  10. Maximizing Your Business Valuation
    6/10/2016

    The old adage most IT businesses were started by techies, not business people still rings true. But when it comes time to sell, potential buyers will be savvy individuals who grasp the details of business valuation. So let’s focus on maximizing your business valuation by developing and documenting processes and procedures, building client relationships, learning your tools, and living by your numbers.