Chicago (312) 971-8500
Select Page
Do I Need Ongoing IT Support?

Do I Need Ongoing IT Support?

Imagine this. You’ve just spent months working closely with engineers and project managers, to design, configure, and install your company’s new server environment that will house not only your data but run your main business applications. You’ve signed off on the...

read more
How Your Employees are Watching TV on Your Dollar

How Your Employees are Watching TV on Your Dollar

We recently met with a company who asked us to do a security audit for them because one of their employees fell for a phishing attack. They know it compromised their email and they were worried about what else could be at risk. While there were a number of security issues that came back, what the President didn’t expect to learn was the productivity hit they were taking.

read more
C-Suite: Ask For Your Administrative Passwords Now

C-Suite: Ask For Your Administrative Passwords Now

As an owner or high-level exec, I recommend you ask your IT company to send you all your administrative passwords to all your IT systems at least 2x a year. The larger your business, the more often you’ll want to ask because things probably change more often. First...

read more
Work from Home – Benefit or Disaster?

Work from Home – Benefit or Disaster?

Applaud the go-getters on your team that want to go above and beyond in and out of the office, but don’t let those same allstars’ work ethic cripple your business. The remote use of unmanaged machines can be a fast ticket to unwanted results.

read more
How to SPOT a Phishing Email

How to SPOT a Phishing Email

A phishing e-mail is a phony e-mail that is designed to look like a real request from a contact/company you trust in an effort to get you to give up your login information or to click and download a virus. Often these e-mails look 100% legitimate. They show up in the...

read more
Use STRONG Passwords!

Use STRONG Passwords!

Thanks to powerful brute-force-attack software readily available online, hackers can try tens of millions of possible password combinations per second. For example, hacking software can guess a five-character password in under three hours. If you only use lowercase...

read more
Are You Committing These 8 Business Backup Sins?

Are You Committing These 8 Business Backup Sins?

Like most business owners, I’m sure you know back-ups are an essential component of your network health. However, too many businesses don’t have all the facts about backup. Take a look at these back-up risks that we commonly find bullying local businesses: Back-ups...

read more

MEMBERSHIPS

T20 Elite Partner