Let’s talk for a moment about email. As an instrument of communication, email allows us to conduct business, catch up with friends, send links, and share information. In the not-too-distant past, postal mail accomplished those same things, albeit more slowly – hence the name “snail mail” in use today. The variety of communications that travel […]
File Backup vs. Image Backup – Which is Best?
When considering what type of backup to use for your business, don’t let cost dictate your decision. Other factors, such as depth and breadth of data, as well as length of downtime should a disaster occur, also need to enter into the equation.
What is an Email Retention Policy and Why Does Your Business Need One?
We’ve all become so accustomed to using email in our daily personal and working lives that we really don’t give a whole lot of thought to it. It’s the fastest way to communicate with others in the course of the day, and the emails we send and receive – in general – never see the […]
10 Steps to Better Smartphone Security
Let’s face it: a smartphone really isn’t a phone. A smartphone is really a pocket-sized computer on which you can also make and receive calls. And aside from the calling function, your smartphone is just as vulnerable to security issues as your laptop – if not more so, because it’s so small and portable. Think […]
How Secure is Your Email?
For all of the press out there about hacking and suspicious websites, one important facet of internet security that gets overlooked is email. Most of us know not to click on links in a spam message, and many of us realize that some email attachments harbor unsavory bits of code. Malicious code and viruses get […]
Establishing a Hosted Environment for Multiple Locations
As a supplier of industrial bearings, chains, gaskets, and gears, Tri-State Bearing serves a wide range of businesses in eight locations. In order to better serve their customer base, Tri-State Bearing sought to improve connectivity between their eight locations and provide improved business continuity and disaster recovery by moving their technology into the cloud. Instead […]







