<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2923012&amp;fmt=gif">

Blog Categories

Top Small Business Events and Blogs for New England Businesses

With 2017 just about to get up to speed, New England businesses are getting set to launch small and large technology implementations that will further the business in the coming year. Equally important for all businesses (particularly small businesses) is the ability to further their general knowledge base about a wide variety of subjects that are fundamental to keeping the business strong and growing.

Read More

The Complete Guide to Massachusetts Information Security Law

When it was passed in 2010, Jones Day called the Standards for the Protection of Personal Information of Residents of the Commonwealth (of Massachusetts) “the most comprehensive data protection and privacy law in the United States.” The law, known as 201 CMR 17.00, was created to protect Commonwealth residents against identity theft and fraud. It requires any companies or persons who store or use personal information about a Massachusetts resident to develop a written, regularly audited plan to protect personal information. This applies to both paper and electronic records.

Read More

The Technology Events Calendar for Boston IT

In today’s digital business landscape, technology is driving both innovation and operational efficiency in new and unprecedented ways. It’s no longer enough for CIOs, CTOs, and IT specialists to stay abreast of these emerging changes. Now the entire business—including the entire C-suite, as well as key management across the enterprise—must stay in touch with IT changes and challenges.

Read More

Considerations for Defending Against Malware and Zero Day Threats

Gone are the days when antivirus software was enough to protect digital assets against IT security risks. Today, you need more effective defenses against the large majority of malware, zero-day, and other threats that are out there. But with a limited budget and/or in-house (cybersecurity) talent, it’s not always easy to determine which security solutions should be given top priority.

Read More

The Ultimate Guide to Using Veeam for Cloud Backup Services

Using virtual machines (VMs) in your infrastructure makes sense from a cost perspective, because physical server costs are lower and resources are used to their capacity. If additional resources are needed, a new server is simply spun up. The ease of maintenance also makes virtual servers attractive to most IT departments. If a VM should fail, you simply spin up a new one. However, in order for true continuity, you will need to ensure that the new server is restored from the one it replaced exactly.

Read More

How to Migrate Public Folders to Office 365

While moving to Office 365 can be a transformative experience in terms of productivity, collaboration, and mobility for your business and its workforce, the migration process must come first. Deciding how to handle the overall migration process can be a significant undertaking that includes dealing with domain names and Active Directory, group and user identification, and migration methods. The primary challenge is the process of how to migrate public folders to Office.  365.

Read More

How Long Does it Take to Migrate to Office 365?

When organizations are contemplating an Office 365 migration, there are many questions that must be answered. Is Office 365 right for my organization? What will it cost to migrate to Office 365? How long will it take to complete the migration?

Read More

5 Terrible Ways to Handle Security and Risk Management

If you look at the headlines on any given day, you are going to see at least one news story about a data breach, ransomware, or other computer-related crime. It’s hard for companies to get a handle on their security and risk management because the threat landscape is always changing. From zero-day exploits to state-sponsored attacks, it seems like the deck is stacked in favor of the attacker.

Read More

What Is Operational Intelligence? 5 Things to Know About Splunk

According to IDC, 42 percent of all data will be machine-generated by 2020, which includes data from sensors, security systems, networks, servers, storage, and applications. Today, most of these data are an untapped potential for making decisions.

Read More

How To Protect Your Business With Managed Backup Services

Backups are considered one of the most vital of all IT functions. Without an effective backup strategy, your business is left vulnerable to data loss, but also to threats such as ransomware attacks. Not having the right backup strategy can also put your organization at risk of being out of compliance with the different regulations you need to adhere to.

Read More