If you've read our post about business continuity testing, then you understand the need to develop and implement a plan for business continuity and disaster recovery (BC/DR). Here are the Top 5 BC/DR questions and solutions to help you get started with your plan.
Wolf TG Blog | Business IT Insights
This Week in Technology
Google Assistant Gets 6 New Voices!
Last week Google announced they are adding some new voices to their Google Assistant enabled devices. If you're looking for fresh sounds from your Google Home, Android phone or tablet (with Android Marshmallow or later), or your Chromebook, you're in luck! You now have access to 6 distinct voices: 3 male and 3 female.
These new voices are already live and ready to be used by your Google devices. Click the link below for a walk-through of setting up your brand new voice!
Ransomware may pose the biggest cybersecurity threat to your business in 2018. Here’s how to protect your data - and your liquid assets - from getting nabbed for a ransom.
Technology has upended every industry from Airbnb’s disruption of hotels to Bitcoin’s impact on currency. This rapid escalation combined with technology’s increasing availability means everyone has access to powerful tools that didn’t even exist five years ago.
While access to high-impact technology can help any business grow, managing that technology requires both a level of skill and a budget beyond the reach of an enterprise-level business. That’s why more and more companies are turning to end-user managed services.
What other factors are driving the end user managed services decision?
On March 22, 2018 the City of Atlanta reported a ransomware attack—SAMSAM—from hackers requesting $51,000. Ransomware is a malware attack that prohibits access to computer files that can take down an entire company infrastructure and prevent access to important files and systems. For example, six days after the City of Atlanta attack police and municipal court employees are having to fill out paperwork by hand on paper, residents are unable to pay water bills and parking tickets online too.
Learn how to securely share and manage company data without spending a fortune.
According to Techopedia, “document management is the process of storing, locating, updating, and sharing data for the purpose of workflow progression and business outcomes. Centralized sharing and data storage within specific servers help organizations access information efficiently and effectively, along with securing protected data. Programs and servers are used in the process of document management. Important metadata is centralized, as opposed to decentralized or difficult to locate.” Document Management Systems (DMS) have become more popular recently. As businesses migrate IT infrastructure to the cloud it is a natural progression to use a DMS. Most DMS are hosted in the cloud and provide access from anywhere. Examples include: Box, Dropbox, and eDocs. Continuing reading to learn why your business should use a DMS.
You may have decided that managed IT services are the way to go, but selling the idea to your CFO can be the first hurdle toward making it happen. Here are eight tips for getting your company’s finance team as excited about outsourced IT as you are.
IT managed services can increase up-time, reduce costs, and give your business access to advanced technology solutions. These services can also connect you with greater expertise than you may be able to nurture in house. In most cases, IT services providers offer monthly managed services plans instead of the traditional break-fix model.
That’s why the IT managed services trend is ramping up. According to Clutch, 69% of small and medium businesses hire an IT services provider, and 39% of those with a provider plan to increase their spending.
For an established enterprise, an outsourced IT team can either supplement or replace an internal IT department. In either case, making the shift from an IT staff to managed services can be challenging.
To simplify the process, try these six steps:
Choosing a weak or commonly used password invites hackers to help themselves to your business’ data. More than 80% of hacks involve a password breach. So while password selection may not be at the cutting edge of cybersecurity, it’s your first line of defense.
It’s Monday morning, and your project is due the next day. You switch on your computer to find a message that your system is encrypted until you pay the required fee.