4 ERP Security Tips

[fa icon="calendar'] 9/13/17 8:00 AM / by Sam Bloedow posted in Managed IT Services, Cybersecurity, Business Technologies

[fa icon="comment"] 0 Comments

 

The purpose of security is to prevent surprises that disrupt business and add cost. When it comes to IT security for manufacturing companies, how you set up and use your ERP system makes a difference in the way you manage security. Manufacturing companies are highly prized targets because of the amount of valuable data that they possess that could be stolen, altered or held for ransom. Whether from an internal or external source, a security breach can have serious repercussions on any manufacturing business. Use these ERP security tips and keep your company out of unnecessary jeopardy.

Read More [fa icon=long-arrow-right"]

Why You Need Disaster Recovery Planning

[fa icon="calendar'] 8/30/17 12:17 PM / by Sam Bloedow posted in IT Strategy, Business Technologies

[fa icon="comment"] 0 Comments

Could Your Business Survive a Disaster?

Our hearts go out to all of the people affected by Hurricane Harvey in the gulf coast states. The images that we are seeing in the media are dramatic and we can only imagine what the people are going through as their lives are endangered, and they see their homes and businesses damaged or destroyed. Right now efforts in the area are focused on safety and shelter. When the storm ends and the waters start to recede, businesses large and small will have to figure out how they will get back up and running. Do you know what you would do if this was you? What does it take for a business to survive a disaster?

Read More [fa icon=long-arrow-right"]

6 Real Backup and Disaster Recovery Scenarios

[fa icon="calendar'] 1/16/17 7:00 AM / by Sam Bloedow posted in Business Technologies

[fa icon="comment"] 0 Comments


Are You Sure Your Data is Backed Up?

If you aren’t really sure that your backup and disaster recovery processes are sufficient and implementable in the event of a data breach, then the 2016 Cost of Data Breach Study by the Ponemon Institute should be enlightening. Often the reason for not taking steps to make sure that data backup and recovery procedures are sufficient and tested is just an attitude that “this won’t happen to us.” Reality is that it can happen to you and here’s how.

Read More [fa icon=long-arrow-right"]

3 Reasons To Include Mobile and Cloud in Your IT Strategy

[fa icon="calendar'] 8/22/16 7:30 AM / by Sam Bloedow posted in IT Strategy, Business Technologies

[fa icon="comment"] 0 Comments

Mobile and cloud computing go together. It makes sense to include them in your IT strategy so that you can assure that the way you use these technologies is adding value to your business, helping you meet your goals, and getting the best ROI from your IT activity and investments. Here are three reasons why you should include mobile and cloud computing in your IT strategy.

Read More [fa icon=long-arrow-right"]