top of page
Our Recent Posts
Archive
Tags
SMB Signing | ND
SMB Signing is a hashing implementation used to keep your data integrity and network structure secure. A Server Message Block protocol is...
Remote Desktop Vulnerabilities | MT
One of the common ways to access your Microsoft-based office computer remotely is to use Microsoft Remote Desktop. Typically the way it...
Virtualizing a Legacy Application | RB
With legacy databases custom coded into Access 97, our client faced the security risk of keeping Windows XP Professional instances on the...
Coordination: the key to success | CM
Coordination is key when it comes to bringing the best outcomes for our clients. We recently changed internet providers for a client of...
Veeam Put to Work | MT
With so many businesses running 24/7, it can be challenging to find a window of opportunity for application development and network...
Benefits of RAID | RI
If you’re hosting onsite servers, the risk of losing data due to hardware failure is something that should be taken seriously at all...


Incorporating VPN on all of your devices | MT
A VPN is a must have for remote access to the office, but what about just when you are connected to the Internet? Many vulnerabilities...


The Harsh Reality of Freezing Temperatures Impact on Key Equipment | MT
This winter the Chicagoland area saw temperatures 25 below zero. Many companies, schools and municipalities closed because of the...
Solstice - A new way to collaborate | JA
In recent months, we have worked with a new product by Mersive Technologies called the Solstice Pod. We implemented it in conference...


Security Services | RB
With a location move from a serviced office space to a standalone office, we were able to manage all aspects of technology. We...
bottom of page