Don’t Let a Whaler Harpoon Your Company…or Career

phishing
  • September 28, 2016
  • Print This Post
Businesses beware: The con is on. Again. However, in the most recent phishing scheme to surface from hackerdom’s murky depths it’s not the rank-and-file that’s under attack. It’s those in the executive suite. You may know it as ‘whaling,’ the sophisticated, effective and fast growing variant of the social engineering

Answer 5 Critical Questions for your MSP

  • Sep 22, 2016
  • Print This Post
Regular readers know we’re repeatedly encouraging leaders of small to mid-size businesses

What You Need in Your Texting Policy

  • Sep 20, 2016
  • Print This Post
About a year ago, we opened one of our posts with a

Build Business Value With IT Procurements

  • September 14, 2016
  • Print This Post
How much is your business worth? That may be one of the most important questions entrepreneurs will ever face, being forced to put a dollar value on something that often takes years of their blood, sweat and tears to build. Even when not entertaining thoughts of selling their business, owners

5 Occasions When Sensitive Data May Be Especially Vulnerable

Male hand moving the queen
  • September 8, 2016
  • Print This Post
Between regulators, hackers and careless employees, it’s almost impossible to number all your compliance and security risks, let alone proactively manage them to mitigate vulnerabilities. Posts like our “Take the Headaches Out of Regulatory Compliance” and “5 Ways to Secure Your Company without Breaking Your Budget” offer some prudent and

4 Factors Sparking Renewed Interest in Disaster Recovery

  • September 6, 2016
  • Print This Post
In the last couple of decades, high-profile superstorms, wildfires and other destructive natural events have inspired many disaster recovery (DR) and business continuity planning (BCP) initiatives by illuminating business’ vulnerability to sudden IT-infrastructure damage and critical data loss. But, as revealed in an ITBusinessEdge (ITBE) article on the subject, the

More Evidence People, not Passwords, Are the Problem

password-people
  • August 31, 2016
  • Print This Post
More than a year ago, we argued in our post “Proof Passwords Aren’t the Problem” that human behavior remains the greatest cybersecurity challenge for companies of all shapes and sizes. As evidence, we cited the now infamous Sony data breach, a case in which corporate employees unwittingly aided the mission

Why Every Business May Need Cloud Services

cloud-business
  • August 25, 2016
  • Print This Post
(and a Trusted Advisor to Maximize Its Benefits) The cloud is much more than a web-delivery system for software applications. It’s part of a larger IT transformation to “pay-as-you-go services,” which shifts large capital costs to smaller, recurring operational expenses. It simplifies and speeds up the new employee onboarding process,
Need Help with your IT?

Find a Location
Near You.

Gain
weekly
insight

into the evolving world of IT for business.
Subscribe now.

Follow Us
Friend me on FacebookFollow me on TwitterFollow my company on LinkedInRSS Feed

Follow us on Twitter

About

ITinflections is a blog that covers a wide range of technology-based articles IT in the workplace, focusing on small- to medium-sized businesses.

If you’re looking to improve your company’s productivity through the effective use of technology, enjoy ITinflections, the blog about technology for business.