Malware Manual – Part 1: Recognizing Your Risk

malware security
  • July 6, 2017
  • Print This Post
Ransomware has been grabbing headlines in recent months, with attacks starting in countries such as the UK or Ukraine and then sweeping across the globe. High-profile industries, such as healthcare, have been targeted as victimized organizations vary from care providers to equipment suppliers. But instead of piquing the interest of

IT Policies and Why They’re Essential to SMB Success

it policy
  • Jul 12, 2017
  • Print This Post
There’s no shortage of advice available to SMBs about using information technology

What Risky IT Management Methods Do Cyber Criminals Target?

it management mistakes
  • Jun 29, 2017
  • Print This Post
Part 3 in our Stalk the Stalkers Series A recent security survey

Debunking 3 Digital Transformation Myths for SMB Leaders

debunking digital myths
  • July 19, 2017
  • Print This Post
Sometimes a technology phenomenon grows so pervasive – and hyped – in the collective business consciousness that the subtleties of a trend can become buried in its feeling of urgency. Such is the case with digital transformation. The “reinvention of an organization through the use of digital technology” to improve

What Bad IT Habits Do Cyber Criminals Target?

  • June 27, 2017
  • Print This Post
Part 2 in our Stalk the Stalkers Series Last year marked the greatest spike of cybercrime in recorded history, per a study by IBM’s “X-Force Threat Intelligence Index 2017.” In 2016, 566% more data records were compromised compared to the year prior, IBM researchers discovered. In quantitative terms, more than

3 Questions SMB Leaders Must Answer about IT for Their MSPs

  • June 22, 2017
  • Print This Post
The engine of Digital Transformation is evolving business technology from tactical support to strategic platform. It’s a trend that affects companies of all shapes and sizes, but the most profound impact for small to mid-size businesses (SMBs) comes in the form of competitive advantage. As we’ve argued in many posts,

Why Do Cyber Criminals Want to Steal Personal Data from Your Business?

Hacker spy your data file
  • June 20, 2017
  • Print This Post
Part 1 in our Stalk the Stalkers Series In a recent interview, Dr. Chris Bronk, associate director of the Center for Information Security Research and Education at the University of Houston, told Wall Street Journal technology columnist Christopher Mims that, despite the billions of dollars spent on cybersecurity (analyst firm

4 Signs You Need a New IT Managed Services Provider

Business partners shaking hands
  • June 14, 2017
  • Print This Post
If you’re among the millions of small businesses that use a Managed IT Services Provider (IT MSP), congratulations. You have more wisdom, vision and foresight than many of your competitors. It’s also likely that you’re reaping the myriad rewards of this trusted contracting arrangement, including lower costs, less downtime and
Need Help with your IT?

Find a Location
Near You.


into the evolving world of IT for business.
Subscribe now.

Follow Us
Friend me on FacebookFollow me on TwitterFollow my company on LinkedInRSS Feed

Follow us on Twitter


ITinflections is a blog that covers a wide range of technology-based articles IT in the workplace, focusing on small- to medium-sized businesses.

If you’re looking to improve your company’s productivity through the effective use of technology, enjoy ITinflections, the blog about technology for business.