Malware Manual – Part 6: 3 Steps to Recover from a Cyber Attack

malware security
  • September 27, 2017
  • Print This Page
For several weeks now, we have been touting the Cybersecurity Framework developed by the National Institute of Standards and Technology (NIST). The NIST framework encapsulates a thorough, structured approach to managing cybersecurity holistically according to five tenets: Identify Protect Detect Respond Recover In this final installment of our “Malware Manual”

Healthcare Businesses Should Budget for Data Breaches

healthcare data breach
  • Oct 5, 2017
  • Print This Page
On a regular basis in this blog, we counsel business leaders to think like big corporations. Large businesses budget for cyber security and recovery costs – smaller-sized size businesses would be wise

5 Productivity Enablers for Your Remote Workers

  • Sep 19, 2017
  • Print This Page
Researchers predict 1.75 billion people – more than 40 percent of the global workforce – will be mobile by the end of this decade. These swelling ranks of remote workers

BYOD Refresher: Are You Protecting Business and Personal Data on Mobile Devices?

  • October 31, 2017
  • Print This Post
In a world where mobile devices outnumber people, the trend toward people using their own smartphones and tablets for business purposes is inescapable. Which is why Bring-Your-Own-Device (BYOD) programs and

Strategic Technology Handbook: Overcome the “Digital Confidence Crisis” with Managed Services

  • October 25, 2017
  • Print This Post
The tech market intelligence firm IDC predicts that, by the end of this year, 70% of Global 500 organizations will build dedicated teams focused on digital transformation and innovation. Why?

3 Tips for Managing Technology for 3 Generations in the Workplace

Businessmen reviewing some financial work at the desktop computer.
  • October 19, 2017
  • Print This Post
If you’re not managing information technology for a multi-generational workforce, you will be in three to five years. “Millennials” – loosely defined as anyone born after 1981 – already make

Ransomware Refresher: 5 Best Practices for Fighting Today’s Biggest Cyber-Threat

  • October 17, 2017
  • Print This Post
Ransomware, a piece of malware that blocks access to data and/or systems until a sum of money is paid, is the number one cyber-threat facing business organizations today, per the

Why IT Managed Services Can Accelerate Digital Transformation

Cropped shot of computer programmers working on new code
  • October 11, 2017
  • Print This Post
There’s that buzz phrase again: Digital Transformation. We’ve been writing about this business trend for two years now, and the buzz refuses to subside. Why? Because this movement is big
Your Local TeamLogic IT


into the evolving world of IT for business.
Subscribe now.

Follow Us
Friend me on FacebookFollow me on TwitterFollow my company on LinkedInRSS Feed

Follow us on Twitter


ITinflections is a blog that covers a wide range of technology-based articles IT in the workplace, focusing on small- to medium-sized businesses.

If you’re looking to improve your company’s productivity through the effective use of technology, enjoy ITinflections, the blog about technology for business.