Blog

What Is Two-Factor Authentication?

Two-factor authentication (2FA) strengthens access security by requiring two methods to verify your identity. These factors can include something you know (a username and password), plus something you have (like a smartphone app) to approve authentication requests.

Time Matters 16.1 Released – March 28, 2017

LexisNexis(R) released 16.1 of Time Matters(R) so finally we can upgrade many of our clients who have been waiting for the opportunity to upgrade. Many of you are still on older versions of Time Matters. Lately we have had several firms purchase new desktops or upgrade to Office 2016; their hardware and software are not compatible with their Time Matters version, forcing them to stop and get the upgrade done.

Attention – Adobe DC Update Breaks TM SAVE Function

A recent update to Adobe DC (2017.009.20044) is causing Adobe to prompt you to disable Protected mode at startup even though its already disabled. This issue does not allow the pdf document to be saved to TM using TM SAVE. Enabling/disabling the option nor re-firing the add-in seems to resolve the issue.

Is Your Network Ready for Cloud Backup?

Ransomware, Privacy Breach, Compliance requirements and Business Continuity make the case to protect your company’s data. Cloud backup and Disaster Recovery as a Service (DRaas) require reliable network access to ensure your IT assets are backed up and available for rapid recovery.

What are Managed Services and Why Should I Care?

A managed services provider (MSP) takes on the responsibility for a company’s technology and infrastructure by proactively providing a defined set of IT services for a fixed monthly fee. This approach is preferred by businesses over the traditional Break/Fix services delivered on an hourly rate when needed. By emphasizing high availability and reliability,

Rethinking Wide Area Networking

There is a shift in how businesses use technology. New applications, including Voice over IP VoIP phone systems, Cloud Based Email, File Sync & Sharing all require solid network infrastructure. According to a recent report from the Enterprise Strategy Group, Demonstrating SD-WAN Business Value: Rethinking WAN for a Modern Age, distributed organizations with multiple Remote Office/Branch Office (ROBO) locations may need to reduce unnecessary deployment and management of network infrastructure.

Considerations for Cloud Migration

The market for Cloud Computing is maturing. According to Trends in Cloud Computing, a recent research report by the Computing Technology Industry Association (CompTIA), 90 percent claim using some form of Cloud Computing. In fact, the report provides insights that 43 percent of the Companies using Cloud Computing are migrating from one Public Cloud Provider to another for a variety of reasons including security, cost and open standards. Here are a few considerations for Cloud migration gleaned from the report.

Internet of Things: Reality or Myth

Technology is always evolving, with new ways to benefit always on the horizon. Like Mobility and Cloud, Internet of Things (Iot) is a shift in computing that will impact many businesses and organizations within the next few years. According to research from the Computing Technology Industry Association (CompTIA), IoT is expected to drive over 50 billion connected devices by 2020. Read on to explore why this new emerging area of technology is expected to grow at a dramatic pace.

Archives

Share This