Business Growth: Technology

document scanning

Eliminate Paper Clutter with a Document Capture Solution

Eliminate Paper Clutter with a Document Capture Solution Even with efforts to digitize everything, paper clutter is still a part of modern life. Paper plagues us at home and in…

Century Business Logo

Century Business Technologies – Demo Day 2019

Please click on the image below to register for Demo Day 2019


2019 Cybersecurity Forecast for Kansas Businesses

Statistics show small to mid-size businesses are increasingly targets of cyber-attacks. Many will not recover from a successful attack. 20% of small to mid-sized organizations (SMBs) that experienced a successful…


Top 11 Tips on Protecting Yourself Online

By: Jerry Horton, Technology Director Passwords…we can’t live without them, but living with them gets harder every day. We need a password for everything; computers, smartphones, Wi-Fi networks, smart TVs,…

cyber image

5 things to love about virtualization

Virtualizing your IT environment makes it cheaper and easier to deploy new capabilities to your stakeholders. By concentrating your storage and compute on servers (often hosted by a cloud provider),…

Screenshot 2018-09-12 10.32.13

How can IT determine the optimal smartphone lifespan?

Smartphones don’t last forever. Here’s how organizations can determine their lifecycles to avoid security issues and keep smartphones functioning at peak performance. By Jack E. Gold Smartphone lifespans are increasing,…

Lock on files

Prevent data loss in five easy steps

Prevent data loss in five easy steps We’re now living in the data economy, so you can’t afford to neglect the possibilities of employee actions causing data leakage. Sometimes this…

Dynamic Logo

Why Cloud Storage?

IT News Protecting your company’s data against threats like ransomware, phishing scams, and the latest cyber-attacks should be at the forefront of your IT strategy. However, what’s the best way…

Dynamic july blog

Endpoint security: How to protect your company

Protect your valuable data with endpoint security Modern technology presents a potential security nightmare for IT. Ransomware attacks and well-publicized cases such as the loss of a laptop with sensitive data…


How social engineering attacks have embraced online personas

Discover the extent to which attackers will go to plan social engineering attacks. Nick Lewis explains how the progression of threats is changing how we monitor social media. Nick Lewis (CISSP)…