Business Growth: Technology


Keeping business laptops secure

Keeping business laptops secure When it comes to notebook computers, their greatest strength can often seem to be their most profound weakness. The very portability that makes them such useful…

Irene Haws

Human behavior can be the weak link in your cybersecurity

By Irene Haws, Dynamic Computer Solutions of Topeka, Inc. Human behavior can be the weak link in your cybersecurity. It is important to provide training for your employees to recognize…

The Great Rewrite


Artificial Intelligence: An in-depth look at how AI is rewriting the world around us. Presented by KPMG, Forbes| brandproductions THE CHANGES COMING WILL RIPPLE ACROSS INDUSTRIES AND INSTITUTIONS, FUNDAMENTALLY CHANGING…


5 Tips for Successful Server Maintenance

By Brett Nordquist June 15, 2017 Few events bring a company together like a server outage.  When the Exchange Server would go down at Microsoft, our group would race towards…


10 ways to ruin a cybercriminal’s day

BY LUCAS PAUS Technology has changed the way we live, our relationships with others, and even how we take care of ourselves. These days, everyone – from the most inexperienced to…


Mobile security: The reality of malware … augmented

BY DENISE GIUSTO BILIĆ Originally, it was expected that mobile devices would evolve to become handheld computers with capabilities like any desktop. It is clear today that our smartphones and tablets…

Kate Fredrickson

Basic tips to avoid cybercrime

By Kate Frederickson, ISG Technology With people using the Internet for banking, shopping, socializing and everything in between, the risk of falling victim to a cybercrime scheme has never been more…


What to keep in mind when considering IT outsourcing

By Kate Fredrickson, ISG Technology Outsourcing IT needs is a good way for businesses to acquire the technical skills and resources they require without breaking the bank hiring in-house talent. Business…


Preventing Cyber Attacks in an Ever Changing Security Climate

By Miles Franz ISG Technology Cybercrime threatens businesses every minute of every day. These days, there’s no such thing as a typical target and all organizations are fair game. An increasingly…


The Evolution of the Text Message