It feels like we hear about data breaches and technology disasters on an almost daily basis. Target, Yahoo, Home Depot and Weebly are just some of the major players who have experienced data breaches or hacks in recent years. (If you’re curious about learning more about some of the larger data breaches that have occurred, check […]
How to Create an IT Strategy Plan that Increases Business Success
Can 60 minutes set your business on a continued path for growth and success? At HST, we believe it can. In 2012, a story ran on ABC News. Three Japanese tourists were visiting Australia. They set out to drive to North Stradbroke Island and mapped out their route on their GPS system. Unfortunately, the GPS […]
Three Reasons Data Backup Is Different From Disaster Recovery
This article is originally found on Forbes.com. Find the original post by JP Blaho here. Many companies that we engage mistakenly believe that their routine backup operations have them covered in an outage or disaster. I can’t tell you how many times I’ve heard a CIO say, “Our data is backed up via XYZ […]
A Tale of Two Systems: How to Prepare for Ransomware
A System on Lock Down Last November, the entire Romantik Seehotel Jaegerwirt hotel found themselves at the mercy of an anonymous group of thieves. Their electronic key card system failed. None of the 180 guests could access their rooms. Hotel staff knew that guests were likely to be upset and the 4-star hotel’s reputation was on […]
3 Simple Questions to Help Prepare for Disaster Recovery
“There is no short cut to achievement. Life requires thorough preparation.” – George Washington Carver What will your business do is faced with a disaster? A disaster could occur in the form of a large storm or flood. Or it could be something as simple as an employee losing an unsecured laptop with sensitive company […]
Mobile Device Security: 4 Dangerous New Threats
More and more people are using their mobile device for work. This means that attackers are constantly working to find new entry points and vulnerabilities. How Many New Vulnerabilities are There? Google’s Andriod operating system averaged 5,768 malware attacks DAILY over a 6 month period according to CYRENS 2013 security report, And today, 99% of new […]
4 Tips to Create a Successful BYOD Policy
With all the different mobile devices available these days, you know doubt have your favorites. I know I do. And many people (myself included) feel very strongly about their choices. But it’s not just about providing for individual preference. For many users, the more comfortable and familiar they feel with a particular device, the easier […]
10 Apps to Help You Keep Your New Year’s Resolutions
We all know how hard those New Year’s resolutions are to keep! It can be difficult to keep track of your progress and stay motivated as the year goes on. Never fear! Here are 10 great apps that can help you stick to your New Year’s resolutions. Not only can these apps make you more likely to keep […]
Understanding Your Options for IT Support
Data is what keeps our businesses running. It can take many forms depending on what type of business you have. But the fact is, if you lose access to your business data, you may very well lose your business. How can you best protect your businesses data? The first step is ensuring that you have the […]
7 Critical Characteristics to Demand from Your Remote Backup Service
The holiday season is here and what a busy time of year it is. For some companies, business speeds up, fueled by online sales for holiday gifts. For others, business slows down as employees take vacations and spend time celebrating with family and friends. Either way, we all know how hectic things can get. One […]