Blog

Tech Alert – QuickBooks, Emailing Forms

If you use Quickbooks built in webmail services option for sending invoices, paystubs or other forms via the 'Send Forms' function within the program, be advised of two recently reported issues: Issue Reported: 1) Emails sent from Quickbook no longer contain the...

read more

Network and Security Assessments

A security breach is an event that compromises a computer, data, application, network or other resource. Unauthorized access to your data may result in confidential information being viewed, stolen, or used for identity theft. Consider the following statistics: 60% of...

read more

Our Connected World – Yes, Your Business Is at Risk

As we wrap up National Cyber Security Awareness month, I continue to be amazed at the number of business owners and managers who think they will not be the target of a hacker, malware, or ransomware attack that results in a data breach. Let's first define the term...

read more

Arkansas Lighting Client Spotlight

Arkansas Lighting is a growing domestic manufacturing and distributing company located in Van Buren, AR. They specialize in decorative and energy efficient lighting primarily for the hospitality industry, multi-family and commercial applications, and government...

read more

Hosted Cloud Servers

When choosing a cloud based server, you are essentially renting a virtual server instead of purchasing an actual physical computer. This is also known as Infrastructure as a Service (IaaS). IaaS is one of three ‘layers’ in the Cloud Computing model. The three...

read more

Web Threat Best Practices

Modern web threats can infect your network, subvert systems into botnets or steal sensitive data. To meet these challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide...

read more