You’ve seen it in the news, in the paper, and on social media. Cyber security has been a hot topic and will continue to be as we inch our way into 2019. Security breaches are costing businesses millions, and the threat is continuing to grow. A common misconception about security breaches is that they only affect large businesses. People tend to think that small businesses aren’t at risk for breaches because they don’t have the kind of information that hackers want. According to Verizon, “58% of (breach) victims are categorized as small businesses.” The thought of your business’ data being compromised can be scary, but there are steps that you can take to protect your business.Continue Reading
As you know, choosing the right infrastructure to manage your data is an essential ingredient to your success as an IT director and to the business. You may be still weighing your options for transitioning to the cloud or upgrading your existing cloud services because of lingering security issues or concerns over legacy application availability. If this is you, then here are some of the many benefits that the cloud offers to help you make that decision.Continue Reading
Top Ten Data Breaches of 2015Continue Reading
If you’re considering upgrading to an IP video camera system, now is a great time to do so. With the increase of workplace-related crimes and malicious incidents on the rise, remote video monitoring is an ideal way for your organization’s security team to keep track of the facility. Today’s wireless video and tracking systems are getting not only smarter, but also cheaper. With that said, let’s take a look at the top 5 video surveillance trends and features.Continue Reading
Advances in Managed Services and IT InfrastructureContinue Reading
Over the years we've spoken with many IT teams that were tired of babysitting backups, replications, restore jobs, testing, and the remediation of all of these chores. At CMA we've worked with all of the tools - often several in the same datacenter. Some are better at physical, others are good for that one app you can't get rid of, and then there's the HA or DR tool colliding with the backup you finally got to work. How can you accomplish reliable data protection on shrinking budgets, constrained technical staff, and the increasing importance of technology in your organization? Our solution is to consolidate with Veeam Availability Suite.Continue Reading
Small businesses often struggle with the best way to fulfill roles that are neither profit-generating nor related directly to business operations. Often these roles include finance/accounting, marketing and information technology (IT). In the earliest stages, the company owner or one of its first employees may undertake these tasks. With a mindset of “we all wear many hats” and do what it takes to help the fledgling business survive and grow, the impact of this cobbled-together approach is minimal: bills will get paid, invoices are sent out, computers are ordered and repairs undertaken… and through trial-and-error, these business essentials are maintained.
But then the company grows. Additional employees are hired, and larger projects are undertaken. More clients or customers mean everyone is busy keeping up, and these support roles may fall to the wayside.Continue Reading
The quantity of data that every company faces is growing exponentially each year. In fact, a modern interpretation of Moore’s Law states that computing efficiency doubles every 18 months. (Source: MIT Technology Review)
Whether or not technology continues to advance at this break-neck pace, businesses are constantly struggling with how best to keep up with frequent updates to hardware and software, and how to nimbly and efficiently manage their data, devices and users.Continue Reading
There’s always going to be someone in a company who takes it upon himself or herself to get involved with managed IT services. When those duties become part of that person’s job description, say Director of IT, that’s just perfect. Forget we said a word and continue with your business.
But, what’s more likely to happen is that fixing the system, tweaking the network or chasing a bug, takes someone away from their regular duties, and it may not necessarily be their full-time position. We can hear the muttering now – “If I wanted to work in IT all day, I’d still be doing it.”
According to this handy infographic from CMA Technology Solutions, you’ve now become an “Involuntary IT Manager,” a position that comes with all the headaches and none of the glory of an actual IT manager.Continue Reading