Data Backup: Weighing Your Options

Back in September we took the first steps in developing a data backup plan.  We identified the data to be backed up, prioritized the recovery of the backed up data in case of a data loss event and created a retention policy.  Now we need to decide what we should backup to. With regards to […]

Read More...

Flexible IT Infrastructure, Because Businesses Change

Over time any business will face changing circumstances. Whether that means maturing to account for new growth, adapting to meet new regulatory requirements, or attempting to mitigate the risks from constantly changing new security threats, all businesses need to be able to meet the challenges presented by change. With the ubiquitous role that IT plays […]

Read More...

Data Backup: The First Step to a Disaster Recovery Plan

Data backup is defined as the copying and archiving of computer data so that it may be used to restore the original after a data loss event or recover data from an earlier point in time.  Backups are an integral part of your Disaster Recovery (DR) plan but by themselves should not be considered your […]

Read More...

Envision IT Partners: Windows 10 Recommendations

Microsoft’s FREE Windows 10 upgrade is scheduled to disappear after July 29, 2016.  With this in mind, we know that many of you are wondering if this is the time to take advantage of the free upgrade and make the move to Windows 10 now. Since its release Windows 10 has addressed many of the […]

Read More...

Cyber Security: Time to Review

Every year (and generally more often) organizations should be going over their cyber security plan and cyber security implementations thoroughly in order to ensure the plan and measures they have taken still align with organizational goals and requirements. It is not uncommon for businesses to change rapidly or for consumer requirements to alter to such […]

Read More...

You’ve Planned, Now it’s time to Implement

Having explored the topic of planning your organization’s cyber security approach through using a business centric model (performing a risk management analysis) the next step to take is to take action. When it comes to planning how your organization will deal with the cyber security problem your organization can have the best formulated plans, but […]

Read More...

You Want to Combat Cyber Crime? Start Planning.

We’ve gone over why you need to know about cyber security and what you need to ask…  Now let’s take a deeper dive into the first of 3 major steps your organization should be going through yearly, if not more often. The first step is focusing on the planning aspect of business risk management. Consider […]

Read More...

Shared Folders or SharePoint

Shared Folders or SharePoint: What’s best for me? by Chris Tsouris You’ve been using shared folders for years.  They are easy, simple and can even save you time by having no administrative or maintenance costs.  So what’s wrong with using shared folders? Essentially, there is nothing wrong with shared folders. Windows file sharing has been […]

Read More...

Questions You Need to Ask About Cyber Security

In many businesses cyber security is often a misunderstood topic. Given the current business climate, and the seemingly unending news of cyber security attacks and breaches, it sometimes seems strange that the simple question still needs to be asked: Why do you need to know about cyber security? Cyber security at its root is about […]

Read More...

Email Security: Why it’s so important!

Email security is incredibly important to any user on an Organization’s network because not only does it affect you, but if you fall victim to a hacker it can also affect everyone else in the organization whether that’s losing money, losing your job, being audited, identity theft, or even the closing of the company. So, […]

Read More...