Author Archive

New Study Finds Men Overcompensate…When Describing Their Computer Repair Skills

Written by Tiffiny Hladczuk. Posted in ITS Blog

computer repair technicians A new survey reveals that the men in your life who say they are skilled computer repair technicians might not be as good as they think they are at fixing computers.

According to a November 17 CNet article, a study that examined 1,001 men and women between the ages of 35 and 70 found that approximately 46% of men say they are confident or very confident about their knowledge of computer repair tips and tricks. In contrast, only 27% of the women surveyed were equally sure of themselves.

The portion of men who felt confident in their computer and laptop repair abilities doesn’t quite stack up to the fact that an astonishing more than 90% of the men surveyed didn’t recognize that increasing their computer’s memory or RAM would likely solve their computer problems. Insufficient memory is one of the leading causes of lagging, slow computers.

“While nearly half of all men feel confident when it comes to fixing their computers, a large majority can’t identify the best way to fix the problem,” said of the study. “Even though insufficient memory is one of the most common reasons a computer runs slowly, only 8% of men attributed it as such.”

A similar amount of women, about 90%, were also unable to identify that memory deficiency was the likely reason for a slow-running computer — but at least they knew they didn’t know how to fix the problem.

So the next time any of the men in your life tell you they know just as much about computers as any computer repair technicians, take their boasts with a grain of salt. It may just be better to keep your computer running in top condition with advanced computer services from a computer support company.

Do you agree with this study’s findings? Do you know anyone who boasts about their non-existent computer repair skills? Share with us by leaving a comment below.

Why the Biggest Threat to Your Company’s Network Security Could Be Coming From Within

Written by Tiffiny Hladczuk. Posted in ITS Blog

network security systemsDespite all the network security systems and IT consulting services your company invests in, there might not be much to stand in the way of the latest threat to network security management.

Because according to the Department of Homeland Security, your biggest network security threat won’t be coming from an external source — it will likely be from angered, disgruntled current and former employees.

According to VentureBeat, both the FBI and the Department of Homeland Security are warning companies against potential hacks from these employees, especially former workers who still have the login information needed to access their former employer’s networks and servers.

These workers are able to access their employers’ networks and server information with the increasing availability of cloud computing resources, which lets them hack into a server from a remote location. Companies hacked by their current and former employees have had losses ranging from $5,000 to more than $3 million, Bloomberg reports.

“There has been an increase in computer network exploitation and disruption by disgruntled former employees,” the FBI’s public service announcement reads. “The FBI and DHS assess that disgruntled and former employees pose a significant cyber threat to US businesses due to their authorized access to sensitive information and the networks businesses rely on.”

Studies confirm the major threat that these employees, both current and former, have to any business’ network security systems. Approximately 57% of all small businesses have reported an internal, staff-related cyber breach within the last few years.

How can businesses protect themselves against their own employees? The answer lies in being more vigilant of one’s own network security systems, and staffing network security specialists to monitor any possible cyber breaches. With the assistance of an IT compliance firm, it’s possible to help keep a business’ network safe from being breached from an internal source.

What do you think about the FBI and Department of Homeland Security’s warning? Share your thoughts with us in the comments below.

How to Establish and Maintain a Successful Partnership Between Your Business and its IT Consulting Firm

Written by Tiffiny Hladczuk. Posted in ITS Blog

onsite computer servicesInvesting in an IT consulting or IT compliance service for your business is a great way to ensure your onsite technology is running as efficiently and effectively as it should be.

But how can you tell if the onsite computer services your IT firm is providing are streamlining and improving your business’ technology like they should be?

Experts typically advise businesses to choose an IT or onsite computer services provider according to both the current and future needs of your business.

“IT buyers should be looking for a solution provider that can do everything,” Beau Perna, senior manager for configuration services at CDW, explained in a recent BizTech article. “Enterprises shouldn’t have to go to one vendor for telecom and another vendor for onsite implementation and design and another vendor for configuration. Instead, they should look for somebody that can provide a turnkey, all-inclusive solution.”

Another important thing to consider when working with your business’ IT consulting firm is the level of security they can add to your network.

Advanced computer services such as enhancing your business’ network security systems with security auditing and penetration testing is a necessity these days. This is especially true when data breaches are increasingly common and 75% to 80% of these breaches stem from an internal source.

Lastly, you should choose an IT service provider based on its ability to be productive and time-efficient with the services it delivers to your business. According to BizTech, an ideal IT firm should be able to provide almost 4,000 configurations to your technology and network each day.

Ultimately, your choice of an IT service provider will determine how well your business’ technology runs on a day to day basis. And when you work with your IT servicer in a partnership, you can benefit from a streamlined, highly-effective relationship.

How did your business choose its onsite computer services provider? Share with us in the comments.

JPMorgan’s Data Breach to Affect 76 Million Households, Prompting Doubts Over Network Security

Written by Tiffiny Hladczuk. Posted in ITS Blog

network security systemsJPMorgan Chase has become the latest major corporate entity to suffer a cyberattack that has exposed the personal information and data of as many as 76 million households and 7 million small businesses across America.

According to the New York Times, JPMorgan announced last week that the data breach took place over the summer. The news, which follows similar massive data leaks at Target and Home Depot, continues to erode many consumers’ confidence in the effectiveness of network security systems at large corporations.

JPMorgan’s data breach stands apart from similar breaches at retail companies, however — as the country’s largest bank, JPMorgan’s databases contain their customer’s private banking information such as account numbers, passwords and Social Security numbers.

In its statement, JPMorgan maintained that their customers’ sensitive banking details were not compromised in the data breach of their network security systems, according to the New York Times.

Yet the information that was exposed — customers’ addresses, phone numbers and other information — could still allow hackers to steal their identities. At press time, JPMorgan stated it has detected no evidence of customer fraud in its system.

How are the nation’s largest corporations — companies that undoubtedly have the budget required to invest in high-security and advanced computer services — still falling victim to these data breaches?

“We’ve migrated so much of our economy to computer networks because they are faster and more efficient, but there are side effects,” Dan Kaminsky, a researcher and network security specialist at White Ops, a network security management company, said.

According to the New York Times, JPMorgan’s hackers operated from overseas. They somehow obtained a “road map” of JPMorgan’s computer applications and programs, a list of computer services the company uses. The hackers then crosschecked this list with known weaknesses in the programs to find a way in to the bank’s databases.

The cyberattack reveals much about the weakness that even the largest financial entities possess against computer hackers — and does little to improve consumer wariness of how secure their data may be.

Charleston South Carolina 2014 Regional Economic Scorecard – Advancing Information Technology City

Written by Tiffiny Hladczuk. Posted in ITS Blog

Information Technology Sticky Notes Sun

2014 Regional Economic Scorecard

From Source: –

The Charleston Regional Development Alliance partnered with the Charleston Metro Chamber of Commerce to produce the 2014 Regional Economic Scorecard for the community.

“It is intended to be a resource; to guide & inform discussions by local leaders regarding strategies for building a globally competitive economy now and into the future.”

The Chamber’s Center for Business Research facilitated the research & analyzed the data, which was primarily sourced through the Charleston Regional Competitiveness Center.  The Lowcountry Graduate Center and the Riley Center for Livable Communities at the College of Charleston provided the academic lens.

Highlighting data captured from 2005 to 2013, the 2014 Scorecard uses data to measure how our market is performing compared to six similar communities in the Southeast and two leading economies of Austin and Raleigh.

Want to talk about the Economic Scorecard? Click here to join the conversation.

Economic Scorecard Advocacy Action Plan

Click here to download a PDF Version – Charleston Economic Scorecard