Is Your Business Ready for Tablet Computing?

Much has been said about the launch of Apple’s long awaited, new mobile device. Called the Apple iPad, the device promises to boost sales of a new category of computing devices called tablets. What are tablets? Tablets or tablet PCs are not new, and the concept itself...

Hackers Target Email, Blogs, Social Networking Sites

In a report by security firm Websense, an alarming rise in the growth of malicious websites was identified in 2009 as compared to 2008 – almost 225 percent. The study also found an increased focus among hackers and spammers on targeting social media sites such as...

How to handle Suspicious E-mail

Phishing, pronounced “fishing,” is a type of online identity theft that uses e-mail and fraudulent Web sites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. Follow these...

Understanding the Value of Managed Services

Most small and medium businesses can’t afford the luxury of a qualified IT administrator, let alone an entire IT department. If you’re in this position, how do you maintain the information technology infrastructure that’s critical to your organization? One option is...