Page 2 of 9

Donuts and Cyber Security

We all have a guy in our office who is willing to believe anything – especially in his email inbox. He sits at his desk every morning, with his daily donut, and opens every email and subsequently clicks on everything, then, proclaims his findings to anyone within earshot. You know exactly who I’m talking about – don’t you? Well, that guy is a hacker. Not in the traditional sense, but he’s still going to cause your business a giant headache. Most small to... Read More
at Wednesday, February 7, 2018
Share |

Networking for a New Job

In the current job market, most people rely on the help of others to find their next position. If you find yourself job hunting, here are a few tips to maximize your networking. People When you begin the process, you should know the line of you’re interested in pursuing. Then, contact people you know in your personal and professional network and ask for 5 minutes of their time. Tell them about your employment intentions, and set up a time for an in-person meeting or phone... Read More
Posted by Scott Strickland at Tuesday, January 16, 2018
Share |

15+ Tech Toys to add to your Holiday Wish List

The holiday season is upon us which means you're hunting for the perfect gift for everyone on your list. In anticipation, the ProTech team put together their technology wish list - here's what we're asking for this year.  Home Automation Systems Who doesn't want their heat, AC, doors and lights to be controlled via voice command? Just make sure you securely link your devices to avoid hackers and DDoS attacks. Voice... Read More
at Wednesday, November 15, 2017
Share |

Should You Refresh Your Hardware?

In today’s world, where cloud solutions seem to be the future, it is still important to maintain and upgrade your hardware infrastructure. These devices are used for day-to-day operations and are essential to your business. There is a point when your computer’s hardware becomes obsolete, end of life, or end of support. This basically means the device is unable to perform efficiently or lacks the support needed to maintain a secure environment. Being proactive in the replacement... Read More
at Tuesday, November 7, 2017
Share |

10 Focus Areas for Cyber Security

October is National Cyber Security Awareness Month. But, at ProTech, we’re thinking about cyber security all year and you should be too. The goal of Homeland Security’s National Cyber Security Awareness Month is to engage and educate the public through events and initiatives that raise awareness about the importance of cybersecurity. At ProTech we know that cyber security is becoming more important for businesses of all sizes, so we provide services that address... Read More
at Wednesday, October 18, 2017
Share |

Technology's Influence in the Finance and Accounting Industry

As the world continues to thrive on technological innovation, nearly every industry is becoming further entrenched in the digital age. Even traditional fields such as finance and accounting are not immune to change. In a study from Ernst & Young, 58 percent of finance leaders are focused on combining leading-edge technologies with process improvement. Furthermore, where organizations once relied on their IT leaders to drive these changes, CFO’s are now reporting their increased... Read More
Posted by Rebecca Plough at Tuesday, September 19, 2017
Share |

Maintaining HIPAA Compliance in your Technology Environment

Most medical offices run electronically, from patient medical forms to digital dental records, computers have a huge impact on medical practices. With the advancement of technology, it is a necessity to maintain HIPAA compliance, and often time that requires the expertise of a trusted technology provider. What is HIPAA Compliancy and how does it affect your practice? HIPAA, the Health Insurance Portability and Accountability Act, sets the standards for the protection of patient data.... Read More
at Monday, August 28, 2017
Share |

Do You Know Your Vital Numbers When it Comes to Security?

Understanding Your Security Stats Helps Drive Your Technology It seems like everybody these days is tracking their health status with wearable tech — weight, daily steps, heart rate, and so on. These stats, along with other indicators like blood pressure and cholesterol, give the user an idea of personal health. But how many business owners know the vital numbers for their company’s security? Just like with personal health, businesses have a “security score” that... Read More
at Tuesday, August 22, 2017
Share |

6 Ways to Make the Most of Your Talent Agency Partnership

Finding and hiring the right person for a job may sound easy, but it can be a time-consuming process. In today’s job market candidates have an advantage in the process. That’s why many companies are turning to outside staffing agencies to pre-screen and qualify candidates. But like any relationship, communication is key and obstacles will arise so it’s important to find the right talent agency for your needs. Here are some helpful tips to ensure your experience is great:... Read More
Posted by Nancye Claxton at Wednesday, August 16, 2017
Share |

How to Recognize and Avoid Phishing Attacks

Phishing is the most common entry point for ransomware and malware. In order to avoid falling victim to an attack, you first need to understand the various types of phishing attempts and how to quickly and easily recognize them.  Infographic obtained from: Read More
at Wednesday, August 9, 2017
Share |