The Changing Face of Security Threats

IT Security Threats In today’s day and age, we find ourselves the subject of digital attack. As the time has changed technology from room sized computers doing math to the world in your hand held device, so has time changed the people and the technique they use to exploit these advancements. We used to have

By |May 15th, 2017|Categories: Denver IT|Comments Off on The Changing Face of Security Threats

Make a bootable USB flash drive to wipe an old hard drive

Make a bootable USB flash drive to wipe an old hard drive To use a USB to wipe an old hard drive on a Windows PC: Download the DBAN *.iso image from http://www.dban.org/download. Insert a USB flash drive with 32MB+ available space. Download the Universal USB-Installer, which converts the *.iso image to USB flash http://www.pendrivelinux.com/downloads/Universal-USB-Installer/Universal-USB-Installer-1.9.6.6.exe

By |September 26th, 2016|Categories: Tech Tips|Comments Off on Make a bootable USB flash drive to wipe an old hard drive

How to take a screenshot on your Mac

How to take a screenshot on your Mac To take a screenshot of your whole screen: Press Command (⌘)-Shift-3. Find the screenshot as a .png file on your desktop. You can take screenshots of your whole screen or just part of it. Screenshots are saved automatically as .png files on your desktop. To take a

By |September 26th, 2016|Categories: Tech Tips|Comments Off on How to take a screenshot on your Mac

Shadow Copy

Shadow Copy The Shadow Copy feature is often one of the most overlooked tools built into Windows Servers. Utilizing shadow copies allows files to be recovered in real time, without having to turn to a traditional backup solution like tapes, or even online backups. This does not mean that Shadow Copies should take the place

By |September 26th, 2016|Categories: Tech Tips|Comments Off on Shadow Copy

Importance of Keeping your firewall up to date

Importance of Keeping your firewall up to date Keeping your firewall up to date is the easiest way to protect your network and data. Aging firewalls present a security risk for your environment. A firewall that is 5 years old is typically 50% less effective at blocking attacks than a unit that is only 3

By |September 26th, 2016|Categories: Tech Tips|Comments Off on Importance of Keeping your firewall up to date

Turning the tables on technology performance

Turning the tables on technology performance Technology performance is typically touted as a conduit to better business processes. However, sometimes lost amid all the high-tech hoopla is a high-touch catalyst for performance excellence. It’s called action learning. Simply put, action learning is interactive training, that time-tested practice of learning by doing. No matter how robust

By |September 26th, 2016|Categories: Denver IT, IT Articles|Comments Off on Turning the tables on technology performance

Managed Services Promote Predictability in Tough Times

Managed Services Promote Predictability in Tough Times Managed services are a hot item in the IT world. Companies faced with downsizing their IT staffs are finding these competitively-priced, outsourced offerings very tempting. However, as with so many technology terms, "managed services" carries different meanings to different people. Pricing also varies considerably, depending on the scope

By |June 27th, 2016|Categories: Denver IT|Comments Off on Managed Services Promote Predictability in Tough Times

Denver IT Managed Services

Denver IT Managed Services With our IT managed services program, we can remotely monitor and remediate our clients' servers proactively. It gives us eyes on our clients servers every day, even if our engineers only visit weekly or monthly. Monitor servers 24 hours a day to prevent outages or interruptions Remotely remediate server issues without

By |June 27th, 2016|Categories: Denver IT|Comments Off on Denver IT Managed Services