Ho Ho Ho…or OH NO! OH NO! OH NO!!! How to Avoid Holiday Cyber Criminals by dStringer

The first week of December has come and gone and most of us procrastinators are finally beginning to start our Christmas shopping.  Shopping on line has become so easy lately, that this year, on line sales are rivaling "Black Friday" sales.  In some cases, you can order as late as Christmas eve and have your gift delivered on time!  So simple and convenient.

Little Companies…Big Hacks…by dStringer

In musing about what I was going to write in today's blog, I turned on my T.V. to get my morning news fill and there it was...another hacking story.  "Well", I told myself.  "I've written about cyber security many times.  Do I write about it again"?


Why you should plan for BI wisely

Business Intelligence (BI) software has helped thousands of small and medium-sized businesses around the globe increase profits and improve efficiency. If you think your business will enjoy similar success by simply installing some software you are sorely mistaken. You must plan BI implementation wisely in order to see the results you want. Here are a […]


In today's "instant gratification" society — in which heightened customer expectations and 24x7 accessibility demands really burden small business — little time remains for much else. Small businesses often don't have the resources or inclination to track the latest computer news, security threats, or even common break/fix tips.


For the last two weeks, I have been using our social media postings to support Domestic Violence Awareness Month.  It became very clear to me last year, the tech world had a huge connection to the ugly reality of Domestic Violence, from the dark side of GPS usage to stalk victims, to the bright side of Safety Apps for quicker responses to a victim in crisis.

THE SKY IS FALLING…THE SKY IS FALLING…Four Easy Steps to Business Continuity by dStringer

For this week's posts on Social Media, I have been focusing on Business Continuity, yet again.  There are several reasons for this, the main being that Tuesday here in California was The Great California Shake Out-an observance developed by FEMA (Federal Emergency Management Agency) to remind California residents of the importance of earthquake preparedness.


The ever-evolving world of technology presents a very unique challenge to those of us presented with the stewardship of navigating corporations through the sometimes choppy waters of Cloud Computing and Cyber Security.  It is our job, primarily and most importantly, to put our corporate client's mind at ease.

“BEWARE OF THE WOLF IN SHEEP’S CLOTHING”…Further Exploration Into Social Engineering…by dStringer

Oh my goodness...!

Not too long ago, I wrote a "Social Engineering" blog that I thought was pretty detailed.  It discussed different types of "Social Engineering" in depth; warning signs and what steps to take if you feel you've been victimized.

It truly is the Wild West out there.

WE GOT YOUR BACK…by d Stringer

If you, or one of your staff has a little computer knowledge, you may think to yourself, "Why do I need to outsource my I.T. services?  I have that covered here..."

In this case, a little knowledge can be dangerous...

Truly, I compare this thought process to being brought up on criminal charges.


I don't normally open up an article with statistics...but the following are fascinating, I believe, and really speak loudly about current events in the world of cybersecurity...

Concern about identity theft rates slightly higher than fears of job and healthcare loss.