<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=573132769549581&amp;ev=PageView&amp;noscript=1">

The IT Support Learning Hub

The most educational business technology blog for Southern California executives, featuring insider tips, articles, and videos on how to get the best IT results.

Blog Feature

IT Untangled

Data Backup and Data Storage Options for Small Businesses - IT Untangled

By: Brian Modrak
April 2nd, 2018

    True story: My friend came to me a while back, and she was somewhere between horribly sad and somewhat terrified. She looked like she was absolutely broken. It turned out that her laptop hard drive had died, and all of her first child's pictures were gone along with it.  She had downloaded the pictures from her camera to her laptop, and then erased the memory card on her camera… to make room for more photos of course. She never expected for the hard drive to fail. But really, most of us aren't planning these types of events. And, of course, they always seem to happen at the worst time. 

Read More

Share

Blog Feature

Executive Insights

A Month of Security and Compliance Inquiries

By: Marty Kaufman
March 30th, 2018

March has been all about IT security and compliance inquiries – and it’s a good thing. This month alone, there’s been over 2 million documented cases of data breaches and cyber attacks – and that’s just the ones that have been reported! It seems that cyber criminals have shifted their focus to ransomware and data breaches. Why? Well, the financial opportunity for hackers is enormous. There’s a general lack of security precautions being implemented and enforced throughout companies, leaving a ton of personal information and corporate data vulnerable to attacks.

Read More

Share

Learn how to develop an IT strategy book chapter

Do IT Right: It's Not About The Computers

Optimize your business's IT function, understand proper - and cost effective - IT staffing, and learn from the mistakes others have made.

Blog Feature

Ask An IT Guy

How Do I Secure My Network for Remote Users? - Ask an IT Guy

By: Ammon Becar
March 29th, 2018

  In early 2017, big players like Amazon and Apple both announced they would be adding remote roles to their work force. Billionaire Richard Branson noted, “flexible work is not just for low-level employees but should also be offered for positions higher up in the pipeline so that rising stars have flexible jobs to progress to" (cnbc.com).  The truth is, some form of remote work already exists in most industries. Think about techs in the field or on-call dispatch efforts. Anyone who works outside of your office could fall under the "remote" umbrella. 

Read More

Share

Blog Feature

The Cloud | Business Planning

3 Commonly Overlooked Realities of Moving to the Cloud

By: Peter O'Campo
March 27th, 2018

  A lot of small to mid-sized businesses have already made the plunge into Cloud Computing, or some form of Cloud services. For those of you currently thinking about it or planning for it, we'd like to give you a realistic view of what moving your business environment to the Cloud could mean. Unfortunately, it's not the most natural thing for your current business environment to transition to the Cloud. You'll need qualified support to get the process underway. Let’s look at some of the commonly overlooked factors of moving to the Cloud – specifically, how it will impact your employees.

Read More

Share

Blog Feature

Training

Free and Low Cost Microsoft Office Training Options

By: Courtney Casey
March 26th, 2018

  Employees have a wide range of skill sets, and the ability to use technology effectively isn’t always one of them. Business owners and managers frequently ask about the best ways to train employees on technology. Most of the time, they’re asking for basic Microsoft Office training. The good news is, there are a ton of free and low-cost training resources available.

Read More

Share

Blog Feature

Ask An IT Guy

When Should I Upgrade Old or Aging Hardware? - Ask an IT Guy

By: Ammon Becar
March 21st, 2018

  Upgrading aging hardware is a KEY function in keeping your IT infrastructure running as smoothly as possible. Aging hardware can be a daunting task to replace, especially when you're trying to find out exactly when it's time to do so.

Read More

Share

Blog Feature

Ask An IT Guy

Why Is My Network So Slow? Network Visibility Might Be the Answer

By: Corey Kaufman
March 19th, 2018

  Jumping right in, today we're going to chat about Network Visibility and some tools for your company to track down any culprits using up your resources. As an IT Guy, one of my least favorite things to hear is, "My network is slow." It seems like there is slowness abound these days. Everything we own connects to WiFi, and there never seems to be enough juice.  

Read More

Share

Blog Feature

Ask An IT Guy

Business File Backup Options: How Long Will It Take to Get My Data Back?

By: John Leete
March 9th, 2018

  The business world is cutthroat. Information is EVERYTHING. Without it, how would you serve your customers? Think about it, your client database, financial records, documents, or email… GONE. 99.9% of businesses need continuous access to their system to keep their business running smoothly. Your backup is the backbone of your company. It keeps your data safe from daily human error and disasters such as fires in extreme circumstances.

Read More

Share

Blog Feature

Strategic Technology Planning | Tightening IT Security

Cybersecurity & Risk Management Techniques for Small Business Managers

By: Peter O'Campo
March 7th, 2018

  Cybersecurity is much more than an IT problem these days - it's become a general business problem. Before we dive in, let's remember that cybersecurity is not just a topic for large corporations. It affects EVERYONE, especially those in the small to mid-size business (SMB) market. The revelation of the Meltdown and Spectre vulnerabilities reminds us that cybersecurity affects everybody, individuals and businesses alike. Statistics are pointing towards hackers focusing a lot of energy on SMBs this year. Why, you ask? Good question.

Read More

Share

Blog Feature

Tech Tips | The IT Help Desk

5 Password Policy Guidelines for Small to Mid-Size Businesses

By: Ryan Ziska
March 2nd, 2018

    Microsoft research shows that 90% of all compromised passwords come from a data breach. You read that right - 90%! Criminals use tools that can guess thousands of passwords a minute. Their goal is to wreak havoc on your network and steal your trade secrets. But, not all these criminals are hacking masterminds. These attacks can also be a result of a coworker or family member snooping around.

Read More

Share