5 Best Security Practices

Smart Security Practices  Know you weaknesses The first step to good security on your computer is to know where your weaknesses are and hot to correct them or fix any of the damage they might have caused. There are many avenues that can cause weaknesses including unused services on your computer that can still connect …

5 Best Security Practices Read More »

Creating Good Passwords

Protecting everything you lock with a good password is when you use length and complexity (mix of letters, numbers, symbols, and capitals). A six character password has been shown to be able to be cracked in under 13 minutes, but even a ten character password would  currently take 900 years to crack with our latest …

Creating Good Passwords Read More »

Make a bootable USB flash drive to wipe an old hard drive

Make a bootable USB flash drive to wipe an old hard drive To use a USB to wipe an old hard drive on a Windows PC: Download the DBAN *.iso image from http://www.dban.org/download. Insert a USB flash drive with 32MB+ available space. Download the Universal USB-Installer, which converts the *.iso image to USB flash http://www.pendrivelinux.com/downloads/Universal-USB-Installer/Universal-USB-Installer-1.9.6.6.exe …

Make a bootable USB flash drive to wipe an old hard drive Read More »

Shadow Copy

Shadow Copy The Shadow Copy feature is often one of the most overlooked tools built into Windows Servers. Utilizing shadow copies allows files to be recovered in real time, without having to turn to a traditional backup solution like tapes, or even online backups. This does not mean that Shadow Copies should take the place …

Shadow Copy Read More »

Turning the tables on technology performance

Turning the tables on technology performance Technology performance is typically touted as a conduit to better business processes. However, sometimes lost amid all the high-tech hoopla is a high-touch catalyst for performance excellence. It’s called action learning. Simply put, action learning is interactive training, that time-tested practice of learning by doing. No matter how robust …

Turning the tables on technology performance Read More »

Denver Managed Services

Denver Managed Services In the old days, managed services often referred to nothing more than a help desk that would take over control of your workstation while you leaned back and watched. Nowadays, we have the ability to monitor the health and performance of your entire network, and if we spot a potential problem, we …

Denver Managed Services Read More »

Managed Services Promote Predictability in Tough Times

Managed Services Promote Predictability in Tough Times Managed services are a hot item in the IT world. Companies faced with downsizing their IT staffs are finding these competitively-priced, outsourced offerings very tempting. However, as with so many technology terms, “managed services” carries different meanings to different people. Pricing also varies considerably, depending on the scope …

Managed Services Promote Predictability in Tough Times Read More »

FREE – Risk Assessment

Identify your organization’s risks and receive guidance on how to mitigate those risks – FREE!

Learn more >

Scroll to Top