How did you survive the record set snow storm now referred to “Snowmageddon”?

femi1Hello everyone,
Welcome to the March, 2010 Newsletter.

As you know, we experienced a record high snowfall a few weeks ago. A lot of things happened that didn’t make it to the WTOP News coverage. One of those things was the unfortunate deaths of a number of elderly people when several neighborhoods lost power for three days – in fact one was right in our community.

snowAs an IT Services Provider, an additional concern I had was that the storm unnecessarily crippled thousands of businesses in the Washington DC area. Workers could not access their places of business due to the huge piles of snow at their work places, and the lack of adequate planning for remote access to their offices made the situation worse. Not even the Federal Government was exempt from closures. How can businesses plan, protect, and ensure that functionality stays on in times like these?

If you’re a business owner with fewer that 50 desktops and are wondering what you could have done differently, or would like to make sure that your business operation is not crippled by storms, fire, earthquakes, or even human error, contact me and my team. Our certified Information Technology professionals will show you ways you can save your business operations and get the peace of mind you deserve. Take a look at my recent white paper article about small business mobility and be ready for the next storm.

Understanding the Value of Managed Services

managed serviceMost small and medium businesses can’t afford the luxury of a qualified IT administrator, let alone an entire IT department. If you’re in this position, how do you maintain the information technology infrastructure that’s critical to your organization?

Learn more…


SaaS: An Overview

SaaSThe growing reach and power of the internet has changed the way people do business, with more and more web-based services popping up. One of these is SaaS.

SaaS stands for Software as a Service, which refers to any licensed software being “rented” to a company by another company on an as-needed basis.

Learn more…


Manage and Collect Data Better with FormSpring

formspringFor businesses of all types and size, managing data online is critical to the smooth operation of a website. However, incorporating data collection programs can be time consuming, especially if any of your data is “time bound” – meaning it’s only valid and useful during a specific period of time.

Learn more…


How to handle Suspicious E-mail

mailingPhishing, pronounced “fishing,” is a type of online identity theft that uses e-mail and fraudulent Web sites that are designed to steal your personal data or information such as credit card numbers, passwords, account data, or other information. Follow these guidelines to help protect yourself from phishing scams sent through e-mail.

Read more

Published with permission from TechAdvisory.org. Source.

What to do if you’ve responded to a phishing scam

securityIf you suspect that you’ve responded to a phishing scam with personal or financial information or entered this information into a fake Web site, take these steps to minimize any damage.

Read more

Published with permission from TechAdvisory.org. Source.

cartoon