View Post

5 Reasons to Deploy SharePoint (and 2 Major Pitfalls to Avoid!)

We’ve all been jumping on the cloud train and learning how to use its resources to help our businesses.  Many companies started with easy workloads, migrating email services to Office 365 or moving development servers to public cloud spaces.  As these workloads have moved, organizations are figuring out what’s next. And the answer is startling: companies are achieving incredible savings and benefits — such as greater control in storing documents, …

View Post

New Stats That Prove Email Phishing is Still a Top Security Risk

It sounds bold, claiming that phishing is 2018’s #1 security risk to businesses. It can’t possibly be true; this simple email trick that has been around for ages can’t really be wrecking that much havoc.   But that’s where naiveté becomes our greatest weakness. And we know what they say about assumptions.   If you don’t believe it, here are a few …

View Post

Lack of Mobile Security Could Put Your Company in Danger

You know computer and network security is essential. There are many threats that could impact your business, but mobile security is often overlooked by SMBs. Whether retrieving emails or accessing sensitive data stored in the cloud, using unsecured mobile devices can have catastrophic consequences. Before mobile devices became prevalent, you could use locked rooms or secured vaults to protect important …

View Post

The Next Big Thing for Your Business Is….

At Applied Tech, we aren’t satisfied with being the guys who “keep the lights on” in your IT department. We are always looking at “business as usual” and seeing what could use some improvement. With the speed technology changes it is always important to have a guide to show you where the “Next Big Thing” is, and how it can …

View Post

How a Preventable IT Issue Turned Catastrophic

According to research by the Business Continuity Institute, cyber-attacks, data breaches and unplanned IT outages are once again the top three threats perceived by businesses. Consider the following scenario. It’s Tuesday afternoon at a busy manufacturing company. Close to 150 employees are answering emails, responding to clients and reviewing reports. Suddenly, the email server malfunctions. The internal IT person tries …