Connecting Point Blog

Get the latest company updates, technology news, and expert advice

Blog

Monitoring your employees online: Is it a good idea?

The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we […]

Prevent hackers from stealing healthcare data

Advances in IT have transformed paper medical records into digital files that can easily be accessed and stored. Sadly, this development has also resulted in sensitive healthcare data, or personal health information (PHI), becoming a bigger target for hackers. Because of this, healthcare providers must remain vigilant against all forms of cyberattacks. From financial information […]

Cut your IT costs by investing in thin and zero clients

Cutting costs is great for business, but only if doing so does not result in lower-quality products or services. You can achieve this kind of compromise in your IT system, too. Instead of investing in expensive computer hardware, you can opt for affordable but powerful thin and zero clients. What are thin and zero clients? […]

What you need to know about HTTPS

Most people don’t question the padlock icon that sometimes appears in their web browser’s address bar. If you’re one of those who didn’t know, it’s a security feature that authenticates websites and protects the information users submit to them. Another indicator you’re in a secure site is the HTTP before the site’s URL. But why […]

New Android malware detected!

If you have an Android device, be careful! An exceptionally dangerous Android malware known as DEFENSOR ID is currently making the rounds in the Google Play Store. The malware exploits the Accessibility Services in an Android device to evade detection by traditional security measures. This threat can put your data and business in jeopardy, so […]

Congratulations to John Latham!

John is our NOC Manager and is responsible for the deployment and operation of our network management and security tools that are deployed across our client networks. John recently graduated from Colorado State University with his Masters in Information Technology Management.

Spotty home Wi-Fi? Try wireless repeaters and access points

Residential Wi-Fi connections are slower and less reliable than enterprise-grade ones. But now that more people have shifted to remote work, having a fast and stable wireless connection at home is more important than ever. What can you do to ensure you don’t suffer dropped Wi-Fi signals while you’re in a videoconference or finishing up […]

5 Ways to Give Your Business Flexibility Without Sacrificing IT Security

According to a Global Work-from-Home Experience Survey, it’s estimated that 25-30% of the nation’s workforce will be working from home on a multiple-days-a-week basis by the end of 2021. As businesses are adjusting to this new reality, it’s important to have a technology strategy that allows businesses to be agile while maintaining the high level of security you need in your network.

Should you adopt the cloud during COVID-19?

With the COVID-19 pandemic, many business owners are cutting costs and jeopardizing their organization’s efficiency as a result. If you want to avoid this outcome, you should invest in cloud technology. The cloud will not just help you save money, but it will also help your business run more efficiently. Ensuring continuity and efficiency with […]

Set up a productive, efficient, and secure remote team that can help you run your business anywhere. Download our free eBook today to learn how!Download here
+