Connecting Point Blog

Welcome to the Connecting Point Blog

Blog

Security policies for your business

Businesses rarely address cybersecurity in their company policies. With cybercrimes becoming more prevalent, it's important you inform staff about the threats they could be exposed to. Make sure your business and employees are safe with these security policies.

What to consider before you buy a new PC

Purchasing a new computer can be a daunting task, especially if you’re not familiar with its components. You’ll want to make sure you make the right choice so you don’t end up buying one that becomes obsolete within just a few years. How much money should you spend? Which model is the best for you? What about the specifications? While there is no fixed formula when it comes to buying a new computer, these guidelines will help you make an informed decision.

4 must-know facts about the Cloud

Cloud computing has given companies affordable and flexible solutions to deal with rapidly advancing technological demands. However, for the small business owner, there are still many common misunderstandings about using cloud services. Here are a few things some businesses owners misunderstand about the cloud.

Quick review: why you need virtualization

With virtualization, you can make software see several distinct computers even if there is only one, or make several computers register as one supercomputer. That may sound simple, but it’s far from it. Of course the benefits are well worth it; here are just a few.

Features of Mobile Device Management in Healthcare

Just like other industries, healthcare providers are using mobile devices for doing work and communicating with practitioners, staff, and patients. Wireless networks and portable devices in the healthcare setting have their benefits, and the IT staff must have controls like Mobile Device Management (MDM) software to efficiently maintain and manage the security and privacy required by federal regulations.

Situations perfect for virtual desktops

Managing an office full of computers and mobile devices is a nightmare especially in regulated industries. But with a virtualized desktop infrastructure (VDI), employees can access all the features of a personal computer from almost any mobile device.

2018 Cyber Threat Report

As a managed IT services and solutions provider, it is critical that we align ourselves with the best vendors in the industry to deliver the level of service our clients trust us to deliver every single day. SonicWall is one of the most trusted names in IT security.

Virtualization: Common misconceptions

Small businesses can accomplish a lot by implementing virtualization technology on their office IT network. Unfortunately, many SMBs shy away from it because of some common misconceptions. If you fall into that category, there are at least four myths you should stop believing.

Professional Services Engineer

Reports To: Jesse Rosales

Location: Connecting Point, Greeley, CO

Status: Full Time, Exempt

Job Purpose and Position Overview:

Deploys new hardware, software and networking solutions to existing clients while adhering to industry and company best practices.