Blog

Subscribe to Our Blog

3 Minute Read

Two Steps to Assess your Cybersecurity Posture

It’s October, which means leaves are changing, pumpkin spice is being doled out with reckless abandon and your household has probably already eaten two bags of candy that were supposed to be for...

Posted by

Read More
1 Minute Read

Cybersecurity Month is Over. What Now?

As we all know by now, October was cybersecurity month. That means that, every year, we dedicate 31 days to cybersecurity awareness. And, in those 31 days, you probably received and/or read an influx...

Posted by

Read More
2 Minute Read

Why You Should Establish a BYOD Policy for Your Business

Progress. If you’re in the business world, you know that how much you make—and how quickly you make it—is often the barometer for success. That doesn’t mean it’s the only way to measure success, but...

Posted by

Read More
2 Minute Read

Easily Accept Credit Card Payments in FileMaker with Stripe

This year, at the 2016 annual FileMaker Developer’s conference (DevCon), I presented a session titled E-Payments in FileMaker apps. One of the most popular portions of my session was demonstrating...

Posted by

Read More
4 Minute Read

Simplifying SharePoint Governance

I work with a lot of SharePoint clients, so I’ve seen sites that were well-governed and others that look like the wild west. SharePoint is a platform that can do a lot of different “stuff,” but a...

Posted by

Read More
4 Minute Read

Four Reasons Help Desks Fail

As part of a managed services provider (MSP) community, I know firsthand that there are many quality help desks out there. The common challenge, however, is that there are many moving parts to...

Posted by

Read More