If you’ve had to make changes in the way you do business over the past several months, you’re not alone. We’ve entered into a new era for commerce, with companies embracing technology at a record pace. Interruptions in the supply chain, remote work, increased cybercrime – all of these factors are significant considerations for businesses of every size. For the small and midsize
If you’ve been considering outsourcing your IT to a Managed Services Provider (MSP), chances are you’ve done your due diligence in sorting out your options. Your web search probably returned numerous articles with titles along the lines of, “Questions to Ask a Managed Services Provider.” These articles are helpful in general, but often they don’t dig deeply enough into what you really
As part of a business continuity plan, a disaster recovery plan is critical to the health of your business. But it’s not enough to merely have a disaster recovery plan – you also need a disaster recovery checklist to make sure that plan is implemented.
Answer a simple question for me: How long can your business be disrupted before it becomes a problem? Depending on your business, your answer will hinge on several considerations. Customer service and profitability are usually the two biggest factors. If your business can’t afford downtime in the event of a disaster – and most can’t – you’ll need to establish a contingency
Cheap web hosting is like a pinata full of coleslaw – designed to look good until it breaks. You may have seen the ads on TV or in a sidebar of a blog: “Web Hosting for only $3.99* Per Month!” or “Unlimited Websites for One* Low price of 1¢*.” If you haven’t seen those ads, once you do a Google search for “Who
We’ve arrived at the cusp of another new year, and just like everyone else, we’d be remiss if we didn’t spend a little time looking back. In 2015, Lieberman Technologies talked about a lot of different subjects here on our blog, but probably none as important as the issues facing tech security. There are so many ways information can be compromised, both