Company Blog

BYOD & Mobile Device Management Solutions: What Businesses Need to Know

On June 29th, 2016, posted in: Mobile Device Mgmt by Comments Off on BYOD & Mobile Device Management Solutions: What Businesses Need to Know

Continuing our exploration on mobility in the workplace, today we are reviewing BYOD and the impact of mobile device management solutions on business security. Bring Your Own Device (BYOD) refers to the practice of employees conducting work-related activities on their own digital devices (smartphones, laptops, tablets, smart watches), both in and out of the office...

read more

What is Cloud-Based File Sharing and How Can It Help My Business?

On June 16th, 2016, posted in: Cloud Computing by Comments Off on What is Cloud-Based File Sharing and How Can It Help My Business?

Continuing our series on mobility in the workplace, this time, we’re taking a closer look at cloud-based file sharing to see how this rapidly growing technology can help your Milwaukee area business. The term ‘cloud-based file sharing’ sounds more intimidating than it really is. Simply put, this technology provides the business with a secure files..

read more

Office 365: What’s All the Buzz About?

On June 7th, 2016, posted in: small-business-IT by Comments Off on Office 365: What’s All the Buzz About?

In the coming months, we’ll be creating an in-depth summary of Office 365, but for now, we want to provide you with a general overview so you can get an understanding of what Office 365 is and how it can help your business. With the variety of Office 365 plans available, businesses often need clarification..

read more

The Top 7 Safety Apps to Keep your Kids Safe this Summer

On June 7th, 2016, posted in: Personal Tech Tips by Comments Off on The Top 7 Safety Apps to Keep your Kids Safe this Summer

If it’s not already here for your kids…it’s coming. School’s out for summer! Gone are the days of homework, after school activities and the mad rush of transporting your kids to and from school. The lazy days of summer are here and your kids are looking forward to long days at the beach, bike rides..

read more

How Can Remote Desktop & Server Access Revolutionize Your Business?

On May 25th, 2016, posted in: Cloud Computing by Comments Off on How Can Remote Desktop & Server Access Revolutionize Your Business?

A revolution in worker mobility is not coming, it’s already here. Whether working from home, on the road, or at work, employers and employees are embracing remote desktop access to get the job done anytime, anywhere. While you may be familiar with the concept of working remotely, the rapid changes in technology might leave you..

read more

7 Ways to Spring Clean Your Tech

On May 4th, 2016, posted in: Personal Tech Tips by Comments Off on 7 Ways to Spring Clean Your Tech

Spring is finally here. The birds are singing, flowers are blooming, and the weather is warming up. This is the perfect time to reevaluate your life, get fresh start and organize your digital life. From organizing photos to securing your computer, follow these 7 simple steps give your tech a clean sweep. 1) Back Up..

read more

Is Dropbox Secure? Is It Time To Drop Dropbox?

On May 4th, 2016, posted in: Security Threats by Comments Off on Is Dropbox Secure? Is It Time To Drop Dropbox?

Is Dropbox secure? We’ve previously covered the risk of Dropbox in the workplace. The risk is based upon which Dropbox plan you are utilizing. Due to rising data loss concerns and recent news of ransomware traveling via emailed Dropbox links, many Ontech customers are opting to prohibit Dropbox altogether in the workplace and move to OnCloud as..

read more

Build a Business Continuity Plan in Just 4 Steps

On May 4th, 2016, posted in: small-business-IT by Comments Off on Build a Business Continuity Plan in Just 4 Steps

Is your business continuity plan too complicated? Do you have a plan at all? First things first – what is business continuity and how is it different from disaster recovery? Often confused with disaster recovery, business continuity is a comprehensive approach involving strategic planning to ensure systems, processes and procedures remain functional in the event..

read more

Urgent: Badlock Vulnerability Discovered

On April 12th, 2016, posted in: Security Threats by Comments Off on Urgent: Badlock Vulnerability Discovered

There has been a critical security vulnerability discovered that affects all versions of Windows and Samba. Patches for this bug will be released TODAY, April 12th around 17:00 UTC or 12:00 p.m. Central Time. Security experts are calling this vulnerability Badlock.  Engineers at Microsoft and Samba are working together to get this problem fixed. At this..

read more

7 Network Security Solutions for Businesses: Where to Begin

On April 3rd, 2016, posted in: Security Threats by Comments Off on 7 Network Security Solutions for Businesses: Where to Begin

It’s difficult to ignore widespread media coverage of highly publicized cyber-attacks targeting large companies like Sony, Ashley Madison and even the US government. But it’s not only large organizations at risk; small and medium sized businesses are also vulnerable. In fact, recent statistics indicate more than 75% of companies are likely to become a target..

read more