Since it became the defacto norm for WIFI network security the WPA2 security setting has been the standard for almost every WIFI network setup.Read More
Office Document Strategies Blog
When first invented and popularized fax machines were seen as a wondrous invention. After all being able to send a piece of paper or even a whole document to someone in another office or even across the world over a phone line was pretty different than the norm at the time.Read More
The title of this blog is actually a quote from a client who brought his shredding and his old shredder into the Leppert office one day for shredding. His point was that his shredder was getting pretty long in the tooth and it didn't warrant repair so he thought he would just get it recycled along with his current need for shredding. While this is kind of funny as shown in the attached picture it actually reflects a significant trend in office operations that has been underway for many years.Read More
Again the world has had to deal with a range of attacks which involved ransomware but this time with a new twist.
According to an article published by CNET this latest attack included some action which was very poor as ransomware but which really held some serious threat as it ended in an attack which encrypted specific target computers.Read More
One of the big struggles that most businesses face is when a need for business process change is recognized the timing of implementation quickly becomes a problem and often either the change gets substantially delayed or no change is ever made.Read More
Internet access speeds are always an issue unless you are connected in a corporate environment which offers super fast fiber or other connection. For mobile users it never seems that connection speeds are quick enough.
Of course if you are depending upon a WiFi connection for your mobile device the issue becomes even more hit and miss.Read More
While the stories are continuing of the massive number of institutions and major businesses which have been affected world wide by the Wannacry Ransomware attack over the past few days there are a few trends which seem to be coming evident.Read More
There can almost never be enough said about how to keep IT networks secure from those who seem bent on creating problems by hacking or stealing information. The first line of defense for every operation is the password protection used by computer users to login to their workstations and applications.Read More
Business processes have long been paper dominated systems. Until the advent of computerized process systems some time ago everything that drove the operations of most businesses relied on pieces of paper to flow within and outside of a business for it to succeed.Read More
Most people know that mobile access to the Internet has been a major growth area of technology since the advent of smart phones. Of course much of this is accessing and posting to various hot social media sites, like Facebook, Instagram, twitter, etc.Read More