IT Security Policy: A Must Have

I know we all feel that we do our best when it comes to securing both the physical and tangible assets of our businesses. Most companies feel that by simply locking doors, controlling who has keys and alarm codes, changing passwords, and engaging in other basic...

The Power of Choice: Why I Choose HP

People always ask me what I do for a living, and the simple quick answer is “I work on computers”. But I’ve found over the years that it is a lot more than that. I get to help people with a part of their daily lives that is often full of challenge...

Observations In My First Year

This is my very first attempt at writing a blog, and I’ve been struggling to come up with something that readers might find interesting. After a few days of thinking, I thought maybe I could write something controversial, or maybe throw out some sort of Hot Sports...

Documenting Your Network – Part 4 of 5

The next two critical pieces of network documentation that you need to understand include the IT Recovery Guide and Business Process Analysis. IT Recovery Guide Now, this is not 12 steps for how IT recovers from drinking too much last night, but rather, the IT...

Wi-Fi: Control Required

It is very hard to go anywhere nowadays without running into a wireless hotspot. There are business and guest networks everywhere, some are free and some arefor a fee.  Last week, while on a Southwest Airlines flight back to Dallas from Greenville, South Carolina, I...