Cloud

/Cloud
3 10, 2018

Effective Network Security!

By |2018-10-03T22:47:35+00:00October 3rd, 2018|

Effective Network Security  Computer security breaches are common, and several occur around the world every day. 43% of cyber attacks target small/medium businesses and within 60% of these companies go out of business within six months of a cyber attack. Whether you are a small or medium company, keeping your network [...]

18 09, 2018

More Productivity– No Compromises!

By |2018-09-18T23:22:08+00:00September 18th, 2018|

More Productivity-- No Compromises!  Employees today need to be able to work anywhere, from any device. The cloud enables the mobility users need, and cloud apps are a key part of today’s businesses. However, problems can arise when employees start forgetting passwords for multiple apps. Unsecured, unmonitored credentials create vulnerabilities [...]

4 09, 2018

Secure your front door!

By |2018-09-04T20:12:55+00:00September 4th, 2018|

Secure your front door with Microsoft 365!  Many customers are challenged by the need to enable user access from anywhere on any device while ensuring the security of valuable business data. Is this you? If so, can you answer “yes” to these questions? • Do you know who is accessing your [...]

4 09, 2018

Overview of Microsoft Enterprise Mobility + Security (EMS)

By |2018-09-04T15:17:48+00:00September 4th, 2018|

Overview of Microsoft Enterprise Mobility + Security (EMS) Microsoft’s Enterprise Mobility + Security, or better known as EMS, is a device-management and virtual-identity-management suite. In a cloud-based world where employees want to work from all their devices, Microsoft EMS allows IT maximum security and control. New product to Microsoft’s portfolio. [...]

30 07, 2018

2018 PC Professional Client Appreciation Event

By |2018-07-30T15:13:05+00:00July 30th, 2018|

Annual Battle of the Bay Event -- Friday, July 21st, 2019 PC Professional hosted its annual client appreciation event to introduce both existing clients and manufactures. The event was held at the Oakland Coliseum and included a tailgate party prior to the baseball game between the Oakland A’s and The [...]

7 06, 2018

Cloud Computing by Azure

By |2018-06-26T04:06:49+00:00June 7th, 2018|

  Cloud Computing: Azure Virtual Machines Overview Azure Virtual Machines (VM) is one of several types of on-demand, scalable computing resources that Azure offers. An Azure VM gives you the flexibility of virtualization without having to buy and maintain the physical hardware that runs it. However, you still need to [...]

1 06, 2018

Azure Site Recovery

By |2018-06-01T17:10:56+00:00June 1st, 2018|

  Azure Site Recovery  Azure Site Recovery helps protect the critical applications running in your datacenter with flexible recovery plans and low Recovery Point Objective’s/Recovery Time Objective’s RPOs/RTOs. As an organization, you need to adopt a business continuity and disaster recovery (BCDR) strategy that keeps your data safe, and your [...]

3 04, 2018

Office 365 Video Training

By |2018-04-04T22:10:56+00:00April 3rd, 2018|

Office 365 Video Training Ever wondered how to use a specific 365 service? We have been receiving questions on specific Office 365 products and thought we would share some free training videos. Microsoft provides many training opportunities to help you get started quickly, whether you are interested in product exploration [...]

20 02, 2018

Hot IT Topics of 2018

By |2018-03-14T22:16:53+00:00February 20th, 2018|

Hot IT Topics of 2018 Here’s a look at some of the most talked about IT products and services of the year. Security It seems like today’s data criminals have enhanced their efforts to get their hands onto your data. From viruses, malware and casual web browsing to ordinary email-based [...]

31 08, 2017

Ransomware Awareness

By |2018-03-07T17:21:44+00:00August 31st, 2017|

Ransomware Awareness What is Ransomware? How to Prevent It? How do we Recover? Ransomware, simply explained is a computer exploit where data is captured, encrypted, and held for ransom until a fee is paid. To understand the monumental threat that Ransomware presents, let’s examine the WannaCry event from May 2017. [...]