Data Shakedown

Ransomware attacks becoming more frequent and more sophisticated, and aimed at manufacturing companies.

atlantic-it-ransomwareSecurity researchers and law enforcement officials say the spread of ransomware attacks has reached epidemic proportions, with organizations of all sizes in both the public and private sectors increasingly impacted by this insidious type of malware that encrypts valuable digital files and demands a ransom to decrypt them.

Read more

Relieving Password Headaches provides tools and techniques for making passwords easier to manage while improving security.

atlantic-it-passwordLast Friday, the accounting system required Dave to change his password since it had been more than 90 days since his last reset.

Read more

Smart MFPs

Latest multifunction devices enhance workflow automation with app integration and programmability.

atlantic-it-mfpBusinesses have pursued the promise of the “paperless office” for the past 40 years, but the reality is that companies of all sizes still rely heavily on printed materials.

Read more

Better Backup for Manufacturers

Cloud and virtualization-specific backup options help overcome the limitations of traditional solutions in manufacturing companies.

atlantic-it-backupData backup is arguably the most critical function in IT, but it continues to be a frustrating and problematic process for most organizations.

Read more

Technology Horizons – Vol. 12 # 1

While businesses need to manage expenses, a lower-cost solution isn’t always the best value. That’s particularly true when it comes to IT support. Cedar Hill Golf and Country Club decided to change IT providers based upon price, but returned to in less than a year.

Read more

Sticking with the Best

Cedar Hill Golf and Country Club decides to try another outsourced
IT provider — and quickly returns to Here’s why.

“The grass is always greener on the other side of the fence.”

It’s an old proverb that neatly sums up a truth about human nature.

Read more

The Art of Network Security

Security assessments can help organizations win the war against cyberattacks by identifying and remediating vulnerabilities.

“If you know your enemies and know yourself, you
can win a hundred battles without a single loss.”

–Sun Tzu, The Art of War

Sometime in the sixth century B.C., Chinese general Sun Tzu wrote one of the most successful books on military strategy.

Read more