ThrottleNet Inc. Blog

 

ThrottleNet's Articles

Business Lessons Learned from the Sony Hack Attack

By George Rosenthal

The hack attack on Sony has been a business disaster for the movie company.

In addition to leaked emails, revelation of salary data, and unfortunate disclosure of various private opinions regarding movie stars and upcoming films, the company’s stock price fell by double digits. 

ThrottleNet's Top 10 Tech Gifts Under $100

top-10-tech-gifts-under-$100-santaGreat technology is becoming more affordable, and that’s a great sign, considering everyone on your list wants the latest and greatest gadgetry available.

ThrottleNet has compiled a list of 10 affordable tech gifts available for under $100. Spread some holiday cheer and give the gift of technology this year, by considering any of our top 10 tech gifts under $100 available through various retailors.  

Understanding the Economics of IT

Are you confused about how much you should spend annually on IT? Does your budget allocate too much or too little for IT support?  

In part one of a two-part series, Eric Aguado, a partner with ThrottleNet, appeared on TNtv to discuss how a business can create a baseline to plan for annual IT expenditures.

Aguado cited a study from Gartner, the large research firm, which released a report called Gartner IT Metrics Data. The survey details by industry the percentage of annual revenue a company spends on tech support.

Will Chip Technology Really Make Your Credit Card More Secure?

By George Rosenthal

The government is promising to make your credit cards more secure. In fact they are going to require that every card have an embedded chip built-in by fall of 2015.

The goal is provide better security than the old swiping method and hopefully avoid the problems of fraud caused by hackers at Target and other retailers. 

The old swipe machines will eventually be laid to rest...

Put Down the Shovel and Stop Digging IT Holes

Are you married to the old ways of managing your technology even though new solutions can improve performance while saving you time and money?

Mike Heil, a partner with ThrottleNet, appeared on TNtv to discuss the mistakes business owners make by continuing to throw dollars at the same old, out-dated technology. 

Heil said there are four reasons why business owners continue to dig themselves deeper into an IT hole.

These include…

Bring Your Own Device Security Risks & BYOD Policy: Making It Work for Your Business

bring your own deviceTechnology is making Bring-Your-Own Device (BYOD) a part of everyday office life. More and more companies are allowing BYOD, and many of those companies are actually encouraging employees to bring their personal smartphones and tablets to the office.

A BYOD policy isn’t an employer giving their employees permission to waste away the day playing Angry Birds, or kick back and watch the big game like the kangaroo in the Dish Network commercial. Bring-your-own-device is a privilege for many employees and companies expect their employees to use their devices for work-related activities.

There is a huge trust factor that goes into BYOD, and it’s not only related to keeping employees engaged and focused on the task at hand. Bring your own device security issues are another factor to consider.

Securing the Internet of Things

securing the internet of thingsThe “Internet of things,” or IoT for short, is quickly becoming a commonly used phrase by folks in the technology world. It’s a buzzword that relates to everyday objects that we wouldn’t normally expect to be connected to the Internet becoming well…connected to the Internet.

There are so many cool, somewhat bizarre, but also, very intriguing objects out there that have fallen under this general umbrella called the Internet of Things that have become connected.

Now, cars, thermostats, wristbands, watches and refrigerators are all online – and more and more devices are finding ways to utilize the Internet.

The Internet of Things is great. It’s trendy, it’s a phenomenon, and in many cases, the Internet of Things makes our lives easier, helping us accomplish tasks quickly and efficiently using “things” that can receive data and process commands from a remote location. Who hasn’t wanted a refrigerator that tells you you’re running low on ice cream? Did you even know a refrigerator could do that? Well, now you do, and you want one, now.

Just like computers, things connected to the Internet need to be secure. As the Internet of things continues to evolve, Internet of things security is something we have to become more and more aware of.  We’ve seen machines attack before in the movies, after all.

When It Comes to your IT Guy Don’t Settle for a Jack of All Trades

Is your IT person a jack of all trades but a master of none of them?

Kevin Banks, Virtual Chief Information Officer (VCIO) with ThrottleNet, appeared on TNtv to discuss the mistakes business owners make by entrusting anything and everything related to technology to just one person.

Many companies make the mistake of...

Three Scary Network Killers

Are you aware of the three scariest concerns that could bring down your computer network?

Todd Budde, Virtual Chief Information Officer (VCIO) with ThrottleNet appeared on TNtv to discuss the three most harmful scenarios he has seen that can quickly turn your IT network into a total disaster. 

The three include...

Virus Protection: Do I Need An Anti-Virus Solution For My Business?

do i need an anti virus solution?Some small businesses think they can get away without utilizing virus protection or anti-virus solutions on their machines. “My business is too small to be compromised,” they say. “I don’t have that much information, anyways,” “Virus protection is too expensive.”

They ask “Do I need an anti-virus solution?”

The fact is, yes. All businesses, regardless of size need some type of anti-virus solution in place to keep business operations running smoothly and productivity high.

The next time you wonder about virus protection, remember this. Hackers are after one thing: data. It doesn’t have to be big data, either.