Microsoft Dynamics GP Blog, Sage 300 Blog, Technology Tips Blog

Technically Speaking

World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers, and everyone in between.

Blog Posts by Bill Walter

Bill, our lead networking guru, loves showing clients how technology can be worked into their existing processes to improve efficiency. His expertise includes high level planning for internal and external networks, research and selection of hardware and software products, and hands-on installation and configuration of networks. Normally a pretty easygoing guy, Bill thinks there should be a law against wearing a Bluetooth headset when it’s not in use.

Blog Feature

Construction  |  Healthcare  |  Manufacturing and Distribution  |  Networking  |  Nonprofit  |  Service Businesses

Getting Smart with Data Disasters

We’ve all been there. You’re in the midst of crafting an important document for that Monday morning meeting and — blip — the power goes out. All that work, lost. Next step, you scramble your thoughts together from the past hour of work you forgot to save. Thanks to auto-save and battery protection, you’ve only lost an extra hour of work and only a few strands of hair you’ve ripped out in frustration. What if your work never came back? Or even worse, what if all your data on your computer was corrupt and possibly useless? That’s what it’s like to experience a server failure due to power irregularity — information corruption to the company database.

Read More

Blog Feature

Construction  |  Healthcare  |  Manufacturing and Distribution  |  Networking  |  Nonprofit  |  Service Businesses

What Are Managed Services?

In the IT world, managed services are when you carve out the pieces of your business's infrastructure that you don’t have the expertise to manage on your own and have them supported by an outside vendor. You hear about this anytime you look for IT support. Many IT providers offer their expansive services at a flat monthly fee. But what happens when the fee is not in line with the service promised or received?

Read More
Ultimate Server Health Checklist

Ultimate Server Health Checklist

The ultimate guide to keeping your network performing at its best. Download the guide free when you subscribe to our blog.

Blog Feature

Networking

Why Scareware Isn't So Scary

The scene is you at your computer, ordering another item off a random search on a site you have not been to before. You have up-to-date antivirus software and security patches installed. Then it happens, a pop-up that states “Your computer is infected with the Armageddon virus! Please call (866) 555-1234 and we will remove it and restore your files.” 

Read More

Blog Feature

Networking

How Free Pizza Can Hold Your Networking System Hostage – A Case Study

[Please note that no end users were harmed in this experiment.] Pizza. It’s cheesy and delicious, but it can be dangerous to your company data. Huh? Gross, Mendelsohn & Associates: 5 Clicks Away From an Attack That’s right. We were the victims of a free pizza scam — but rest easy. Our own lead network security professional was 100% behind it. If you’ve read You Are The #1 Threat To Your Business’ Network Security, you understand how your employees put you at risk for a massive network attack. That’s why we conducted a top secret phishing test on our entire staff to see just how well our 100+ person team would respond. Let's find out.

Read More

Blog Feature

Networking

Are You Protected By Your Antivirus Software?

The answer is no. Antivirus applications may take down weak threats, but with sophisticated technology comes sophisticated hackers. As technology continues to evolve, there are additional protection measures you need to take to ensure the safety of you and your company’s information. (Psst! That's exactly why we offer a free assessment of your network! Schedule your assessment today to check the health and security of your network.) Antivirus software used to be an extremely effective way to protect against malware or viral code intended to harm your computer. These programs had an easy job at first. There were only a handful of malicious software threats to deal with. Programs were able to find, block and remedy the issues effortlessly. The software would compare the websites users visited with a list of known malicious threats. Through this examination, the application was able to target threats by identifying dangerous sites and preemptively sweeping for that code. That's all changed.

Read More

Blog Feature

Construction  |  Healthcare  |  Manufacturing and Distribution  |  Networking  |  Nonprofit  |  Service Businesses

You Are the #1 Threat to Your Business’s Network Security

If asked, many business owners would probably say the biggest threat to their computer network is an outside attacker. You’re probably imagining him now – a hooded character, hiding his face in the shadows as he hacks into your system, mining for private and confidential data. In reality, the biggest threat to your system is more likely sitting in the next cubicle, down the hall or even at your desk. The biggest threat to your business’s network is your users, which includes – you guessed it – you.

Read More