Resources and Information

Recent Articles

4 Keys to Digital Marketing Success

In order to compete in today’s market, there are four things that your business must have and do from a marketing perspective in order to stay in business.  The following is a very short and simple list of four things that should be a priority in your marketing mix. 1.)  A

Read More »

Avoid Lightning Damage

It’s that time of year again and you can bet that lightning will happen.  Are you prepared?  Follow these 5 simple steps to make sure your data and hardware are protected from lightning strikes this spring. 1.)  Backup – As always, it is important to have backup copies of your

Read More »

Fake Newegg Emails

As you may know we actively monitor SPAM messages as a means for the distribution of viruses and other malware.  Recently we’ve noticed a series of NewEgg order confirmations being sent that appear to be very well thought out so we thought we’d make mention of it and warn our

Read More »

How to stay Virus FREE!

Summary While the rule of thumb is that any computer can get infected with a virus, no matter what the protection or how careful the user, there are some things you can do to further protect yourself against infection.  The basics You must always keep your virus protection up to

Read More »

Save on Toner!

It has come to our attention that some models of Brother printers use a sensor to determine when it is time to change toner cartridges.  However, the sensor is designed in such a way that it often indicates that the toner must be replaced before it is actually empty.  While

Read More »

Java is a high risk app

iSTAM recommends uninstalling Java unless it is absolutely necessary. Outdated or old versions of Java are frequently exploited by cyber criminals. Consider uninstalling Java if it is not required to deliver a business application or to manage this server. Before removing Java, please check to ensure that it is not

Read More »

Protection against the Locky Virus

According to recent reports, massive volumes of JavaScript attachments are being spammed out that contain dangerous ransomware. We recommend taking the following additional precautions to protect your install base: Make sure your mail protection solution is blocking macro-enabled documents and .js scripts Ensure that you have blocked user access to

Read More »

Should I consider a server based network?

Comparison There are two types of networks: peer-to-peer and client-server. A peer-to-peer network consists of interconnected client computers, such as laptops or desktops.  A client-server network is a centralized network one server acts as dedicated resource provider to a pool of client computers. These servers “serve up” 24×7 services to

Read More »

XP End of Service Notice

Microsoft has announced that it will discontinue service and support for the following operating systems as of July 13th 2010. Windows XP SP2 Windows 2000 Professional Windows 2000 Server WHAT DOES THIS MEAN FOR YOU? • Microsoft will stop providing incident support and will not release new updates, including security

Read More »

SEARCH ARTICLES

FREE REPORT

Image representing the Managed IT services Buyers guide free download

The Kentucky Business Guide To IT Support Services And Compliance

What You Should Expect To Pay For IT Support For Your Small Business (And How To Get Exactly What You Need Without Unnecessary Extras, Hidden Fees And Bloated Contracts)