Not sure which way to go? I have the answers…

Email Professionalism…not a text too late

Email Professionalism…not a text too late

Hey! R u der? OMG did you read Ken’s memo? LOL  – LOL in Business Email? Not So Fast.  An article worth reading. This article directly relates to side 2 – Sending the ‘Killer’ email, as mentioned in the first part of this series.  I will elaborate more as I continue the series, but I thought it would be a good read and share in the...

BCP – Phase 3 – Determination and Mitigation!

BCP – Phase 3 – Determination and Mitigation!

Now that the hard work of Phase 1 and 2 have been completed, its time to determine what the mitigating activities will be for each of the scenarios that have been defined.  Phase 3 is what the whole BCP is made of, essentially.  In this phase, all of the planning, relationship information and real analysis take place.  For each disaster scenario defined in...

BCP – Phase 2 – Risky Business!

BCP – Phase 2 – Risky Business!

Now that we know which events can put us out of business, or at least delay operations for some undetermined amount of time, it’s time to see what parts of your business are affected by each of those disasters defined in Phase 1. Now, here is where the next big level of work goes into creating your BCP.  Phase 2 deals explicitly with identifying which...

BCP – Phase 1 – Getting started

BCP – Phase 1 – Getting started

I know I wrote that ‘Recover or Resume’ was the question….but the what’s the question that supports the need to begin with? WHAT CONSTITUTES A DISASTER in the first place? This is what Phase 1 is all about in this process.  Now remember what I said, EVERY business needs to plan for this.  EVERY business will do this differently and at...

Practice Safe Emailing…Two sides

Practice Safe Emailing…Two sides

There are two topics to this series about email security, safety and best practices:  1 – Email Defense – When email goes wrong – how to protect yourself and your data from Spam and Spyware  2 – Sending the ‘killer’ email – What goes wrong when you ‘casually’ email the important stuff Email Defense – Unsolicited Commercial Email (UCE) is a...

Android – Top 25 Applications

Android – Top 25 Applications

OK – so the iPhone is still king when it comes to variety and numbers of software applications available.  Though the Android market is not as large, there is more than enough to be overwhelmed, and then overwhelmed again.  The market is growing very quickly as developers either port existing iPhone apps to Android or develop Android only applications as...

I+ Business Technology Management Services

I+ Business Technology Management Services

BUSINESS AND TECHNOLOGY….THEY FIT HAND-IN-HAND IN TODAY’S BUSINESS WORLD.  WE BRIDGE THE GAP TO HELP YOU MANAGE YOUR IT SERVICES. SingerLewak’s Business Technology Management Services (“BTMS”) are geared toward working with growing businesses to help them achieve the benefits of combining forward-thinking IT with forward-looking business objectives. For many...

Windows 7 – What you should know – some changes

Windows 7 – What you should know – some changes

Continued from previous post: 1 – Changes between Vista and Windows 7 – For the most part, the same Vista engine is still running the operating system, but there are some new features and enhanced performance overall.  Most believe that Windows 7 is really nothing more than major service pack and a features plus pack. If you don’t believe me...

Windows 7 – What you should know

Windows 7 – What you should know

As support for Windows XP is no longer from Microsoft, and Vista is still a major player, Windows 7 has given us IT folk some very well needed deep breaths, sighs of relief, and that overall feeling of – Microsoft finally did something right.  But how much different is Windows 7 that XP and Vista and what should you look out for and be aware of before...

It’s all in the clouds! Cloudy concerns…

It’s all in the clouds! Cloudy concerns…

Cloud Security…. The sudden demand for cloud-based computing has companies thinking more about where their data and applications live.  By having data and applications being served to users from cyberspace and accessible through almost any  internet connected device, cloud computing offers great advantages such as reduced maintenance costs, increased...