Not sure which way to go? I have the answers…

Series Posts

The Cloud Adoption Movement: It’s already here – Is your business part of it?

Posted by on Mar 2, 2015

The Cloud Adoption Movement: It’s already here – Is your business part of it? First post in a new series about the advantages, risks and trends about moving your technology to the...

Read More

Computer Networks and Security

Cloud Security – an oxymoron or matter of policy?

Posted by on Jun 6, 2013

We all know what an oxymoron is, adopted phrases that seem to describe something but use two diametrically opposed words to convey them, e.g., A Fine Mess, A Little Big, A New...

Read More

Off The Cuff

The Cloud Adoption Movement: It’s already here – Is your business part of it?

Posted by on Mar 2, 2015

The Cloud Adoption Movement: It’s already here – Is your business part of it? First post in a new series about the advantages, risks and trends about moving your technology to the...

Read More

SingerLewak IT Perspectives

Malvertisements….Is it ever possible to avoid Malware?

Posted by on Dec 5, 2012

We all do our best to avoid advertisements in general, but with the evolution in online advertising, so comes the various ways hackers can use them to exploit our computers and the...

Read More

Recent Posts

2015 Planning: BCP – Phase 1 – Getting started

2015 Planning:  BCP – Phase 1 – Getting started

I know I wrote that ‘Recover or Resume’ was the question….but the what’s the question that supports the need to begin with? WHAT CONSTITUTES A DISASTER in the first place? This is what Phase 1 is all about in this process.  Now remember what I said, EVERY business needs to plan for this.  EVERY business will do this differently and at...

2015 Planning: Recover or Resume? That is the question! BCP Primer

2015 Planning:  Recover or Resume? That is the question!  BCP Primer

Business Continuity Planning (BCP) is a process of identifying a company’s threat exposure from a multitude of angles, processes, including hard and soft asset availability during an incident.  These angles all fit into two separate overlying categories:  Internal threats and External threats.  The word ‘threat’ has become synonymous with anything that could...

Cloud Security – an oxymoron or matter of policy?

Cloud Security – an oxymoron or matter of policy?

We all know what an oxymoron is, adopted phrases that seem to describe something but use two diametrically opposed words to convey them, e.g., A Fine Mess, A Little Big, A New Classic, Accurate Estimate, Almost Ready, Awfully Good, Auto Pilot, About the Same, Anxious Patient, and so one. So we have a new one, Cloud Security, or is this really an oxymoron? It...

Windows 8 – What a Successful…Flop?

Windows 8 – What a Successful…Flop?

Windows 8 sure came in with a bang! Hype for miles and miles, excitement that made any ADHD sufferer seem calm and collected! What was accomplished? Is it good? Should we switch? Why doesn’t anyone seem to be using it? All I hear are complaints; so is it that hard to use? For the first time in computing history, an operating system company came up with an...

A Windows 8 Recycle? Will going back restore confidence?

A Windows 8 Recycle?  Will going back restore confidence?

Windows 8 hasn’t given PC sales the boost that all were anticipating.  Microsoft looks to now be getting ready to go back on some of the core changes it introduced on this new version. It seems that Microsoft is planning a big Windows 8 undo, and that the release of Windows 8.1, also known as Windows Blue — will allow users to bypass the much-hated Start...

Security Best Practices – 10 of the best things you can do

Security Best Practices – 10 of the best things you can do

Corporate security consumes a huge chunk of time, money, and human resources. It’s no wonder that companies like Symantec exist. Symantec produces some of the security industry’s best software, but its contribution doesn’t stop there. Symantec also produces an annual Internet Security Threat Report. In these reports, Symantec highlights...