Technology

/Technology

How to Manage Your Employees, Not the Environment, for Successful Remote Work

“We know we’re in a transition. You can feel it. It’s going to be a different work world a year from now.” - Kevin Waters, CEO of Clear Leader Group An overwhelming amount of businesses find themselves scrambling to transition from a traditional work environment in the office to a remote model where employees work [...]

April 6th, 2020|Categories: Remote Workforce, Remote Workplace, Small Businesses, Technology, Training|

Case Study: How One Architecture Firm Found Freedom in IT Rather Than Frustration

At The IT Company, we believe that IT should help you grow business for your firm rather than hold it back, especially when you are one of the largest architecture firms in the East Tennessee area. The last thing you should be dealing with are frustrations about overpriced IT that doesn’t work half the time. [...]

February 28th, 2020|Categories: Customer Interview, IT provider, Small Businesses, Technology|

How Can Your Architecture or Engineering Firm Take Back Stolen Time with the Right IT Strategy?

You and your employees have important tasks to do. You didn’t spend countless hours and nights for years in the architecture or engineering labs at school to waste all day restarting the router because of a failing internet connection, or solving why the printer doesn’t work after installing new software. Unfortunately, that’s what many architects [...]

February 14th, 2020|Categories: IT provider, Small Businesses, Technology|

5 Ways We Help Our Customers Be More Profitable

Commercial businesses usually exist for one reason, to make a profit for the shareholders - that's the goal as outlined in Eli Goldratt's book "The Goal" - profit. While we may be solving a specific problem, and we may be very passionate about our business and solving that problem, in the end, turning a profit is the goal. That goal achieved as a [...]

August 13th, 2019|Categories: People, Privacy, Security, Technology|

CIS Control 6

The IT Company blog series is back with another CIS control! In previous blogs, we have walked you through the understanding and importance of CIS controls 1 and 2, control 3, control 4 and control 5. Today we are picking up with control 6! CIS control 6 is the Maintenance, Monitoring and Analysis of Audit Logs. [...]

March 5th, 2019|Categories: CIS Controls, Technology|

CIS Control 5

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers- CIS Control 5 is one that a lot of companies fall short of, due to the difficulty to stay on top of it. However, CIS Control 5 is the biggest step in beginning to look at just how mature you want your company’s security [...]

January 22nd, 2019|Categories: CIS Controls, Security, Technology|Tags: , , , , , |

2019 and Beyond

It's hard to believe it's 2019, and another year in the 21st century came and went. 2018 was like a blur, especially in the world of technology. The pace at which innovation and change is happening continues to accelerate, which creates opportunities and challenges. I feel like as I grow older, I begin to realize [...]

January 15th, 2019|Categories: People, Small Businesses, Technology|Tags: , , , |

Two-Factor Authentication

Today’s blog is a brief highlight on why two Two-Factor Authentication is an important layer in your company’s security. Two-factor authentication is a form of security that not only requires the typical username and password security method, but it with a code that only a specific user has access to. There are different methods to [...]

December 4th, 2018|Categories: Security, Technology|Tags: , , , , |

Cyber Criminals Taking Over Email Inboxes Without Phishing Attacks

We’ve warned our readers several times about different types of phishing attacks and the methods cyber criminals are using to steal your information. Today, we alert you that cyber criminals are now taking over email inboxes without phishing attacks. As always, attackers are constantly finding new ways to intrude. While phishing attacks such as email [...]