Routers, Switches & Firewalls: What Are the Differences?

We've recently worked with, or are currently working with, multiple clients who are confused about the differences (and respective unique features available) in routers, switches and firewalls. Each kind of device has advantages and disadvantages over the others, and each have different purposes. In this blog post, we will identify the key uses for each device and explain why you typically need all three devices in a single network!

Key Take-Away's for Nonprofit IT Trends in 2013

According to Moore's Law, computer hardware is improving at an exponential rate. Many argue that Moore's law also applies to how technology and technology-related websites & services have changed over time. Not only are these things improving as a whole, but they are also changing at an exponential rate. What would have taken years to make possible in 2000 is now possible to create in mere weeks, days or even hours! 

Choosing & Using Free and Open Source Software

Free & Open Source Software (FOSS) is a category of software that is developed by a community of software engineers (or their bosses) who donate their resources to create better software for the greater good. It is, as the name implies, free to use by anyone. But more importantly, it is developed in such a way that it is also easy to modify in order to suit a particular organization's particular needs.

Windows Updates & Other Security Patches

As an IT consulting and technical support firm, we at Develop CENTS constantly come across computers in need of major security patches for Microsoft Windows and applications that run in the OS such as Java and Adobe. Often times, the computer user does not even realize these updates are available, let alone, extremely important.

Over the years, Microsoft has tried to make it easier for PCs to automatically download and install security updates, but tons of computers can easily miss these updates for various reasons.

Free Password Management Tools

In recent blog posts, I've written about methods you can use keep your information secure. I also wrote about the importance of keeping your passwords safe. However, I haven't given any practical tools one can use to protect their data. Several utilities exist for such a purpose, but I'm only going to cover 3 tools you can use.

So without further ado, and in no particular order, here's that list.

Password Security & User Accounts

In last week’s blog post, I explained just three ways you can keep your organization’s data safe. There are often times, however, that an individual or organization uses an online service. In these cases, while the data is certainly yours and only you have access to it, you have no control over how the service provider secures that data (other than front-end password authentication, of course).

Information Security: 3 Ways to Secure Your Data

Information is the lifeblood of any organization, whether that organization is a nonprofit or not. For example, a nonprofit might have a large donor database with mailing addresses, email addresses and phone numbers for all of their constituents. What would happen to this organization if that information became compromised? The last thing your organization wants is to have to explain to your donors why and how their personal information was compromised.