We've recently worked with, or are currently working with, multiple clients who are confused about the differences (and respective unique features available) in routers, switches and firewalls. Each kind of device has advantages and disadvantages over the others, and each have different purposes. In this blog post, we will identify the key uses for each device and explain why you typically need all three devices in a single network!
According to Moore's Law, computer hardware is improving at an exponential rate. Many argue that Moore's law also applies to how technology and technology-related websites & services have changed over time. Not only are these things improving as a whole, but they are also changing at an exponential rate. What would have taken years to make possible in 2000 is now possible to create in mere weeks, days or even hours!
As many of our readers know, we are located in Chattanooga, TN, the first city in the Western Hemisphere (and one of the only cities in the world) to have gigabit-speed internet available to all homes and businesses in the region. With high-speed internet come many potential advantages.
Free & Open Source Software (FOSS) is a category of software that is developed by a community of software engineers (or their bosses) who donate their resources to create better software for the greater good. It is, as the name implies, free to use by anyone. But more importantly, it is developed in such a way that it is also easy to modify in order to suit a particular organization's particular needs.
As an IT consulting and technical support firm, we at Develop CENTS constantly come across computers in need of major security patches for Microsoft Windows and applications that run in the OS such as Java and Adobe. Often times, the computer user does not even realize these updates are available, let alone, extremely important.
Over the years, Microsoft has tried to make it easier for PCs to automatically download and install security updates, but tons of computers can easily miss these updates for various reasons.
In recent blog posts, I've written about methods you can use keep your information secure. I also wrote about the importance of keeping your passwords safe. However, I haven't given any practical tools one can use to protect their data. Several utilities exist for such a purpose, but I'm only going to cover 3 tools you can use.
So without further ado, and in no particular order, here's that list.
A trusted website such as your nonprofit's is the last place from which you'd expect visitors to get a virus. After all, it’s your website, and your organization built it (or relied on a volunteer to build it or paid a trusted individual or firm to build it). Why shouldn't you and your visitors trust it?
In last week’s blog post, I explained just three ways you can keep your organization’s data safe. There are often times, however, that an individual or organization uses an online service. In these cases, while the data is certainly yours and only you have access to it, you have no control over how the service provider secures that data (other than front-end password authentication, of course).
Information is the lifeblood of any organization, whether that organization is a nonprofit or not. For example, a nonprofit might have a large donor database with mailing addresses, email addresses and phone numbers for all of their constituents. What would happen to this organization if that information became compromised? The last thing your organization wants is to have to explain to your donors why and how their personal information was compromised.
With the launch of our new website, we are launching a blog that will cover topics of Information Technology as well as IT Security as they relate to Nonprofit Organizations.
In this post which is launching with our new website, we try to briefly introduct "Cloud Computing", and what it means to nonprofit organizations.