Office Printer Security Risks

officer printer security risks

Responsible businesses go to great lengths to ensure the security of their data, and with good reason. A data breach can cost a company thousands of dollars, their reputation, and even criminal penalties in certain industries subject to regulatory compliance. Despite their efforts to protect their data, many organizations fail to protect one vulnerability found…Read Full Article

Common IT Mistakes Small Businesses Should Avoid

small business miskate

Every company in the world depends on some form of technology to function and achieve success. This means companies, especially small companies, need to put a lot of thought into their IT-related decision. In a small business, these IT decisions can have a huge impact and it’s all too easy to make common mistakes. Being…Read Full Article

Are Security Experts Wrong About Passwords?

password security

For years now we’ve been educated on the importance of ‘strong’ passwords and what constitutes a strong password. When creating a password, you must include both letters and numbers, with at least one of those letters capitalized, to help ensure your privacy. Be sure to include a special character as well, and avoiding personally-identifiable information,…Read Full Article

How to Work Effectively from Anywhere

work remote

Whether it’s working from home when your kids are sick or working from an airport lobby on a sales trip, having the ability to work from anywhere makes life so much easier. Before you leave the desk behind, there are three things you need to do if you want to be effective working remotely. Store…Read Full Article

Network Control for Remote Access

Network Control for Remote Access

  Network Access Control (NAC) has become a hot topic for a wide range of corporate stakeholders, including business leaders, networking groups, and security teams. Despite all the different NAC solutions available there is still a lot of misunderstanding about what NAC really does. Before looking at the important role of NAC, it’s important to understand…Read Full Article

7 Ways to Spot a Fake Email

fake email

We’re all getting more and more emails every day, and hackers are taking advantage of it. Phishing and spoofing emails are designed to look like legitimate emails from a familiar sender and entice you to click an innocent looking link that actually downloads malware. Thankfully, these emails have some telltale signs you can easily spot…Read Full Article

5 Rules for Using Public Wi-Fi

public wifi

People are working on the go more and more these days, and they’re using public Wi-Fi networks at coffee shops and airports to get the job done. While this is convenient, using public networks also exposes you to risks. Make sure to follow these five rules when using public Wi-Fi. Play it Safe– Avoid accessing…Read Full Article

Pain Points that Can be Avoided by Outsourcing Your IT

Outsourcing IT

Outsourcing IT services using JD Young’s Managed Network Services (MNS) helps you ease the pain points that come with an in-house approach to IT. These pain points include: Human Capital Management– It’s difficult for the average company to find money in their budget to employ a dedicated in-house IT specialist who has all the talent…Read Full Article

Your IT Security Checklist

checklist

When it comes to managing and securing your IT systems, it’s vital to make sure all your bases are covered. It’s easier than you think to lose track of what’s already been completed, and what still needs to be fixed. Whether you have an in-house IT staff or outsource your IT needs to a managed…Read Full Article

The Department of Redundancy Department

it

All client names have been changed due to confidentiality agreements. Large scale problems need large scale solutions. In the case of Vandelay Produce, JD Young overhauled the entire IT infrastructure of a rapidly growing company with numerous locations that must be in constant communication with each other, and we did it with the client experiencing…Read Full Article