MicroTech Systems IT Service Blog

Microtech Boise IT services blog. Learn tips and best practices for your business IT needs.

Top 5 IT and Security “Oopses” From 2018

Top 5 IT and Security “Oopses” From 2018

...and how to Avoid These IT Mistakes in 2019

No IT strategy is ever certain – business leaders make plenty of well-informed assumptions about the future of information technology, only to find out that the future takes a different turn. This year, everyone made plenty of assumptions about the cloud, the IoT, information security, and more. What did businesses get wrong – and how will we fix things in the year to come?

Strategic Fail: Why SMBs Fail to Plan for Technology & How to Fix It

Strategic Fail: Why SMBs Fail to Plan for Technology & How to Fix It

Similar to larger organizations, small businesses perform business-related functions such as sales, operations, accounting, and finance. They must compete with the bigger companies around them, providing the same (if not better) level of customer service and support to keep their customers happy and returning. The difference is that they do it with a much smaller pool of money, time and talent. 

Guide to Building a 2018 BYOD Policy

Guide to Building a 2018 BYOD Policy

 

A Set of Recommendations for Establishing a Secure Policy Around BYOD

As a provider of IT and security solutions, we are always surprised when an older topic like BYOD receives new attention. As of late, we have had several questions about whether to allow personal laptops and devices access to the network. We firmly believe businesses have a choice in whether or not these devices be given access to the network. But, unlike most articles around BYOD, we are taking the approach that not all devices are the same. We suggest you categorize laptops and personal devices such as smartphones and tablets into two separate categories. In this blog, we hope to leave you with a guide that provides practical and relevant advice on how you can implement a BYOD policy that addresses both categories, and aligns with the way your team accesses the network.