USB Device Security Flaws

When we talk about a USB device or call something USB we are actually talking about the way a computer peripheral (including keyboards, pointing

keep Reading

October is National Cyber Security Awareness Month

Preventing malicious applications from entering your workplace is not just about what you do, it’s also all about what you don’t do. The N

keep Reading

Software applications in the cloud?

  My first …… I know I am dating myself. If I could only get back the hours wasted on playing Asteroids. This Atari, an 8 bit home

keep Reading

Adobe Security Update

Part of the Managed Services Portfolio at Tech II includes ongoing monitoring and evaluation of industry patches the impact and benefits to our

keep Reading

Avoiding a data breach

A lot of companies have made national news lately from data breaches into their networks. A thorough network assessment can identify some of th

keep Reading

Video Surveillance: Detection, Recognition or Identification?

Whether you are considering video surveillance system for your home or business, it is more than just a simple matter of deciding where to mount

keep Reading

FAT or THIN Client?

No, we are not talking weight, but efficiency with Thin Client Computing. The main difference between thin and fat client systems has to do wit

keep Reading

The hidden cost of old technology

If you are thinking of squeezing another year out of that server, desktop, or laptop, it may actually cost you in the long run. As a piece of te

keep Reading

Home Office Solutions

Technology solutions are making the transition to a home office a seamless one. Before we discuss the technology, let’s look at some of the fac

keep Reading

Do you need IP cameras in your workplace?

The workplace has always been filled with risk, and companies have traditionally had to find ways around everyday threats to employee safety, cor

keep Reading