USB (Universal Serial Bus) has gained wide industry acceptance over the past fifteen years. Device manufacturers have adopted this protocol as the primary method used to connect peripheral devices (cell… Read more »

Where Did My File Go?

We have all had that moment where we deleted a file only to realize it was the wrong file.  Not to worry, just go to the Recycle Bin and there… Read more »

Where did TrueCrypt Go?

Risk Advisory Services has taken the firm stance over the past several years that if your company uses laptops, they should be protected with full disk encryption. The data accessed… Read more »

What You Need to Know About SOC Audits

Nearly all the companies we have the opportunity to work with– community banks, non-profit organizations, government entities, associations, construction companies, heath care, etc.–outsource some component of their IT system to a Service… Read more »

Run, Transform, Grow

Once again I am faced with doing the IT Budget for YHB and I decided to look back at a blog I wrote a couple years ago.  I wrote this… Read more »

Local Admin Rights

IT Professionals have deployed sophisticated firewalls, installed robust antivirus products, and implemented patch management solutions to keep enterprise hardware and software safe and secure.  While this layered approach is effective… Read more »