Entries by XSolutions

BDR Guide – Healthcare

Many aspects of the healthcare industry are now digitized. As a result, professionals in the field constantly face the challenge of protecting sensitive information that could easily become compromised if the right steps aren’t taken.

Choosing your disaster recovery team

When disaster strikes, your business – and your bottom line – will suffer if you don’t have a disaster recovery plan. The trouble is, without a team in place to execute your plan, even the most carefully constructed strategy falls apart. Here’s who to ensure you have on your disaster recovery team, so you’re covering all areas of IT.

RTO and RPO: What they are and why they matter

RTO and RPO are two integral aspects of disaster recovery – that is Recovery Time Objective and Recovery Point Objective, respectively.
In this article, we’ll explain what RTO and RPO are and discuss why they should matter to your business. Let’s jump right into it.

How to develop a balanced BYOD policy

It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re comfortable and familiar with. But BYOD policies can create some potentially dangerous situations for employers. These factors are a few to consider as you set up your BYOD policy.

Case study: Swift Electrical Supply

Swift’s infrastructure had grown and evolved over the years into aging technology connected in piecemeal fashion. While they had an internal IT staff member who kept things running, the outdated system was prone to failures and downtime.

Case study: QuadLogic

Over the years, QuadLogic’s complicated IT infrastructure had grown messy and was constantly giving them issues. Devices and servers would crash and employees were constantly complaining. They turned to XSolutions for direction and a new strategy. See the results.

If You Get This Email, Don’t Panic But Act

Recently, I was on my computer when this email popped up. It was from someone claiming to have hacked my PC, was watching me for months, and claimed to have infected my system with a Trojan. My immediate thought was to just delete the email and move on, but then I reasoned that something like […]