Get to Know Microsoft Office 2013

This latest version of Microsoft Office brings not just new features but show us where Microsoft is heading. Microsoft Office 2013 reveals some interesting things. This time the new features are not the main show. Arguably the biggest change is in how to buy it.

IT Security Best Practices: Hardware & Software

In the final post of this series, I focus on the importance of maintaining, upgrading and protecting hardware; updating software regularly and protecting your data on multiple devices and in the cloud.

IT Security Best Practices: Planning & Policies

Good IT policy must be pushed from the very top of the organization. Such policies should be reevaluated periodically. They must also be enforced and upheld by everyone in the company.

IT Security Best Practices: Tips for Creating a Secure Network

Why is IT security critical for organizations? One of the most valuable assets in an organization is their data, whether it’s in email, files, database, etc. How can you prevent others from accessing your data? This is where IT security best practices come in.

Webinar: July 25, 2013 – IT Security Best Practices: Slides & Audio

Nonprofits often struggle with how to secure their network and IT resources. During this webinar, Steve Longenecker, Project Manager, and Mark Kraemer, Network Administrator, share IT security best practices, both from a strategic, planning perspective and also in terms of dealing with day-to-day IT issues.

Considering a New Server?

Clients ask how much a new server costs. It depends (of course). We recommend that our clients buy servers from Dell. We’ve been working with Dell equipment for a long time now and while the quality of the service does ebb and flow, our sense is that we do as well with Dell as we would with any hardware vendor and that most of the time we do better than we would with other vendors.

We Won! Big Green Commute

Here at Community IT we depend heavily upon public transit, biking, and even walking to get to work and to many of our clients. In part this is because of our commitment to reducing our environmental impact, but they’re also just convenient ways to get around a busy city.

BYOD…Who Me?

A look at some widely different approaches to BYOD along with a review of the information security, legal and financial risks inherent with BYOD.

Webinar: June 20, 2013 – BYOD for Nonprofits: Slides and Link to Recording

BYOD stands for Bring Your Own Device. It refers to staff bringing their own devices to work, instead of working on the computer provided by the organization. In this webinar Johan Hammerstrom, COO, discusses how nonprofits can prepare for BYOD, leverage the strengths and minimize the challenges.

Fighting Viruses with Vipre

Fighting viruses used to be a desktop by desktop process; at each computer a Community IT technician would update antivirus definitions, run full virus scans, analyze results, isolate as needed, clear quarantines, replace one antivirus solution with another and so on.