Jack Harasimowicz

Hello? 2004? We Found Your Computer Security…

We recently discovered that “computer security” is a top keyword search that leads users to this blog. As topics go, its meaning and implications have certainly changed over the years. By some accounts, it may be considered an outmoded terminology....

Building a Business Continuity Plan: How to position your business to recover from a disaster

The natural disasters that have plagued our world in recent years have proven just how crucial it is for organizations to have a business continuity plan. According to statistics released by The Federal Emergency Management Agency (FEMA), more than...

Is Your IT Support a Problem Solving Partner?

If you are skeptical of the ways in which robotics and artificial intelligence will be able to automate and reshape the way we do business in the future--you are not alone. A 2017 Pew Research Center survey found that 72% of Americans express worry...

Network security: Building your lines of defense to protect against every threat

The network security game has changed

Company data is becoming more and more difficult to secure. The firewall built to keep security threats from entering a company’s network will do its job, but it is no longer enough. With increasing capabilities...

A Tax Season Cybersecurity Primer: 3 Ways to Keep your Information Safe

‘Tis the season to be filing taxes --and hackers know this. With so many Americans filing their taxes electronically, the potential for sensitive information to fall into the wrong hands is high during this time period. While you are crunching...

IT Symposium of Awesomeness (What do a sledgehammer, "Human Firewall," and Red Sox tickets have in common?)

by Jack Harasimowicz | April 12, 2018 | Team

Informative speakers, a hands-on disaster demo, lunch, networking, and prizes…. what a day!

Last week, iuvo Technologies hosted our first public event: the IT Symposium of Awesomeness. The Symposium enabled business professionals to gather for an...

How to Get the Most out of Your IT Consulting Relationship in a Digital Transformation

Is your company among the 64% undertaking a digital transformation? If you are enlisting the help of an IT consultant or managed service provider (MSP), you may be in the throes of a true IT makeover.

You may remember the popular TV show “Extreme...

The Threat Hunter: When Data Security Is Doing Its Job

by Jack Harasimowicz | March 27, 2018 | Security, cybersecurity

As we have discussed on this blog, guarding the perimeters and responding to firewall threats is no longer sufficient cybersecurity. Today’s pernicious attackers have far too many ways to make inroads into your company’s networks. Further, as recent...

How to Get the Most out of Your IT Consulting Relationship

by Jack Harasimowicz | March 22, 2018 | IT Management, IT Support

Whether you are in the beginning stages of negotiating a contract with an IT consultant, or already engaged in a long relationship with a service provider, your best interest as a client should be paramount. This IT consulting overview highlights...

Subscribe Here For Our Blogs:

Recent Posts

Categories

see all