Articles

eMazzanti reacts to the Target security breach

Like many of you, we at eMazzanti recently received correspondence from Target. It details the security breach that they suffered…

11 years ago

4 Ways to Safeguard and Protect Your Small Business Data

used with permission from SBA.gov by Caron Beesley Are you doing enough to safeguard and protect your small business data?…

11 years ago

IT Channel Sales Cycle: How to Close a Sales Deal More Quickly

By: Heather Clancy Whether it takes an IT service firm two weeks or two months on average to close deals,…

11 years ago

Solution Provider Agreement Issues: Protection of Intellectual Property

By: Heather Clancy Many technology providers are seeking ways to develop "repeatable" solutions, ones that can be sold and deployed for multiple…

11 years ago

Safety is an active verb

used with permission from Microsoft by Kim Sanchez When we are young, we are taught to brush our teeth in…

11 years ago

Ransomware in the Enterprise

used with permission from Microsoftby Marianne Mallen, Vidya Sekhar, & Ben HopeThe enterprise space isn’t immune to emerging malware threats…

11 years ago

Risky business

used with permission from HP Technology at Work The vast variety of responsibilities, details and processes involved with running a…

11 years ago

Get smart about security

used with permission from HP Technology at Work Congratulations, you've taken every step to secure data on your networks and…

11 years ago

3 Signs You Need Managed Services

used with permission from HTSIf you've researched methods of taking care of your IT needs, you've probably come across "managed…

11 years ago

7 Advantages of Managed IT Services

Many small to mid-sized organizations are turning to Managed Service Providers (MSPs) to help alleviate some of the strain on…

11 years ago