Attention CFOs: Reduce Your Information Technology Expenses Now

The other day, I was having a conversation with a friend of mine who also just so happens to be a Chief Financial Officer (CFO). As is the case more often than either of us would like, our friendly chat quickly turned to business. He asked me how some of our clients budget their capital…

Read More

M&A Due Diligence: Are You Preparing for an Acquisition? Don’t Forget About Your IT

Being at one of the leading IT services firms in Boston, Cambridge and the greater New England area, one of the major things that excites me every day is the fact that we often find ourselves in the epicenter of biotech and pharma innovation in the modern era. In addition to helping break new ground…

Read More

Ecommerce Security Tips: How to Protect Your User’s Sensitive Information

Topic: PCI, eCommerce eCommerce security is a constantly evolving topic for any organization, regardless of their size.  As the CEO & Cofounder of Trellis, a local full-service design firm, we partner with organizations to develop robust WordPress & Magento websites.  One of questions I often face is what a new or smaller business can do…

Read More

Tips to Make Your Business Winter Ready

Hacks and Ransomware Attacks often catch the headlines for their wide impact and compromised data.  However, for many businesses located in colder climates, a very real threat to their daily operations revolve around the worst winter weather, much of which is still ahead of us.  Inclement winter weather can lead to disruptions in your normal…

Read More

IT Management Services: 5 Things to Look for in a Managed Service Provider

The role of IT in up & coming businesses often becomes an afterthought.  One day, you are a small team with a singular goal, with a lot of hard work and a bit of luck, your business begins to thrive; staff assume more and more responsibilities to keep things moving smoothly, before you know it,…

Read More

What To Do After a Ransomware Attack

The topic of Ransomware is a steadily increasing mainstream topic affecting both small and large businesses alike.  We’ve discussed some of these common types of intrusions before, this type of malware encrypts your data and holds it for ransom to receive the key, it requires a fast acting user in order to minimize the amount…

Read More