Blog Categories
Cyber security: How to thwart 2017’s biggest threats
Each year, hackers and thieves find devious new ways to compromise your information technology. Innovative Solutions has been on the case for years, and we’ve helped dozens of clients guard against increasingly sophisticated cyber...
Higher Ed Information Security 101
A byte-sized course in data protection for college administrators It’s a long-held mystique: colleges and universities are often seen as secure, self-contained worlds free from the kinds of risks facing other sectors, like corporate...
Sometimes, it doesn’t matter if ‘there’s an app for that’
As InformationWeek reported, some eye-popping forecasts came out of Gartner’s annual Symposium ITXpo this fall. The company revealed their top 10 predictions for the next several years of IT. My personal favorite is “By...
5 Steps To Address Your Illusion of Control Over Internal I.T.
The only thing worse than a lack of control is the illusion of control. Deficiencies in IT controls could result in a serious breach for a company, or worse – a CIO’s job. Despite these...
Office vs. Office 365
Evaluating Office 365 against the traditional Microsoft Office Suite your organization is currently using? Check out our head-to-head comparison on some key differences!
Don’t Forget to Ask Questions! And Other IT Tips
As all businesses become more and more digital, and technology’s disruptive effects are felt across industries, it’s important for CEOs and business unit leaders to keep in mind worst case scenarios. Technology can help...