Company Goals

I work with customers to provide on-site or remote service to fix any technology problem immediately.

Develop on-premise and cloud solutions for small businesses, home office and individuals.

I am equipped with the knowledge and understanding to simplify complex technical terms into useable information for the customer.

The goal of each project is to teach how to use technology to make the job easier by providing prompt, friendly and courteous service.

I will provide free recommendations for purchasing new technology equipment and software for home or office use.

Partner with security companies, distributors and A/V design firms to provide a whole product solution that will handle any type of job.

Specialties:

-Cisco Aironet Access Points

-Cisco Routers/Switches/ SSL VPN

-Microsoft Office 365/ Azure/Teams

-Microsoft Windows Server/ Exchange/ Workstations

-Apple/Linux Computers

-Palo Alto Firewalls

-Apple TV/ Roku/Sonos

-Cloud Backup Services

-TV/ Film Broadcast Storage Solutions

-Customer Relations

-Team Building/Speaking

-Technical Teacher /Trainer

Wednesday, August 8, 2012

Learning the Two-Step


Throughout this week there has been more concern about breaking into people's online accounts.  In order to keep your data safe on your phone, email server or in the cloud there is a need to keep security in mind.  Google has recently started implementing a two-step approach to accessing data called the 2-step verification which you can read more about in the following article.


Similarly, people are linking Facebook, twitter, cloud services, etc. together with little form of authentication between each service.  If someone would break into one service then they could break into all the linked accounts without any problem.  So it makes sense to have a second layer of security to authorize access to each account.  Security always comes at a price but learning how to handle access will make everyone safer in the end.


No comments :

Post a Comment