How to deploy HP MSM wireless – a step by step guide

In Wireless by Jesse Rink

Step by step walkthrough for HP MSM wireless

Having trouble understanding the cumbersome and lengthy installation and setup guides provided by HP when it comes to setting up and deploying an HP MSM controller-based wireless solution?  Take a look at this how-to document written by Source One Technology to help you better understand the necessary steps for successfully … Read More

What are the main causes of computer virus Infections ?

In Security by Jesse Rink

computer virus infections

Computer virus infections are the nightmare of a business owner. That’s hardly a surprise, though.  After all, what business owner wants to deal with computer infections that can cause severe damage to their data and important documents? It’s no secret that computer viruses can cause companies to lose: Client data Customers … Read More

Your Guide when It Comes to Choosing a Strong Password

In Security by Jesse Rink

choosing a strong password

What’s the first thing you do when you open your laptop? If you’re someone that cares about protecting their personal data, then your answer would be “I enter my password”. Nowadays, we use passwords for basically every account that we have online and sometimes even for our phone. Choosing a strong … Read More

The new Windows Server Essentials experience

In Windows by Jesse Rink

windows server essentials

The third quarter of 2016 will bring a smile to the face of many business owners throughout the world. That’s when Windows Server 2016 will launch. You can look at it as the big brother of Windows Server Essentials.  With the new software at our doorstep, let’s go over its features and … Read More

The most common cases of phishing and how to avoid them

In Email, Security by Jesse Rink

common cases of phishing

Phishing is the act of obtaining sensitive company data and financial details by using deceiving methods. Surprisingly, many businesses and institutions still fall prey to common cases of phishing nowadays. While people have learned how to avoid such intrusions over time, the methods themselves have been perfected. That means that the risk of falling … Read More

Hiring Sr. Network/Server Consultant

In Company News by Jesse Rink

WE ARE GROWING! Here is an opportunity for experienced Sr. Systems Engineers and Sr. Network Consultants to join our team in the Greater Milwaukee and Waukesha areas. The primary responsibility is to provide networking/server support services for our customers. A strong candidate will be able to provide on-going technical support … Read More

Top 5 network security best practices

In Security by Glenn Thomas

In this article we look at the top 5 network security best practices that all businesses should be following. #1 – Install a Unified Threat Management (UTM) appliance to improve your network security at the edge. Install a Unified Threat Management (UTM) appliance that supports most or all of the … Read More

Windows 10 Servicing Branches

In Windows by James Rankin

Windows 10 is looming large on the horizon for many enterprises as they look to refresh their desktop estates. Understanding what is new in Microsoft’s flagship operating system is vital to making the correct deployment decisions. Unfortunately, as with Microsoft’s arcane licensing terms, understanding the new “servicing branches” in Windows … Read More

How to balance security and compliance

In Security by Andrew Baker

Businesses of all sizes not only face increasing security threats, but also greater regulatory compliance requirements.  Here are some strategies to help find a balance between Security and Compliance and align your information security activities with your industry/regulatory compliance requirements. Security and Compliance Despite considerable efforts within the information security … Read More

“Help! My Outlook contacts are missing!”

In Applications, Email by Patrick McHugh

Imagine this scenario… A Microsoft Outlook user gets a new computer. Everything is loaded and it works great. After several minutes of using their new computer, the user shrieks in horror, “All my Outlook Contacts are missing!” You confidently but sheepishly point to the Contacts part of their Microsoft Outlook … Read More

BrainStorm K20 – that was amazing!

In Company News, Monitoring by Jesse Rink

This year’s BrainStorm K20 conference in the Wisconsin Dells was positively electric as education technologists from across the Midwest gathered together to connect, inform, and inspire. We sure hope your school or school district had the opportunity to attend! It was truly an amazing experience! The focus for Source One Technology … Read More

Network Resource Availability and Data Integrity

In Servers, Windows by Glenn Thomas

Part 2 of our Network Remodeling / Redesigning / Restructuring services series In my previous post Active Directory Design, Optimization, and Automation we discussed how your organization’s Active Directory design acts as the core system in which most other network functions stem from. In this post Network Resource Availability and … Read More

An ounce of monitoring – a pound of prevention

In Monitoring, Networking by Patrick McHugh

network monitoring makes prevention better than cure

With an ever increasing amount of technology, networks, servers and solutions, it becomes more important to monitor all aspects of our systems. Network monitoring gives us a real-time picture of the health and maintenance requirements of our systems and assists us with  IT performance troubleshooting. Over the years, we have investigated … Read More