Is Cyber Insurance a Necessity or a Luxury?

In Internet, Security by Zach Deprey

Cyber insurance to protect from hackers

Many of us view insurance as a necessary evil. We loathe paying the premiums, but we all deal with it at some point—whether it’s health insurance, car insurance, homeowners/renter’s insurance or some other type of insurance.  Add one more type of insurance to the list, now there is cyber insurance … Read More

If you missed BrainStorm 2017…

In Company News by Jesse Rink

BrainStorm 2017

If you’re responsible for the IT in schools, the BrainStorm 2017 K20 Conference is a ‘must-attend’ event.  We’ve been going for the last few years, and as well as getting to share what we do with attendees, BrainStorm is also a great place to learn about what’s keeping IT professionals … Read More

Sharing our experience of Professional Development with MAPA.

In Company News by Jesse Rink

Source One Technology present at MAPA

Having worked with schools for over 10 years, Source One Technology was invited to share its experiences with Milwaukee Archdiocese Principals Association (MAPA) members this last Friday.  MAPA provides professional development to principals in the Archdiocese of Milwaukee and works closely with the Office for Schools. The bi-annual event, attended … Read More

DNS Scavenging In Active Directory – Settings and Configuration

In Windows by Zach Deprey

In nearly every environment I’ve walked into, especially those that are more mature (read: older), DNS contains a plethora of stale entries, whether statically configured and forgotten about or dynamically registered, but never deleted or scavenged.  Most of those environments could benefit from implementing Active Directory DNS Scavenging. For some … Read More

Managing Office 365 performance issues

In Applications, Office 365 by James Rankin

Office 365 has been upon us for a while and represents one of Microsoft’s big pushes (alongside Azure) towards their “cloud first, mobile first” model. Most of us haven’t gone for full-fat Office 365 just yet, because of a few Office 365 performance issues with the web-based versions such as missing functionality, … Read More

How to deploy HP MSM wireless – a step by step guide

In Wireless by Jesse Rink

Step by step walkthrough for HP MSM wireless

Having trouble understanding the cumbersome and lengthy installation and setup guides provided by HP when it comes to setting up and deploying an HP MSM controller-based wireless solution?  Take a look at this how-to document written by Source One Technology to help you better understand the necessary steps for successfully … Read More

What Are the Main Causes of Computer Virus Infections?

In Security by Jesse Rink

computer virus infections

Computer virus infections are the nightmare of a business owner. That’s hardly a surprise, though.  After all, what business owner wants to deal with computer infections that can cause severe damage to their data and important documents? It’s no secret that computer viruses can cause companies to lose: Client data Customers … Read More

Your Guide when It Comes to Choosing a Strong Password

In Security by Jesse Rink

choosing a strong password

What’s the first thing you do when you open your laptop? If you’re someone that cares about protecting their personal data, then your answer would be “I enter my password”. Nowadays, we use passwords for basically every account that we have online and sometimes even for our phone. Choosing a strong password is … Read More

The new Windows Server Essentials experience

In Windows by Jesse Rink

windows server essentials

The third quarter of 2016 will bring a smile to the face of many business owners throughout the world. That’s when Windows Server 2016 will launch. You can look at it as the big brother of Windows Server Essentials.  With the new software at our doorstep, let’s go over its features and … Read More

The most common cases of phishing and how to avoid them

In Email, Security by Jesse Rink

common cases of phishing

Phishing is the act of obtaining sensitive company data and financial details by using deceiving methods. Surprisingly, many businesses and institutions still fall prey to common cases of phishing nowadays. While people have learned how to avoid such intrusions over time, the methods themselves have been perfected. That means that the risk of falling … Read More

Hiring Sr. Network/Server Consultant

In Company News by Jesse Rink

WE ARE GROWING! Here is an opportunity for experienced Sr. Systems Engineers and Sr. Network Consultants to join our team in the Greater Milwaukee and Waukesha areas. The primary responsibility is to provide networking/server support services for our customers. A strong candidate will be able to provide on-going technical support … Read More

Top 5 Network Security Best Practices

In Security by Glenn Thomas

In this article, we look at the top 5 network security best practices that all businesses should be following. #1 – Install a Unified Threat Management (UTM) appliance to improve your network security at the edge. Install a Unified Threat Management (UTM) appliance that supports most or all of the … Read More

Why Your Business Should Consider Office 365

In Applications by Jesse Rink

Each day, new applications release with the sole intent of improving the efficiency of businesses. While some apps are not necessary, others can be real lifesavers, like Office 365. This new version of Office has the features of Office 2016 and many more. Both products use cloud storage but Office … Read More