HR Policies

HR Policies for Tech

The horror of hacks to businesses The scariest part of horror movies is the first scene that shows the fiendish slasher is in the same house or even as close as the same room with the hero or heroine. Many times, the perpetrator of the gruesome crimes turns out to be someone the victim knows. Guess what? This is true of

Read More
Backup Monitor Verify

Backup, Monitor, Verify – 3 Business Survival Habits

  Backups are the single most important survival habit for your business. Period. Everything runs through your computer system.  If that system is down-especially for an extended period, you run the risk of your business failing. Studies show that over 70% of small businesses go out of business within a year if they have a major, unrecoverable data loss. Running a computer backup is one

Read More

Remember to save to the server!

The scenario: We all do it, you’re creating a file and just want to save it as quickly as possible so you save it to the desktop! Don’t do it! Resist the urge! Those files that we save to the desktop are often times files we begin to use on a regular basis and because they’re not on the server they

Read More

Cyber Security Badges for Girl Scouts!!!!

  With all the cyber attacks in the recent media, it is great news that the Girl Scouts are now offering cyber security badges! Encouraging young people at an early age to participate in thwarting cyber criminals will certainly add to a safer future for computing. As cited in the USA today story girl scout computer security badges the requirements for achieving the

Read More

Why Office 365?

We use office 365 for our clients a lot. It’s a good solution for many reasons.Why office 365? 1) Never worrying about what version of the office you’re on, anyone on 365 always has an up to date Office version. 2) Not worrying about your mail going down when your office internet is down. On premise mail systems provide a single

Read More

What to think about before a VOIP installation

These days many business are looking at VOIP (Voice Over Internet Protocol) Phone Systems. Instead of carrying calls on conventional phone lines, the voice is carried encrypted across the internet. While VOIP is usually the  way  to go, there are things to be considered. For the purposes of this article I’m going to quickly review the talking points one should consider

Read More

IT Security Service

[separator headline=”h2″ title=”Multidefense technology to secure your network”] Technology poses security risks from within and outside every business. H&D Technologies can provide offsite IT security it security service and protection services along with monitoring and consulting services to eliminate risk. Inside Are you worried about the security risks associated with employees? H&D Technologies provides a secure network environment so you can

Read More