IT Starts with Strategy
Learn how technology can maximize your business with a comprehensive IT strategy and support plan.
By:
Stephanie Hurd
December 13th, 2021
12/15/2021 UPDATE: Be sure to investigate all endpoints for signs that unauthenticated users exploited the Log4j flaw. The nature of a zero-day exploit means that attackers were able to start exploiting the vulnerability before software vendors were even aware it existed. Evidence suggests exploitation attempts began as early as December 1. Additionally, Microsoft published an update yesterday stating they’ve “observed multiple threat actors leveraging the CVE-2021-44228 vulnerability in active attacks.” Microsoft Threat Intelligence Center (MSTIC) says these tracked threat groups include nation-state activity groups from China, Iran, North Korea, and Turkey. While no one detection tool is perfect, this Log4ShellEnumeration, Mitigation, and Attack Detection Tool is one of the more helpful tools we’ve found. But keep in mind that these tools alone cannot replace experienced IT and security professionals evaluating your systems for signs of exploitation. 12/14/2021 UPDATE: The US Cybersecurity & Infrastructure Security Agency (CISA) created a webpage specifically for sharing the most recent information related to the Log4j Vulnerability. Check the CISA’s Apache Log4j Vulnerability Guidance page regularly for new updates and additional information as it becomes available. 12/13/2021 ORIGINAL POST: Late last week, our team learned of a critical security vulnerability affecting systems that use Java-based programs. This article includes a basic explanation of our understanding to date and how our team is responding.
Technology Strategy | Microsoft | Business Strategy
By:
Stephanie Hurd
October 28th, 2021
Do you have piles of notes lying around your computer? Are you constantly writing things down in different notebooks, then scrambling to find where you put the notes from that last project update or team meeting? Microsoft OneNote is your answer. It has all the productivity and organization you need conveniently tied to all your other Microsoft applications and functions.
Technology Strategy | Microsoft
By:
Stephanie Hurd
October 4th, 2021
It's here. This week, Microsoft is launching the latest version of Windows, Windows 11. This is certainly no secret, especially if you've been watching Sunday night football and the flood of Microsoft ads during the game.
Technology Strategy | Business Strategy | Outsourced IT Support
By:
Stephanie Hurd
September 24th, 2021
The overwhelming responsibilities of IT are stressful. As if daily new security threats weren't enough, you're also keeping up with general troubleshooting and network administration demands. You're facing more pressure to perform amid staffing shortages and a global pandemic that crammed five years of technology advancement into a few months. It just never feels like there are enough hands to respond to day-to-day end-user support needs while ensuring the network runs as securely and efficiently as possible.
Technology Strategy | Business Strategy | Outsourced IT Support
By:
Stephanie Hurd
September 20th, 2021
You have a capable IT team, but projects seem to drag on forever. Plus, you never have time to optimize your technology or plan for improvements because day-to-day support consumes all your attention. You outsource some specialized functions, but a third party can't completely take tasks off your plate when they require assistance from your team to gain network information and access.
Technology Strategy | Business Strategy | Cybersecurity | Threat Prevention
By:
Stephanie Hurd
August 30th, 2021
Have you recently completed a form or answered questions from your cyber insurance carrier? There was likely something in there about multi-factor authentication. And you probably agreed to ensure multi-factor authentication (MFA) is in place for certain types of users and network access.
Technology Strategy | Purchasing | Outsourced IT Support
By:
Stephanie Hurd
August 16th, 2021
You have no problem setting up a new computer at home. It’s not difficult and doesn’t take very long. So why is your IT company adding hundreds, possibly thousands of dollars for labor to install new computers in your business? This is the number one most common question we get when we install new or replacement computers. So, let’s break down exactly what goes into installing a new computer in a business environment and what you can expect to pay for that service.
By:
Stephanie Hurd
July 23rd, 2021
Today was what we call a big, freaking deal at Innovative. And for all the RIGHT reasons. First off, it was our very first, post-COVID in-person, all-hands company meeting. 🙌That means real-life friends and company-sponsored breakfast goodies 🍩 that tasted way better than whatever day-old muffins we’ve scrounged up in our kitchens the past year and a half. Secondly, our chief Innovator, Jason, announced not one, not two, but FIVE internal staff promotions! ❗ That’s right – this little two-person computer shop that started 20 years ago now how as a full-fledged management team of home-grown leaders. Pretty cool, huh? 😎
By:
Stephanie Hurd
May 21st, 2021
Innovative, The Community Foundation of Washington County and Family Healthcare of Hagerstown partnered with the Boys and Girls Club of Washington County (BGCWC) on a $122,355 technology overhaul at the BGCWC's four locations. The project will give the Boys and Girls Club of Washington County the necessary tools to work from home and more efficiently share digital information between locations; give the kids they serve reliable access to online learning and virtual activities; and maintain network security, information privacy, and children's online safety.
By:
Stephanie Hurd
April 29th, 2021
Copiers. You don’t want to think about what a headache they can be. They’re big. They’re expensive. And you don’t have to tell me how finicky they can be – I once worked in a basement where the copier jammed when it rained.