BLOG

25 Years of IT Service in San Diego: Thank You to Our Amazing Clients
This year marks Spotlink’s 25th anniversary in the IT services industry. As we celebrate this milestone, we want to focus on what truly matters: you, our clients. For 25 years, you've trusted us with your technology needs. You've invited us into your businesses,...

SpotLink Launches Cybersecurity Training Series for San Diego Businesses
San Diego-based IT services provider SpotLink is taking proactive steps to strengthen the local business community's cybersecurity posture. The company has announced the launch of its inaugural expert-led cybersecurity training series, designed specifically for...

SpotLink Expands IT Services to Montana: New Office Opens in Great Falls
Award-Winning IT Management & Cybersecurity Services Now Available in Great Falls For nearly 25 years, SpotLink has been providing leading-edge technology solutions to hundreds of small business clients. While headquartered in Southern California, the company is...

Scary IT
Author’s Note: I write my own blogs. That’s unusual. Blogs are often authored by a service and then reposted, especially in IT, or written by AI from a few key words. Instead, I choose the topics that might be of most interest to our clients and write to them –...

Changing Face of IT Support
Author’s Note: I write my own blogs. That’s unusual. Blogs are often authored by a service and then reposted, especially in IT, or written by AI from a few key words. Instead, I choose the topics that might be of most interest to our clients and write to them – to...

Best Remote Access – VPN, ZTNA or SASE?
Until just recently, there was really just one secure remote access method – Virtual Private Network, or VPN. But in the last few years, there are two new remote access methods you’ve heard of or will shortly – ZTNA and SASE. A quick overview of these access...

Global IT Meltdown – More to Come
We have seen the public impact of the recent global IT meltdown – days of cancelled/delayed flights, 911 systems that were down, and other government and commercial organizations essentially put on hold. Unfortunately, this is very unlikely to be the last such...

Physical Security in the Cyber Era
We all have gone into a high security building and saw those large cameras pointing down at us. In those same buildings, we’ve seen doors that were opened with the whisk of a little white card. But now, the convergence of computer networks and this physical security...

Say Goodbye to Passwords
Well, maybe not yet, but it’s definitely moving in that direction. The basic tenant of current security is that you authenticate using 3 types of information: Something you are, such as a username or email address. Something you know, such as a password or PIN. ...

IT Budgeting
Being August, it’s time again to think about budgeting for the next year. For most businesses, IT may just be a one- or two-line item on the budget. But that can lead to IT actuals being substantially off budgets. This isn’t because of bad management, but due to the changing nature of IT,, especially if all its various aspects aren’t considered.
In this article, I’ll review our recommended budgeting approach.….