BLOG

Spear Phishing: War Stories From the Front

Spear Phishing: War Stories From the Front

Electronically speaking, we live in dangerous times. It is a quickly changing arena where cyber-security systems are adapting new protective techniques just as fast as the criminals are coming up with new approaches around them.

read more
Benefits of a Managed Services Provider

Benefits of a Managed Services Provider

At SpotLink, we have been managing IT for nearly 20 years, and been honing our skills as an MSP for almost 10. In that time, we have seen how effective IT management can have a marked benefit to a business, as well as how poor IT management can damage it. We are always ready to help your business have a competitive advantage to win in the market place.

read more
TekTalk: Data Protection and Recovery

TekTalk: Data Protection and Recovery

Some would argue that without your data, you are without a business. This is supported by the fact that only around 17% of businesses that experience a disaster survive for 2 years. Data Protection is one of the 3 Pillars of proper infrastructure management.

read more
Do You Control Your Mission Critical Data?

Do You Control Your Mission Critical Data?

Cloud computing has caused a massive shift in how many companies do business; in some ways the shift is comparable to the introduction of the Internet itself. A big part of cloud computing is moving servers, raw data, application data, or business processes to the cloud.

read more
TekTalk: Cyber Security

TekTalk: Cyber Security

CEO and Founder Robert Hood reviews the three segments to optimal security implementation: Defense, Monitoring, and Response. No matter the size, industry, or budget, Robert shares essential insight on how to protect your business.

read more
Is there a Cyber Ninja after you?

Is there a Cyber Ninja after you?

It is important to consider two key points when discussing security for your information systems: security is a process, not a destination, and you can never be 100% secure. Security is a continual process of review, plan, implement, monitor, and repeat.

read more
TekTalk: The Principles of IT Budgeting

TekTalk: The Principles of IT Budgeting

It’s never too early to organize your IT budget for the next calendar year. Making smart decisions early can save your business a sufficient amount of time and money. Spotlink CEO and Founder Robert Hood reviews his simple 6-step budgeting process.

read more
Two Factors of Proper Data Management

Two Factors of Proper Data Management

IT service providers have two key roles when it comes to ongoing operations, Data Protection and Data Security. While they sound like one in the same, these two responsibilites are very different.

read more
TekTalk: Surviving Technology Disasters

TekTalk: Surviving Technology Disasters

SpotLink CEO and founder Robert Hood will review strategies and techniques to help you and your business technology not only survive disasters, but continue to operate and service your clients when you are still trying to recover.

read more
IT Alert:  WannaCry Ransomware

IT Alert: WannaCry Ransomware

Last Friday a new version of Ransomware, dubbed WannaCry, was release worldwide, affecting computers in as many as 99 countries. This morning a new variant was also released. Companies such as FedEx, the British National Health Service, and LATAM airlines have been infected.

read more