5 Tips for Network Security in 2017 Part 1
To recap from our latest I HATE IT Eblast we need you to really consider the security needs of the latest internet threats. We all love the internet to meet our needs for instant information,...
View ArticleTHE CLOUD and DOWNTIME
For those who are unaware. The CLOUD is just someone else’s computer. Truly. That is just it. The hardware is the same, just located “somewhere else”. There are many perks to The Cloud however, there...
View Article5 Tips for Network Security in 2017: Part 2
If you skipped Part 1 → go back. In this blog, I want to change your thought pattern on how to stop Internet Malware. The first and most important premise of this is for you to understand it is not...
View ArticleHow will Internet Service Providers collect and sell your browser history?
On Tuesday, March 28th, House of Representatives voted to give internet service providers (ISPs) such as AT&T and Verizon the ability to collect and sell your browsing history for advertising...
View Article5 Tips for Network Security in 2017: Part 3
If you skipped Part 2 → go back. In our latest I HATE IT eblast, we asked the question “What is your internet usage policy for your business?” Once you decide what you want to allow and what you would...
View ArticleIntroducing FileFetch, a file sharing playform by IRIS Solutions
Are you curious about a control oriented alternative to file sync and share platforms? The modern workforce is not tethered to a desk in an office. You are onsite at a job, visiting a client, or...
View ArticleA BETTER AND MORE SECURE WAY TO SHARE FILES
How do you share your files? Where are they kept and are they secure? Who has access to those files? Can they be deleted? Traditional file sharing is based on a File-Sharing Server. This is where...
View ArticleLOCAL vs. CLOUD vs. HYBRID File Sharing
Ok. So we have the FileFetch offering for our clients that want access to their data while they are on the move (AKA NOT IN THE OFFICE) while still having the same amount of security and protection...
View ArticleSuccess Story: Why monitoring helps prevent downtime.
If the server is the hub of the business network, what do you do when technology fails? Do you have a plan? What happens if it stutters? And by stutter- I mean a server shutting down randomly. We...
View ArticleGuest Post WatchGuard VPN Enables Company to Expand with Ease
Founded in 1985, Network Aviation Group is one of the UK’s leading providers of sales, marketing, and other key services to international air cargo companies. Its activities span five continents and...
View ArticleWhat FileFetch Means for Users vs. Business Owners
Users want Mobile App Access and Editing to Company Files Seamless File Savings and Syncing Business Owners Want Their team to be able to work from anywhere Data Control to Prevent Information Leakage...
View ArticleWe Are Here For You
Some clients need more support than others. Within IRIS Solutions, we have techs that are Technical Account Managers. Basically, they are the senior level tech that is the point person to help...
View ArticleCatch Me If You Can
If you have seen the movie you remember Frank Abagnale Jr. If not, check out this brief summary on the trailer here. In the case of Mr. Abagnale, they did catch him but it took quite a while....
View ArticleOH! The Simple Things in Life.
We often talk about how technology is a double edged sword. The advancements and innovations have thrown our world to be more connected than we could have imagined in the early 1990s, let alone the...
View ArticleSuccess Story: WannaCry? How about… no.
As a Managed IT Service Provider in Charlotte, NC, IRIS Solutions can say not a single one of our clients got hit with the massive WannaCry outbreak which happened a couple weeks ago. Why? We are...
View ArticleWhat is Wannacry Ransomware? How can I stay protected?
You come into work just like any other day. Make coffee, sit down at your desk, login to your PC only to realize the applications that run your business no longer work. You try another with the same...
View ArticleHeidi Knew That This Was A Scam
Our administrative assistant, Heidi, just received a phone call from an anonymous caller. The man on the phone said he was “Windows IT Support”, that her computer was sending them “signals”, and it...
View Article2017 Warrior Dash!
.wp-post-image{display:none;} .tiled-gallery.type-rectangular > p { display: none; } .gallery-row > p { display: none; } The post 2017 Warrior Dash! appeared first on IRIS Solutions.
View Article5 Tips for Network Security in 2017: Part 4
If you skipped Part 3 → go back. Patching, Patching, and more Patching. Adobe came out with this product years ago as a way to transfer documents with a central format. PDF - Personal Document Format....
View Article5 Tips for Network Security in 2017: Part 5
If you skipped Part 4 → go back. I mentioned at the first part of this blog series to take a multi-tiered approach. This approach is necessary with today’s landscape. ANTI-VIRUS is not enough....
View Article