Voted Best Network Integrator in Arizona (623) 688-TECH (8324)

By: azdatacom | September 19, 2017

If you are using the native mail app on your iPhone or iPad, and upgrade to iOS 11, you may encounter issues.

How does this affect me?

By: azdatacom | April 05, 2017

In recent years, enterprise sync and share solutions have become popular mechanisms for protecting endpoint data. Even so, sync solutions do not typically provide the same level of protection as a true backup solution. The reason for this is simple. Although there are undeniably some overlaps in functionality, sync software and backup software were created for completely different purposes.

Backup Software vs. Sync and Share Solutions

    Backup software has one purpose and one purpose only — to allow the organization to get its data back following a data loss event. While enterprise sync software may allow for data recovery in certain situations, data recovery is not the software's primary focus.

Enterprise sync softwa...

By: azdatacom | March 05, 2017

Take a guess at the percentage of U.S. public schools with some form of web connectivity. Do you think it's around 25%? Could it be a 50-50 split? Perhaps it's pushing three-quarters of the pie?

Stephanie Banchero, the National Education Reporter for The Wall Street Journal, would tell you to keep on guessing.

"Virtually every school in America has some Internet access, thanks, in part, to a federal program known as E-rate, which provides about $2.3 billion annually to connect schools and libraries to the web," Banchero wrote earlier this year.

There are, of course, pros and cons to making the Internet available in the majority of schools.

Purely from an educational standpoint, it's hard to make a case that Internet access is a bad th...

By: azdatacom | January 16, 2017

  If only online security issues could be solved with sorcery: a magic wand, some incantations, and poof! Troubles disappear.

  Sadly, magic only works in books and movies. Out here in the real world, the bad guys always have the advantage, and you need more than wizardry to keep them off your network.

  Criminals that ply their trade in cyberspace are mostly driven by economics. They might be after the banking credentials for your small business so they can drain funds from online accounts. If your business is connected to sensitive industries, the bad guys might be foreign agents intent on stealing secrets. Or maybe they're in the ransomware business, hoping to encrypt one of your PCs so they can demand a ransom to unlock it.


By: azdatacom | January 16, 2017

 "We're missing a laptop!"   These words are not something you want to hear, but the chances are, it's going to happen at some point. Unfortunately, data on the majority of SMB laptops is not encrypted, so what exactly does it mean for your company if this happens?

   It means that if the bad guys pull the hard drive from the missing laptop and plug it into a running system, then chances are they can access to your data. A simple user ID and password are not going to be adequate protection.

   Are the thieves going to bother even looking at the stolen laptop? Many years ago, the hardware itself would fetch a decent amount on auction sites as "previously owned." With the professionalization o...