two-factor authentication labeled on a button on a computer keyboard with person about to press button

Two-Factor Verification: Does it really make a difference?

Anyone with online accounts or cell phones has probably received requests to enable two-factor authentication (2FA) by now. These invitations typically cite enhanced security as a reason to add this extra step to the login process, but how does 2FA work and why should we enable it on our devices and accounts?

Read More »
photo that shows different options for data recovery

3 Keys to Successful Data Recovery

The server room flooded, your computers are all stolen or destroyed, and hackers are holding your data hostage unless you deliver an absurd amount of bitcoin. Oh nooooo! These are the nightmares of business and nonprofit leaders everywhere. Only in our worst dreams could these events coincide, but the waking world holds a real risk of one or more of these calamities occurring on any given day.

Read More »
Managed IT system administrator in glasses working on laptop and correcting errors in server hardware

What is Managed IT?

As technology becomes central to everything we do, more and more organizations are turning to managed IT. Those that haven’t yet made the switch to an outsourced IT provider are often unsure about what the service covers or the benefits it offers. After all, we already manage our IT services, don’t we? Of course you do, since every business and nonprofit faces complex technology demands in the digital age – and that’s precisely why managed IT is such a popular choice.

Read More »

Updates to Our Citrix Hosting Environment

On Sunday, 2/24/2019, the Halt, Buzas & Powell, LTD Managed IT Services department will be rolling out our new Hosted Citrix Environment to our staff and clients. This process should be fairly seamless, but much like any big change, there are some hiccups to be expected. The goal of this blog post is to provide a F.A.Q. for some of the common questions. The most important point I want to make here though – if at any point of time you have an issue with accessing the new Citrix – please reach out to us at support@cpas4you.com.

Read More »
Paper fish cutout with "username" and "password" written on it, on a hook in front of a fishing net

Deter Hackers by Learning to Recognize Phishing Attempts

Cybercrime is a growing threat to businesses and individuals today. From ransomware like the WannaCry cryptoworm that spread rapidly in 2017 to more localized attacks that expose private data, these crimes cost American businesses billions of dollars each year and can pose an existential threat to smaller companies.

Read More »

IT Policies – What Are They and Why Do We Need Them?

Policy. The one word guaranteed to bring glazed eyes and stifled yawns to any conversation. Surely there are better things to talk about. For example, yesterday’s baseball scores or the latest crazy cat video. Plenty of organizations, be them small, medium, large, non-profit, partnerships and yes, even multi-national enterprises, exist without them, so WHY do you need them? AND, for that matter, what is a policy anyways? We will attempt to break all of this down and help you get started in the wild world of corporate policy.

Read More »

Information Security in a Digital World

What is one thing every organization has in common regardless of size? The one-person shops to the small non-profits. The mid-market company fighting tooth and nail to make it in a competitive arena, and further on up to the company of ten-thousand spanning thirty states across the country. Even those multi national mega-corporations have this in common. What could an international corporation of 500,000 have in common with a local family owned diner of three? Customer information, of course.

Read More »