photo that shows different options for data recovery

3 Keys to Successful Data Recovery

The server room flooded, your computers are all stolen or destroyed, and hackers are holding your data hostage unless you deliver an absurd amount of bitcoin. Oh nooooo! These are the nightmares of business and nonprofit leaders everywhere. Only in our worst dreams could these events coincide, but the waking world holds a real risk of one or more of these calamities occurring on any given day.

Read More »

Updates to Our Citrix Hosting Environment

On Sunday, 2/24/2019, the Halt, Buzas & Powell, LTD Managed IT Services department will be rolling out our new Hosted Citrix Environment to our staff and clients. This process should be fairly seamless, but much like any big change, there are some hiccups to be expected. The goal of this blog post is to provide a F.A.Q. for some of the common questions. The most important point I want to make here though – if at any point of time you have an issue with accessing the new Citrix – please reach out to us at support@cpas4you.com.

Read More »
Paper fish cutout with "username" and "password" written on it, on a hook in front of a fishing net

Deter Hackers by Learning to Recognize Phishing Attempts

Cybercrime is a growing threat to businesses and individuals today. From ransomware like the WannaCry cryptoworm that spread rapidly in 2017 to more localized attacks that expose private data, these crimes cost American businesses billions of dollars each year and can pose an existential threat to smaller companies.

Read More »

IT Policies – What Are They and Why Do We Need Them?

Policy. The one word guaranteed to bring glazed eyes and stifled yawns to any conversation. Surely there are better things to talk about. For example, yesterday’s baseball scores or the latest crazy cat video. Plenty of organizations, be them small, medium, large, non-profit, partnerships and yes, even multi-national enterprises, exist without them, so WHY do you need them? AND, for that matter, what is a policy anyways? We will attempt to break all of this down and help you get started in the wild world of corporate policy.

Read More »

Information Security in a Digital World

What is one thing every organization has in common regardless of size? The one-person shops to the small non-profits. The mid-market company fighting tooth and nail to make it in a competitive arena, and further on up to the company of ten-thousand spanning thirty states across the country. Even those multi national mega-corporations have this in common. What could an international corporation of 500,000 have in common with a local family owned diner of three? Customer information, of course.

Read More »