Loading...

Tag: Amarillo Computer Company

The 3-2-1 Backup Strategy

The 3-2-1 backup strategy is well-known across the IT industry. Despite drastic changes to the technology powering backups and calls for different configurations, the 3-2-1 backup strategy provides a baseline rule by which companies can protect the data on which they rely. The 3-2-1 backup strategy states that you should keep: THREE copies of your […]

View Details

Security Compliance Policies- Part 2

As we started discussing a few weeks ago, information security is a key component of keeping your company’s data secure. Security policies include processes for accessing and handling information, whether on-site or remotely. Here are some more security policies that you should have in place for your business. Account and Password PolicyMore than just setting […]

View Details

Security Compliance Policies- Part 1

Information security is a key component of keeping your company’s data secure. Without proper information security, you could be vulnerable to cyberattacks, data breaches, or leaks of sensitive information. Security policies include processes for accessing and handling information, whether on-site or remotely. Security Incident Response PolicyIncidents are inevitable, and having an understanding of the responsibilities, […]

View Details

What Is 5G?

I5G refers to the protocol used by our mobile devices and the cellular networks they use to communicate and it stands for fifth-generation. You are probably already familiar with 3G and 4G networks because they were the last major upgrade to our mobile networks. So, what makes each generation different, and what makes 5G so […]

View Details

Reality of Working from Home

As the COVID-19 pandemic continues and social distancing remains imperative in preventing further spread, many employers are allowing some or even all their staff to work remotely. And the uncertainty of what comes next means we don’t know when companies will be prepared for their return. So, should you have a plan for a permanent […]

View Details

Five Reasons to Outsource Your IT

Changes in technology are causing companies to radically change the ways they manage their IT operations. Many businesses want to take advantage of cutting edge technology, but their internal IT teams don’t have the resources or the knowledge to keep up with the changing demands. Managed IT services from Axigent can help ensure that your […]

View Details

Chromebook Tips

As some students head back to their classrooms and others do so virtually, we wanted to share a few tips on using the Chromebooks that many school districts provide for their students’ use. Using your Android phone to unlock your Chromebook On your Chromebook, at the bottom right, click the clock. Select Settings. Under “Connected […]

View Details

Internet of Things

Securing the Internet of Things A wide variety of internet-connected devices such as smart-assistant speakers like Alexa and Google Home, security systems, thermostats, electronic appliances, lights in household and commercial environments, alarm clocks, and more, collectively referred to as Internet of Things (IoT) devices, are becoming more and more popular in both residential and commercial […]

View Details

Roadblocks to Efficiency

The rapid transition to cloud computing that we are seeing today is unprecedented. The move has been rapid and it has had a powerful impact on our entire modern society. Digital resources and data are available at the touch of a screen. The cloud allows for scalability that was unthinkable just a few years ago […]

View Details

The Cloud is Green

Cloud computing is becoming more and more common and it can transform the way your business delivers and receives IT services. Cloud computing providers allow businesses to connect to shared servers containing shared programs. This allows you to reduce your costs because you no longer need to purchase all of the infrastructure, let alone manage […]

View Details