Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Client Support Center

Dresner Group Blog

Dresner Group has been serving the Columbia area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Upgrades Are Necessary as Microsoft Retires Two Heavy Hitters

Upgrades Are Necessary as Microsoft Retires Two Heavy Hitters

Windows might be the most popular operating system out there, but it’s not perfect. This is why your systems receive patches and security updates as they are released. The problem, however, is that these updates don’t last forever, and one of the most popular Windows systems out there will lose access to support on January 14th, 2020. Are you going to update now, or are you going to risk your systems going without critical updates?

0 Comments
Continue reading

VoIP Can Present Some Unexpected Value

VoIP Can Present Some Unexpected Value

Telephones have been in the office for so long that it would be weird if they weren’t in the office in some way, shape or form. With the advent of cloud-based options, however, telephone communications have become much more sophisticated and accessible. A voice over IP system that uses the Internet is one way that you can take advantage of modern technology to reduce costs and optimize your network.

0 Comments
Continue reading

Give Your Users a Little Support and See What They Give Back

Give Your Users a Little Support and See What They Give Back

Karma is a pretty powerful force. If you do enough good, good will become of you. At least, that’s the idea. The same idea applies to the people around you; if you cultivate a positive environment and offer everything your staff needs to do a good job, they will perform better than the alternative.

0 Comments
Continue reading

Unveiling the Managed Service Provider

Unveiling the Managed Service Provider

We talk a lot about managed services for small and medium-sized businesses, but unless you’re familiar with the business model, you won’t be able to learn much about who we are and what we provide to organizations like yours. Today we are hoping to clear up some definitions of managed service providers, or MSPs, as well as what kind of services we can provide for businesses with limited budgets.

0 Comments
Continue reading

Risks that Come From IT Threats

Risks that Come From IT Threats

In the business world, it’s natural that you encounter those that want to see you fail, but there are also those that simply want to piggyback off your success. In many ways, security threats are a little bit of both, as they can potentially steal your data and leverage it to their benefit, as well as cause harm to your organization. We’ll dig into some of the details of the most common security threats and the risks they cause for your business.

0 Comments
Continue reading

GDPR: One Year In

GDPR: One Year In

Data privacy is a serious issue in the world today, and the European Union’s General Data Protection Regulation, or GDPR, is perhaps the greatest example of how these issues are being addressed. Let’s take a look at how GDPR has shaped the computing world over the past year, as well as how events have exposed certain considerations regarding individual data privacy.

0 Comments
Continue reading

Be Mindful of All the Internet of Things Devices on Your Network

Be Mindful of All the Internet of Things Devices on Your Network

The Internet of Things is a phenomenon that must be accounted for, as the sheer number of devices accessing networks means that security is always a concern. How can your organization be sure that the Internet of Things doesn’t create problems? It all starts by being aware of how your organization’s network infrastructure operates in relation to the Internet of Things.

0 Comments
Continue reading

Tip of the Week: Selecting the Right Data Warehouse for Your Needs

Tip of the Week: Selecting the Right Data Warehouse for Your Needs

Data is everywhere. Nowadays, effectively everything we do produces data of some kind - especially where your business is concerned. If leveraged properly, your business can make good use of the data it collects throughout its operations. For this week’s tip, we’ll talk about how you can do so with a data warehouse, and discuss how to select the right one.

0 Comments
Continue reading

Be Proactive to Avoid Substantial Downtime

Be Proactive to Avoid Substantial Downtime

Downtime can be devastating for your business if you allow it to persist. Unfortunately, many businesses don’t have the mindset needed to keep downtime from influencing operations, and it’s most telling when a disaster strikes. We’re here to help you understand downtime, its effects, and what you can do to prevent it.

0 Comments
Continue reading

How Technology Changed the Office Forever

How Technology Changed the Office Forever

It’s hard to think about the modern office without considering the role that information technology plays in it. If you think about it, it wasn’t so long ago that organizations were struggling with gaining access to important resources and maintenance, but sometimes it’s important to reflect on the way things were before IT infested offices all over the world. Let’s discuss how the IT-less office functioned before and after technology solutions were implemented en masse.

0 Comments
Continue reading

The Time Has Come for SQL Server 2008 and 2008 R2

The Time Has Come for SQL Server 2008 and 2008 R2

Software solutions don’t last forever. While patches and security updates can stave off the inevitable for quite some time, it’s impossible to maintain a specific solution forever. Support is eventually cut off, and businesses are left exposed if they haven’t taken the time to prepare. In the case of Microsoft SQL Server 2008 and 2008 R2, you are running out of time.

0 Comments
Continue reading

Taking an Exploratory Stab at Spear Phishing

Taking an Exploratory Stab at Spear Phishing

Chances are, you’ve heard of “phishing” - a cybercriminal’s scam that steals data, access credentials, and other sensitive information by fooling a user into thinking they are providing this information to someone who is supposed to have access to it. However, there are a few different kinds of phishing, based on how it is carried out. Here, we’ll discuss the realities of spear phishing, and the risks it poses to your business.

0 Comments
Continue reading

Keep Your IT Running Smoothly 24/7

Keep Your IT Running Smoothly 24/7

It doesn’t matter how intensively a business uses their technology, there will always be a need for maintenance of some sort, whether it’s something as simple as a point-of-sale system or a full-fledged desktop workstation. Some businesses might have a complete IT department, while others might not have the resources to allocate to this role. We’ll walk you through how, no matter what kind of organization you operate, your business can benefit from a help desk solution.

0 Comments
Continue reading

Why You Can Trust Dresner Group with Your Cloud Migration

175191655_cloud-computing-400_edited

The cloud has long been proven to be an excellent tool for businesses to leverage, able to fulfill a wide variety of operational needs. However, just because a cloud solution is able to fulfill these needs, doesn’t mean a given cloud service provider will be able to quickly provide the support you need, when you need it. In other words, your cloud solution is only as good as your cloud solution provider is.

Continue reading

Tip of the Week: Proactive Maintenance Keeps Tech Running Smoothly

Tip of the Week: Proactive Maintenance Keeps Tech Running Smoothly

Whether they are expected or not, there will always be situations when your business incurs some damage or loss due to natural disasters, downtime, or other issues. You might find that a little preparation could have kept some of the disaster at bay, and it could honestly save you a ton in terms of lost time and resources. In fact, it could save your organization from the brink of disaster.

0 Comments
Continue reading

Disasters Have Many Different Faces

Disasters Have Many Different Faces

A data loss incident might seem like an abstract concept, but it’s really quite simple when you boil it down to one cold, hard fact: your business suffers from downtime and it can no longer function the way it’s supposed to. When facing down a data disaster, there are a lot of ugly truths that your organization needs to be prepared to address. Here are three of them.

0 Comments
Continue reading

Efficiency Is More Likely to Produce Business Success

Efficiency Is More Likely to Produce Business Success

Business can be tricky, especially if you’re good at it. It’s important to know when to be comfortable with your position without starting to feel complacent. If you fall into this trap, you’ll be running the risk of hindering your organization’s growth, potentially blocking any future successes.

0 Comments
Continue reading

Have a Strategy for Your Work Email

Have a Strategy for Your Work Email

Email is generally considered to be one of the more effective ways of communication in the business world. An organization that can use email adeptly is one that saves time and money. Today, we’ll be discussing how you can get the most out of your email solution through the use of best practices and other tips.

0 Comments
Continue reading

Cybercrime and What You Need to Do to Protect Yourself

Cybercrime and What You Need to Do to Protect Yourself

Cybercriminals have been altering and ramping up efforts to steal data for much of the past decade. Once thought to just be a nuisance, now it has become evident that the cost of doing business now includes comprehensive network security strategies, designed to keep threats from affecting your business’ ability to create revenue. Let’s take a look at a working cybersecurity strategy.

0 Comments
Continue reading

What Does Internet Rights Advocacy Mean?

What Does Internet Rights Advocacy Mean?

The Internet is a vast and amazing place. Some have even argued that it is one of people’s best-ever inventions. Some would push it further by actively attempting to outline what rights an Internet user has. Advocacy groups have been popping up, and while it has had a marked effect on public policy in more progressive nations, some nations look on these groups with disdain. Today we will take you through human rights advocacy on the Internet, and what to expect going forward.

0 Comments
Continue reading

Contact Us

Learn more about what Dresner Group
can do for your business.

410-531-6727

Dresner Group
5950 Symphony Woods Road Suite 302
Columbia, Maryland 21044

Client Service Login