Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Client Support Center

Dresner Group Blog

Dresner Group has been serving the Columbia area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Keep Your IT Running Smoothly 24/7

Keep Your IT Running Smoothly 24/7

It doesn’t matter how intensively a business uses their technology, there will always be a need for maintenance of some sort, whether it’s something as simple as a point-of-sale system or a full-fledged desktop workstation. Some businesses might have a complete IT department, while others might not have the resources to allocate to this role. We’ll walk you through how, no matter what kind of organization you operate, your business can benefit from a help desk solution.

0 Comments
Continue reading

Disasters Have Many Different Faces

Disasters Have Many Different Faces

A data loss incident might seem like an abstract concept, but it’s really quite simple when you boil it down to one cold, hard fact: your business suffers from downtime and it can no longer function the way it’s supposed to. When facing down a data disaster, there are a lot of ugly truths that your organization needs to be prepared to address. Here are three of them.

0 Comments
Continue reading

Have a Strategy for Your Work Email

Have a Strategy for Your Work Email

Email is generally considered to be one of the more effective ways of communication in the business world. An organization that can use email adeptly is one that saves time and money. Today, we’ll be discussing how you can get the most out of your email solution through the use of best practices and other tips.

0 Comments
Continue reading

Cybercrime and What You Need to Do to Protect Yourself

Cybercrime and What You Need to Do to Protect Yourself

Cybercriminals have been altering and ramping up efforts to steal data for much of the past decade. Once thought to just be a nuisance, now it has become evident that the cost of doing business now includes comprehensive network security strategies, designed to keep threats from affecting your business’ ability to create revenue. Let’s take a look at a working cybersecurity strategy.

0 Comments
Continue reading

What Does Internet Rights Advocacy Mean?

What Does Internet Rights Advocacy Mean?

The Internet is a vast and amazing place. Some have even argued that it is one of people’s best-ever inventions. Some would push it further by actively attempting to outline what rights an Internet user has. Advocacy groups have been popping up, and while it has had a marked effect on public policy in more progressive nations, some nations look on these groups with disdain. Today we will take you through human rights advocacy on the Internet, and what to expect going forward.

0 Comments
Continue reading

What You Need to Consider About BYOD

What You Need to Consider About BYOD

One of the biggest buzzwords in business these days is BYOD - Bring Your Own Device - and for good reason. There are plenty of operational benefits that an organization can enjoy by adopting a BYOD policy; but, BYOD isn’t an inherently perfect solution, which means that businesses that leverage it need to do so mindfully.

0 Comments
Continue reading

Determining Your Organization’s Cloud Needs

Determining Your Organization’s Cloud Needs

The cloud is one of the most valuable tools available to modern businesses, but the extent to which organizations utilize it will vary depending on their specific needs. For example, some organizations might be fine with the limited control offered by the public cloud, but others might need more dynamic features and control over their data with a private cloud. We’ll help you determine which is right for you, as well as some of the specific considerations needed for a private cloud solution.

0 Comments
Continue reading

Virtual Reality has a Limitless Future

Virtual Reality has a Limitless Future

Virtual reality, or VR, is a technology that not many people understand how to make the most of. Most people's experiences with VR is something that is achieved through a third-party application, be it a smartphone or a full-fledged headset. Most of those who experience VR do so without a first-person perspective, with only 16 percent of about 3,000 people polled by Statistica ever actually trying out a “real” VR headset. We’ll give you an idea of what modern VR technology looks like, as well as what the future holds for this technology.

0 Comments
Continue reading

Is Implementing Security Keys Worth It?

104830313_Security-Keys_400

There are many varieties of authentication that you have the option to leverage. Today, we’ll discuss the fundamental differences between them, and examine the pros and cons of one option: the physical security key.

Continue reading

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

0 Comments
Continue reading

How to Mitigate Unhappy Online Opinions

How to Mitigate Unhappy Online Opinions

As nice as it would be to always please everybody with your business services, it just isn’t going to happen. Sooner or later, you’re going to encounter someone who isn’t pleased, and they’re going to have the capability to do some damage to your reputation. Fortunately, there is a way you can mitigate this damage.

0 Comments
Continue reading

Shrug Off Downtime with Managed IT Services

Shrug Off Downtime with Managed IT Services

Do you know what can completely kill a business’ momentum? Downtime. Businesses of all types look for a myriad of ways to save themselves the headaches that come from significant downtime. One way that is sure to reduce an organization’s downtime is by having conscientious IT management and support at the ready. One problem with this is that it's typically costly to hire a team of IT professionals with the experience and knowledge to keep your technology up and running.

0 Comments
Continue reading

Use These Best Practices to Create Secure Passwords

Use These Best Practices to Create Secure Passwords

It’s one thing to implement password security for your business, but another entirely to convince your users that it’s for the best in regards to network security, rather than implementing it as an annoyance to them. Your organization should make using new passwords and best practices as easy as possible to expedite the security process.

0 Comments
Continue reading

Educate Your Staff to Avoid Phishing Attempts

Educate Your Staff to Avoid Phishing Attempts

There are many threats out there in the online world that want to see your business suffer, and they will go to any lengths to make it happen. Now, we all have seen the various emails that these hackers and scammers might send to unsuspecting users, but these are only the beginning. The real threat comes from specialized phishing attempts, and they come in many different forms. We’ll help you identify them.

0 Comments
Continue reading

Manufacturers Are Really Leaning on IT

Manufacturers Are Really Leaning on IT

One industry that most people wouldn’t necessarily consider to be IT-rich is manufacturing. With automation becoming a major point of emphasis for many businesses, IT has taken on a larger role for today’s small and medium-sized manufacturers. Today, we will take a long look at what the manufacturer’s IT needs are, and what solutions they use to help steer their company forward.

0 Comments
Continue reading

Enterprise Security for the Small and Medium-Sized Business

Enterprise Security for the Small and Medium-Sized Business

Does your organization take network security as seriously as it should? It’s easy to forget with today’s advanced security offerings that the online realm is a dangerous place, but the truth of the matter is that you can’t risk your business’ security--not even for a moment. We’ll walk you through how your organization can minimize threats to security, as well as give you a primer regarding what’s at stake.

0 Comments
Continue reading

What Does Solid Cybersecurity Look Like?

What Does Solid Cybersecurity Look Like?

Cybersecurity is one of those hot-button issues that you should understand well enough to protect your business and yourself. Basically, as your organization holds more sensitive information, you’ll need to be more vigilant about how you approach cybersecurity. Today, we’ll take a look at the design and practices of organizational cybersecurity, and how you can work to bridge the gap between the solutions you can’t afford and the ones you already use.

0 Comments
Continue reading

Tip of the Week: How to Customize Your Microsoft Word Tools

Tip of the Week: How to Customize Your Microsoft Word Tools

It’s probably pretty fair to say that Microsoft Word has become the poster child for word processing programs - and for good reason: its tools and capabilities are very well-suited for the user’s needs. Did you know that you can even adjust Word so that it better fits your use of it? For this week’s tip, we’ll go over a few ways to do so.

0 Comments
Continue reading

Is Your BYOD Strategy About to Backfire?

Is Your BYOD Strategy About to Backfire?

Bring Your Own Device, or BYOD, has become a very popular option for businesses seeking to save a bit of their budget on obtaining and maintaining devices for their employees. While this is an economically commendable practice, it has the potential to generate risks for your business if left unchecked. Let’s discuss the pros and cons of BYOD, and how you can make it work for your business.

0 Comments
Continue reading

Smartphone Manufacturers Building Foldable Screen Devices

Smartphone Manufacturers Building Foldable Screen Devices

Foldable screens are coming… at least, they are relatively soon. Manufacturers are now producing OLED displays that are relatively flexible, and many of them have committed to producing foldable screen devices for 2019.

0 Comments
Continue reading

Contact Us

Learn more about what Dresner Group
can do for your business.

410-531-6727

Dresner Group
5950 Symphony Woods Road Suite 302
Columbia, Maryland 21044

Client Service Login