Blog

Dresner Group Blog

Our technology blogs feature IT tips and best practices for businesses in Columbia, Baltimore, Bel Air and in and about Maryland since 2002.

Tip of the Week: Complex Password Practices

Tip of the Week: Complex Password Practices

With more people depending on technology, it stands to reason that there are more scams out there than ever before. The individuals (and groups) responsible will look for and exploit any vulnerability to attack your employees in order to get at your business’ critical data. Let’s take a look at a couple of tips that you can use to keep your passwords strong and your password-protected accounts secure. 

0 Comments
Continue reading

The Difference Between Modern Security Systems and Legacy Camera Systems is Crystal Clear

The Difference Between Modern Security Systems and Legacy Camera Systems is Crystal Clear

Businesses have continued to face an ever-changing security landscape, and technology has been playing a lot of catchup over the past several years. Accountability is more important than ever before, and taking advantage of modern-day technologies can not only ensure that company assets are being watched, but provide intelligent insights faster and more effectively than ever before.

Let’s break down some of the major differences between older security systems and their modern counterparts, detailing just how much value a business can get from upgrading.

0 Comments
Continue reading

Tip of the Week: Improving Business Productivity in Five Ways

Tip of the Week: Improving Business Productivity in Five Ways

“Improving productivity” is far from an unheard goal among business owners. What is less common, unfortunately, is a strategic plan to actually do it. We wanted to help, so we’ve assembled five strategies that can help improve productivity in the modern workplace.

0 Comments
Continue reading

How to Get the Most Out of Your In-House Computing

How to Get the Most Out of Your In-House Computing

More businesses than ever before are making adjustments toward a more digital business involving more complex and sophisticated technology, making more reliable and efficient IT of paramount importance. There are benefits to outsourcing your IT resources, but there are also times when you might consider hosting your infrastructure in-house. Let’s go over the benefits and how you can benefit from a mixture of in-house and outsourced IT.

0 Comments
Continue reading

How to Avoid Insecure, Ineffective, and Just Plain Bad Passwords

How to Avoid Insecure, Ineffective, and Just Plain Bad Passwords

Password. 123456. Guest. Qwerty. These are just a few examples of passwords that are, in a word, terrible. To help you avoid using passwords like these, let’s go over what a good password is and how to choose one—starting with what you need to avoid.

0 Comments
Continue reading

Exposing Your Staff to Every Cybersecurity Problem Can Have Problems of Its Own

Exposing Your Staff to Every Cybersecurity Problem Can Have Problems of Its Own

Cybersecurity is one part of your business’ computing that you must prioritize, as the fallout of a data breach could, in many cases, be enough to shutter your business for good. You want to be seen as a company that takes data security seriously, and to this end, you have likely implemented countless security features and measures to protect your organization’s resources and data. However, this all comes at a cost, and it’s not the one you might expect: your employees.

0 Comments
Continue reading

Cybersecurity Needs to Be a Part of Your 2023 IT Strategy

Cybersecurity Needs to Be a Part of Your 2023 IT Strategy

In today's digital world, SMBs need to establish a comprehensive cybersecurity strategy to protect themselves from a range of potential threats. Whether it's a small business with a handful of employees or a large corporation with thousands of workers, every organization is vulnerable to cyberattacks. That’s worth stressing because so many business owners think they are immune simply because of the size of their organization.

0 Comments
Continue reading

The Biggest Threat to Maryland Businesses is Not Treating Cybersecurity like an Emergency

The Biggest Threat to Maryland Businesses is Not Treating Cybersecurity like an Emergency

Let me ask you something—how much of a risk do you consider a cyberthreat to be to your business? We have some bad news for you… cybersecurity is a serious issue for businesses of all sizes, both in terms of the actual attacks and the downtime that many of these attacks can bring about.

0 Comments
Continue reading

Everything You Need to Know About Patch Tuesday

Everything You Need to Know About Patch Tuesday

In the technology news sector, you’ve probably noticed a trend where Patch Tuesday makes headlines at least once a month. This is generally the day when Microsoft issues patches and security updates for its many different technologies, and it’s important for your IT department to know when Patch Tuesday falls each month.

0 Comments
Continue reading

When Talking to an IT Service Provider, Ask These 3 Questions

When Talking to an IT Service Provider, Ask These 3 Questions

There is an inherent value associated with outsourcing the management of your technology to a managed service provider, or MSP. With your team taking a more hands-off approach to technology, they can instead focus on being more productive. If you’re still on the fence about this approach to technology and business, then we have some questions you should consider asking if you are thinking about learning more about MSPs and what they do.

0 Comments
Continue reading

Tip of the Week: Making Sure Your File Sharing Remains Secure

Tip of the Week: Making Sure Your File Sharing Remains Secure

Nowadays, file sharing is so ubiquitous that most people in the office likely take it for granted. However, this is not a luxury that you have, as you need to ensure the file sharing that takes part is sufficiently secure—otherwise, you could find yourself in a tight spot. That’s why we want to devote this week’s tip to a few practical steps to making sure your files get where they’re going safely.

0 Comments
Continue reading

How Much Should My Business Spend on IT?

How Much Should My Business Spend on IT?

Before you sign any contract or make a purchasing decision, you always want to ask “What’s this going to cost, and what am I going to gain?” In fact, if you are like us, you probably want to know the costs before you even engage with a vendor. 

IT is no different, but like many services, the costs associated with IT depend on your specific situation. Every business is going to have different needs and require a slightly different approach when it comes to their technology

0 Comments
Continue reading

Don’t Let Your Guard Down While You Travel

Don’t Let Your Guard Down While You Travel

With so many workers constantly connected to screens and other technology, it is a good idea to disconnect every so often by taking a vacation somewhere. However, it’s not always this easy, especially for a business owner who is still minimally connected to the office even while technically on vacation. We’ve got a couple of tips for how you can make the most of your technology while on your vacation without putting your company at risk in the process.

0 Comments
Continue reading

Securing Your Endpoints Can Help Thwart Cybersecurity Troubles

EndpointSecurity

How many devices or points of access do you have for your business’ data infrastructure? Chances are it’s more than you think, at least at first glance. If you count up all the mobile devices, server units, workstations, laptops, and so on that have access to your network, you might suddenly realize how important it is to secure all of these endpoints, as any unsecured device could be a path forward for hackers.

0 Comments
Continue reading

Getting Your Staff Ready to Collaborate Can Significantly Help Your Business

collaboration

No business can be successful without collaboration. As such, businesses invest heavily in tools which facilitate effective collaboration for their employees. Let’s take a look at some of the variables that can contribute to an effective collaboration strategy, as well as how you can promote collaboration in the workplace.

0 Comments
Continue reading

What is It that Impacts the Quality of Your Internet Connection?

Internet_Reliability

For something as fundamental to a business’ processes as its Internet connectivity, it can be challenging to determine how reliable and fast your Internet connection is. We wanted to review the different factors that would impact the connectivity that your business gets.

0 Comments
Continue reading

Tip of the Week: How to Design Effective Recovery Strategies

disasterRecovery

In business, you need to be ready for anything, including potential disaster scenarios. Therefore, it stands to reason that you have a solid disaster recovery plan in place to help you address them should the need arise. We’ve outlined three disaster recovery best practices you should consider for your business continuity strategy, as well as some tips to help you implement them seamlessly into your own operations.

0 Comments
Continue reading

How Proactive IT Management Works Better

How Proactive IT Management Works Better

How does your company manage its technology? Does it struggle with the idea of managing multiple workstations, server units, networking components, mobile devices, and more? If so, then read on—we have some tips to help you better manage the many different technological parts of your organization.

0 Comments
Continue reading

Tip of the Week: How to Stay Focused at Work

Tip of the Week: How to Stay Focused at Work

It can be difficult to stay focused in the workplace, especially with a litany of distractions at our fingertips at just about any point in the workday. What are some strategies you can use to keep your distractions to a minimum? We’ve outlined three great tips you can utilize to stay focused on the tasks at hand and be more productive with your time in the office.

0 Comments
Continue reading

Coinbase’s Super Bowl QR Snafu is Sending Shockwaves Through IT Security Circles

Coinbase’s Super Bowl QR Snafu is Sending Shockwaves Through IT Security Circles

During the first half of the Super Bowl last month, cryptocurrency exchange company Coinbase bought a minute of ad space to broadcast an ad that was just a QR code on the screen, meandering diagonally around the screen like the famous Windows screensaver. Millions of people took out their smartphones and scanned the code and now cybersecurity professionals are publicly decrying the tactic. 

0 Comments
Continue reading

Client Service Login

Latest News & Events

This tournament is scheduled to be held Friday, June 10, 2022. The past six years have all been sold-out and this year is shaping up to be another one for the books you won't want to miss. 

Contact Us

Learn more about what Dresner Group can do for your business.

Copyright Dresner Group. All Rights Reserved.