Home

About Us

IT Services

Understanding IT

News

Blog

Contact Us

Client Support Center

Dresner Group Blog

Dresner Group has been serving the Columbia area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Maryland Veterinarians, Who’s Managing Your IT?

Maryland Veterinarians, Who’s Managing Your IT?

Medical services commonly need advanced technological solutions in order to thrive, regardless of what species their patients are. This means that your veterinary practice should be equipped with a few important pieces of technology if you want to remain competitive - and, of course, to provide your patients with the greatest care possible.

Continue reading

How Much Risk Can the IoT Cause?

How Much Risk Can the IoT Cause?

The Internet of Things is rapidly growing in popularity, which makes it all the more likely that some IoT devices will make their way into your office. Also growing: the reputation that these devices have as vulnerabilities to your organizational security. In an increasingly connected world, it is important to remember how the IoT could quickly become a hindrance to your business if not managed properly.

0 Comments
Continue reading

Risks that Come From IT Threats

Risks that Come From IT Threats

In the business world, it’s natural that you encounter those that want to see you fail, but there are also those that simply want to piggyback off your success. In many ways, security threats are a little bit of both, as they can potentially steal your data and leverage it to their benefit, as well as cause harm to your organization. We’ll dig into some of the details of the most common security threats and the risks they cause for your business.

0 Comments
Continue reading

GDPR: One Year In

GDPR: One Year In

Data privacy is a serious issue in the world today, and the European Union’s General Data Protection Regulation, or GDPR, is perhaps the greatest example of how these issues are being addressed. Let’s take a look at how GDPR has shaped the computing world over the past year, as well as how events have exposed certain considerations regarding individual data privacy.

0 Comments
Continue reading

Be Mindful of All the Internet of Things Devices on Your Network

Be Mindful of All the Internet of Things Devices on Your Network

The Internet of Things is a phenomenon that must be accounted for, as the sheer number of devices accessing networks means that security is always a concern. How can your organization be sure that the Internet of Things doesn’t create problems? It all starts by being aware of how your organization’s network infrastructure operates in relation to the Internet of Things.

0 Comments
Continue reading

The Time Has Come for SQL Server 2008 and 2008 R2

The Time Has Come for SQL Server 2008 and 2008 R2

Software solutions don’t last forever. While patches and security updates can stave off the inevitable for quite some time, it’s impossible to maintain a specific solution forever. Support is eventually cut off, and businesses are left exposed if they haven’t taken the time to prepare. In the case of Microsoft SQL Server 2008 and 2008 R2, you are running out of time.

0 Comments
Continue reading

How Risky Can the Internet Be?

47501421_risky-internet-400

When you think about it, the Internet is pretty massive - just look at the billions of pages that pop up in less than a second, each time you click “Google Search.” However, what if I were to tell you that the Internet is even larger than you thought, much of it generally hidden?

Continue reading

Even Small Businesses are Targets for Hackers

Even Small Businesses are Targets for Hackers

Do you ever think of your business as too small of a target to matter to hackers? Some organizations actually do believe this, and that notion is effectively a trap. The thing that all businesses need to keep in mind is that all organizations, regardless of which industry they fall into, as all companies have data that’s valuable to hackers. We’re here to prove it and ensure you know the best way to protect your data.

0 Comments
Continue reading

Cybercrime and What You Need to Do to Protect Yourself

Cybercrime and What You Need to Do to Protect Yourself

Cybercriminals have been altering and ramping up efforts to steal data for much of the past decade. Once thought to just be a nuisance, now it has become evident that the cost of doing business now includes comprehensive network security strategies, designed to keep threats from affecting your business’ ability to create revenue. Let’s take a look at a working cybersecurity strategy.

0 Comments
Continue reading

Tip of the Week: Your Phone Can Work as Your Security Key

Tip of the Week: Your Phone Can Work as Your Security Key

If you’re like most people nowadays, your mobile phone is currently well within your reach (and that’s assuming you aren’t reading this blog on it). The fact that most people keep their phone on them at all times has greatly contributed to these devices becoming a part of any given work-related process. One major way is the implementation of two-factor authentication, which we’ll discuss as a part of this week’s tip.

0 Comments
Continue reading

What a Recent Bank Leak Should Tell Us About the Dark Web

bank-400

There are a lot of ways that our language represents our collective trust of banks. Why else would we use idioms to claim that someone’s statements are trustworthy that say that one can “bank on it” or “take that to the bank”? Unfortunately, this trust isn’t always completely justified, as a recent discovery of 24 million banking documents proves.

Continue reading

Enterprise Security for the Small and Medium-Sized Business

Enterprise Security for the Small and Medium-Sized Business

Does your organization take network security as seriously as it should? It’s easy to forget with today’s advanced security offerings that the online realm is a dangerous place, but the truth of the matter is that you can’t risk your business’ security--not even for a moment. We’ll walk you through how your organization can minimize threats to security, as well as give you a primer regarding what’s at stake.

0 Comments
Continue reading

What Does Solid Cybersecurity Look Like?

What Does Solid Cybersecurity Look Like?

Cybersecurity is one of those hot-button issues that you should understand well enough to protect your business and yourself. Basically, as your organization holds more sensitive information, you’ll need to be more vigilant about how you approach cybersecurity. Today, we’ll take a look at the design and practices of organizational cybersecurity, and how you can work to bridge the gap between the solutions you can’t afford and the ones you already use.

0 Comments
Continue reading

Colleges Have a Lot of Data to Protect

Colleges Have a Lot of Data to Protect

Colleges and universities are part-time homes to more than 16 million people, and employ over 1.5 million more. Most of them utilize the networks set up by the college’s bevy of IT administrators. If you consider that most people have difficulty keeping viruses and other malware off of their personal computers, opening up networks that facilitate this kind of user demand can be tricky. Today, we ask: can a campus’ network every truly be secure?

0 Comments
Continue reading

Have You Provided Your Staff With Enough Training?

Have You Provided Your Staff With Enough Training?

Technology training is something that all employees have to go through at some point in their career, whether they are a CEO learning how to use a new solution, or an end user that uses it every day. However, we know that your employees don’t necessarily have time to sit down for training, as they likely have other responsibilities that must be tended to. How can you make sure technology training is a valuable investment on your part?

0 Comments
Continue reading

ALERT: Over a Million Asus Laptops Could Have Been Hacked

ALERT: Over a Million Asus Laptops Could Have Been Hacked

If you own an Asus laptop, there is a chance that a recent update could have installed malware, and we are urging anyone who has an Asus device reach out to us to have it looked at.

0 Comments
Continue reading

Getting to Know About Phishing Attacks Can Keep Your Business Safe

Getting to Know About Phishing Attacks Can Keep Your Business Safe

There’s a big reason why phishing is a primary threat to businesses, and it’s because this method gives hackers a relatively risk-free way of gaining access to a network or other resources. Even being aware of the issue is often not enough to prevent it, as hackers are known to get quite aggressive and crafty with their phishing campaigns. If only a fraction of the 57 billion phishing emails that go out every year are taken seriously, hackers make quite a bit of profit off of users.

0 Comments
Continue reading

Biometric Authentication Becomes More Commonplace

Biometric Authentication Becomes More Commonplace

Biometrics are a common sight in futuristic or science-fiction settings, but they are increasingly entering the real world in practical ways. In fact, similar technologies are being implemented every day for businesses all over the world. Let’s take a look at some of them, as well as what benefits they provide these organizations.

0 Comments
Continue reading

Dresner Group Recognized for Managed Services Offering

dresnergroup_crn_500
We are excited to announce that we have been added to a list of North American managed service providers put together by CRN, one of The Channel Company’s brands. This list, the 2019 MSP 500 list, is made up of providers that are able to innovatively serve their clients, maximizing their returns and optimizing their operations through the guidance of their IT professionals.
0 Comments
Continue reading

Dresner Group Recognized for Excellence in Managed IT Services

dresnergroup_crn_500

Columbia, Maryland, February 27, 2019 – Dresner Group, announced today that CRN®, a brand of The Channel Company, has named Dresner Group to its 2019 Managed Service Provider (MSP) 500 list in the Security 100 category. This annual list recognizes North American solution providers with innovative approaches to managed services. These services help customers improve operational efficiencies, maximize return on IT investments, and continuously help them navigate the complexities of IT solutions.

Continue reading

Contact Us

Learn more about what Dresner Group
can do for your business.

410-531-6727

Dresner Group
5950 Symphony Woods Road Suite 302
Columbia, Maryland 21044

Client Service Login