Technology Pointe Blog

Technology Pointe, Inc. has been serving the Round Rock area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How would your firm survive a Catastrophe?

A managing partner once told me, “After my people, our data is our most valuable asset.” The value of data is undeniable. Unfortunately, so is its vulnerability. Critical information can be lost due to server malfunction, hackers, power surges, broken water pipes or any one of a hundred unpredictable disasters. Data backups are important, but they may not be enough.


feb blog

What Is the Difference Between Data Backup and Disaster Recovery?

Continue reading

Could Your Business Handle a Snow Day?

SnowDay Blog

During the first two weeks of January, Texas endured its first deep freeze of 2018.  Meteorologists posted warnings about frigid temperatures, sleet, and freezing rain.  Police urged everyone to stay home due to dangerous road conditions, causing schools and local businesses to shut down out of necessity.  Phones went unanswered, customers went unaided, and companies  missed out on crucial revenue, all because of an unexpected weather delay.

As a business, Technology-Pointe, Inc. (TPI) has only experienced one previous snow day. This time, however, we had a contingency plan in place. 

Continue reading

How Do I Spot a Fake Email?

I was hoping not to have to write this blog.  I thought I would be retired by now.  You see, I received an email from a Prince in a country I can’t even pronounce.  He was in a jam and wanted to transfer his kingdom's wealth to me.  All I had to do was hold the money for him until

 
  Fake Emails (ID 21184).png


he was safe, and he would pay me 1 million dollars for my trouble!  Of course, he needed my bank account and social security numbers in order to make the transfer.  Seemed like a win – win to me…

I can’t believe it has come to this, but these days it is scary to open emails.  Who knows what lurks behind those links; Malware, Viruses, Crypto locker, and a whole host of other dreadful things can happen if you click on the wrong link.

IT companies like Technology Pointe keep the bad guys out and protect your systems by putting up firewalls and installing anti-virus programs along with a lengthy list of other protection devices.  The bad guys know this, so they go after an easier target, the end-user.  When you hear stories in the news about large chain stores getting their network “hacked”, that is rarely what happened.  The real story is that they were allowed into the systems by end-users inadvertently installing malicious code and opening the door for them.

So, what can you do?  I am going to reveal to you a few tricks we use to validate whether emails are real or fake.  There is no way for me to give you an absolute guaranty this will catch all fake emails, but it will certainly show you how to spot and stop most them.

There are three things you will want to remember if you are questioning if an email is real:

Continue reading

Are you Ransomware Ready?

Four percent of companies say they are “very confident” in their ability to protect themselves against ransomware attacks, meaning 96% are not quite so confident.

Ransomware exploits a company’s weakest link: The Employees!

Ransomware

Ransomware is a type of malware that prevents you from accessing your data until you pay a ransom which can be quite expensive.  The number of ransomware attacks have been growing rapidly since 2015.  Last year, the occurrence of ransomware attacks nearly doubled, showing a 172% increase in the first half of 2016 compared to the whole of 2015.  

Continue reading

What can CIO Guidance do for your Business

We frequently have potential customers ask - Why do I need a CIO for my business? Technology Pointe's key benefit is the CIO guidance we're able to provide our clients. You will get a dedicated CIO for all your strategy and technology needs.

CIO Blog Tech Pointe
Here are the Top 5 items to illustrate the importance of having a CIO.

Continue reading