Archive for January, 2013

happynewyearAhhhh! A brand new year, full of promise, hope and a  fresh start. If you’re like most people, you’re making the usual resolutions to exercise more, lose weight, pay off debt, etc., etc., etc.  Essentially, it’s a time of year when we momentarily take stock in our lives and think about all the things we “should” be doing more of, but don’t. So while you’re in the goal-setting mode, we thought we would tack on 3 things that probably aren’t on your list, but should be. Especially since these all fall into the “important, but not urgent” category.

1. Offsite backups. Can we beat this horse to death anymore? I know MOST of the clients reading this newsletter are smart enough to have this already done, but many still don’t and are relying on undependable (and outdated, I might add) tape drives, Carbonite or other volatile backup solutions. If that’s you, don’t let this be another year where you gamble with everything you’ve worked so hard to achieve. Get a better backup!!!!

2. Write A Disaster Recovery (DR) Plan. Pop quiz: If you woke up tomorrow and discovered that you couldn’t access your office building due to a fire, what would you do? Or what would happen if a key executive—one who holds the “keys” to critical processes or applications—fell sick or (God forbid) died? Or what would happen if a disgruntled employee or hacker gained access to your web server, line of business application or file server and deleted everything—particularly if the data was hosted on the 3rd party cloud provider’s website? These are all very real scenarios, and without a plan in place, you could be facing serious downtime and financial losses.

3. Develop A Stronger Cyber Security System That Goes Beyond A Firewall And Anti-Virus. With more and more information about us being stored electronically, and with State and Federal laws becoming more strict, you MUST take cyber security seriously. Simply having a good firewall and anti-virus isn’t enough these days to keep the highly motivated and technically sophisticated criminals out of your network. The HUMAN element is the biggest threat—employees who accidentally click on links in e-mails or download files that introduce viruses to your network. Employees are also
using social media sites more frequently, and they can intentionally or accidentally post something that could harm your company’s reputation or
leak confidential information. Therefore, your security plan must also include employee training and policies so they know what is and isn’t acceptable when handling data and using company resources (Internet, computers, etc.).

If you don’t know where to start in creating any of the above, we’re here to help! Call us at 303-756-2648, extension 3210 or send us an email to discuss how we can do all of this for you and take the work and worry out of these New Year’s resolutions!

Read Full Post »

According to Moore’s Law, computing speed doubles every two (yes 2) years. So, why do we still spend so much time waiting? Waiting on hold for tech support. Waiting for the IT guy to show up. Waiting to get work done. All this time and money just…waiting.


Isn’t it time we said “enough?” Isn’t it time that owners of small and mid-size businesses said “NO” to the Status Quo and actually change the way we do (i.e. manage) IT?

CMIT Solutions of Denver and the other 125 CMIT Solutions offices in our nationwide IT services and consulting company are on your side. We are an IT company that believes in empowering   business owners and decision makers to do what they were born to do: their jobs. We fight for your right to be productive.

Stand Up For Your Company’s Right to be Productive and Profitable!

Stand Up For Productivity by utilizing technology in a way that helps to grow and further your business in 2013 and years into the future! Let CMIT Solutions of Denver (and our colleagues if necessary for your branch/remote locations) help you achieve your business goals by leveraging technology and the CMIT system.

We are encouraging our Denver metro business community to band together with us and participate in our Productivity Revolution.  We have heard about and had firsthand experience with businesses that don’t take their technology seriously enough in relationship to the fact that technology is a tool to move a business forward. It is amazing (actually a bit scary) that way too many businesses -for and not-for-profit- do not take the proactive stance and philosophy in the management and maintenance of their business technology.

Do the math: If a 25 person law firm doesn’t have access to its electronic data for 1 day, what would be the monetary consequence? Think of lost billable time, lost opportunity, decreased productivity of staff and more.  It’s time to act and


Read Full Post »

DellLatitude-laptopFor many of us, traveling anywhere involves bringing along a laptop. Whether you plan to get work done on your trip, have vacation photos to show family, or simply want to stay connected while you’re away from home, a trusty laptop is just as much of a “must bring” item as a toothbrush. I travel 1-2 times per quarter on business and can attest to the validity of the tips.

Follow these 5 tips to ensure your computer, its data, and your sanity make it through the airport intact.

1. Back-up your data.You should have an automated backup solution installed on your laptop anyway, but in case you don’t, run a full manual backup of all the data on the computer the night before you leave.

2. Invest in a padded laptop case or bag. Don’t just stick your laptop in a backpack or your purse. Spend the money on a carry-on size piece of luggage that has a cushioned pocket to hold your computer snugly. From the time you arrive at one airport until you leave another one, you’ll be setting down and picking up your bag numerous times. All it takes is one hard landing to damage your computer.

3. Don’t even think about putting it in your checked luggage. Baggage handlers don’t typically treat luggage as if it’s full of Faberge Eggs. And if your computer is damaged, airlines generally limit damage claims to a few hundred dollars. Not only will that probably not cover the cost of replacing the machine, it definitely won’t cover the cost of retrieving any data from it.

4. Keep your laptop in an accessible place. The TSA currently requires that you remove your laptop from your carry-on before it goes through the x-ray machine. They sometimes require this of iPads and other tablets too, so be prepared to remove those from your carry-on as well.

5. Keep your eye on your laptop while it goes through security. The security line is ironically one of the most common places for laptop theft to occur. Be sure to empty your pockets and remove any metal (such as belt buckles and glasses) from your person before going through the scanner. The more times you have to back through the scanner, the longer your laptop sits unattended at the end of the conveyor belt.

You should follow these 5 tips for your tablet device as well. And, if you are based in Denver where you can purchase a CLEAR pass (we just did), you won’t need to remove your laptop or tablet from your briefcase or bag; however, you should still have a dependable and sturdy case or padding for them.

Read Full Post »

Early on in my education of the Latin language, I learned the famous phrase “Cogito, ergo sum”(I think, therefore I am). This article will give you insights to help you make sure that you think to yourself or say aloud “I think before I send.”

E-mail_postitnoteNew research shows that when most people communicate via e-mail, they’re not thinking about how the other person will process the information, they are communicating egocentrically.

According to the article, “Think your e-mails are clear? Maybe not,” by Johnathan Silverstein on the ABC News website, egocentric means that people are approaching an e-mail purely from their own viewpoint, and not that of the recipient.

Justin Kruger, an associate professor at NYU and Nicholas Eply, an associate professor at the University of Chicago, are the authors of a paper on the subject recently published in the Journal of Personality and Social Psychology that says people are not as good at expressing themselves and their emotions via e-mail as they think they are.

The world of e-mail communications is chock full of horror stories of misunderstandings and miscommunications. According to Kruger, it’s hard for most people to get beyond their own perspectives and realize how impoverished our communications can be for the recipient.

So, the next time you send an e-mail, take a moment to stop and think about how it might come across to the other person.

Additionally, when you receive a harsh sounding e-mail, don’t jump to the conclusion that the sender is angry or being hurtful. They might just have an “egocentric” style of communication!

Read Full Post »