Blog

Stay current with the latest in technology and cybersecurity.

Filling the Technology Gaps in a Manufacturing Operation

December 5, 2024

One truism that can hurt any business is, “You don’t know what you don’t know.” Often, over time, we work in systems we’ve grown used to, sacrificing potential productivity for familiarity and comfort. That’s what Tom Jarry, Director of Engineering, recently encountered with a mid-sized manufacturing client with about 50 employees. “We completed a Technology…

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

healthcare compliance HIPAA

HIPAA Compliance and IT: Are You Up To Date?

July 26, 2018

Summer is winding down and open enrollment is right around the corner. Speaking of personal health information – is it time for you and your business to think about HIPAA compliance? Many business owners and decision-makers believe that HIPAA belongs to the world of doctor’s offices and insurance companies, but it’s a little more complicated.…

Microsoft Sharepoint Collaboration

IT & Microsoft 365 Management: SharePoint For Small Businesses

July 23, 2018

Every business needs a means tto securely store, organize, share, and access information, and Microsoft offers SharePoint for small businesses to do this and keep their operations running smoothly as a result. SharePoint is Microsoft’s intranet solution for enterprises of all shapes and sizes, and for SMB’s it is certainly worth looking into for data…

code type protect your business

Ransomware Protection for Business: Protect Your Business from Ransomware Attacks

July 10, 2018

Ransomware attacks are a serious threat to any size business. For a small business, a ransomware attack can even result in the company going out of business. Last year, ransomware was found to be the most prevalent form of malware connected to company data breaches; cybersecurity provider Malwarebytes cited a staggering 90 percent increase in…

click cybersecurity risks

Cybersecurity Protection for Business: Small Business Cybersecurity Risks Are Real

July 6, 2018

Connecticut’s first state-wide cybersecurity survey was conducted in the fall by CBIA alongside select partners including us to assess small businesses’ awareness of cybersecurity risks and how they are preparing and protecting themselves. We felt it important to share not only because of our involvement in this effort and CBIA’s work, but also because we…

Microsoft Authorized Education Partner Schools

Cooperative Systems Renews Status As Microsoft Authorized Education Partner

June 28, 2018

We’re excited to report that we have officially renewed our status as a Microsoft Authorized Education Partner (AEP). This is a demonstration of our ability to meet Microsoft academic customers’ evolving needs in today’s dynamic business environment. The AEP program is designed to train participating resellers like us on Microsoft’s Academic licensing, authorize them to purchase…

disaster recovery planning servers

Disaster Recovery Planning for Business: What Happens If You Lose Customer Data?

June 22, 2018

We have all heard the horror stories of simple mistakes that lead to costly business disasters. A link that was clicked on that shouldn’t have been. An attachment that was opened when it shouldn’t have been. A contractor who stole data from one of the servers, or from the company’s data center. Doesn’t it seems…

automation maintenance

IT Monitoring & Management For Business: How To Be Proactive With Your Office Technology

June 14, 2018

Technology is getting smarter and, thanks to recent big advances in machine learning, it can now automate many of the functions that used to be performed by humans. Self-healing automation is the next step in this revolution. This term for proactive maintenance refers to the applications, devices and systems that can discover system faults or…

building blocks of your IT support

IT Support For Business: How To Choose The Best Tech Support

June 6, 2018

Whether it is 1 person or an entire team, a department inside your organization or an outsourced company, there are questions you should be asking yourself to decide if your IT support currently in place is “making the grade” or if you need to reconsider. We want to help you decide if you are receiving…

hacker anonymous business security

IT Security & Compliance For Business: Technology Is Everyone’s Responsibility

May 31, 2018

The role of business IT and technology has grown exponentially. As more business functions are created, business processes are developed and business data is gathered, business security threats have become more prevalent, more complex, and tougher to fight against. Security, namely cybersecurity, is no longer an issue that hobbyists blog about. Sophisticated criminals are making…

internet of things connected watch and dice

IT Monitoring & Management For Business: Are You Prepared for IoT (Internet of Things)

May 24, 2018

Summer 2018 has arrived! Warmer weather means families are spending time enjoying outdoor activities like hiking, bike rides, and beach days. With less time in the office comes more time on other devices, especially wearable technology like Apple Watches or FitBits. In other words, it is time to think about the Internet of Things and…

Break the Bank piggy

Why Business IT and Technology Doesn’t need To Be Expensive

May 14, 2018

In the beginning, we all thought, ‘technology is going digital and online, therefore it will be cheaper.’ Sadly, that’s not true and it’s pretty widely accepted. Don’t despair, though. Just because technology for your business seems like more of a luxury, doesn’t mean it has to have a luxurious price tag. Great Outsourced IT is possible…

binary code passwords

Are Passwords Leaving Your Network Unlocked?

May 10, 2018

Passwords today are like spare keys that have been given out to too many friends and neighbors. Common password content like birthdays, favorite sports teams, or names of children or pets are easily found on social media accounts. Cybersecurity is vital to a successful business, especially as hackers try to exploit the companies they expect…