J.D. Fox Micro Resource Center
For Business Managers and Self-Employed Professionals
This section is for an organization with a handful to a few hundred employees, in one or more locations, that utilizes information technology to support conventional business processes. If this describes your company and you're involved in technology decisions, read these articles to learn about current products and services available, how you can utilize them in your business, and challenges you might face, with insight and analysis you can use to make profitable decisions.
There are 24 articles in this category.
Users sharing passwords is a common practice that leads to a tremendous number of information security breaches. Learn what to do about it.
Cloud Providers and the Safety of Your Data
Despite the maturity of cloud storage and applications, the threats of unauthorized access, accidental or malicious erasure or corruption of your data, or loss due to hardware failure, and the means by which these threats may be realized, are all still there. In fact, these can be even greater in the cloud. Read this article to learn more, and what you can do to protect yourself.
Business Classifications for IT Management
Is your business a SOHO, SMB, or Enterprise? Is your management approach correct for your classification? Should you upgrade your equipment, software, and services to match your requirements and get better value? Or, conversely, could your IT systems manager be overselling you on products that you don't need? Learn how to assess your operations so you can apply the management model and IT products that will maximize value and minimize risk.
Is Microsoft going to charge a subscription fee for Windows 10? Learn the answer, and what impact Microsoft's modern method of delivering and supporting Windows might have on your business.
The "Meltdown" and "Spectre" Vulnerabilities of 2018
Why they are called the worst security flaws in history, and what you should do about them.
Password Complexity and Expiration
Understanding why passwords have complexity requirements and expiration dates, how you should configure such policies on your own systems, and what you should do with accounts on partners' or third-party websites
Bad Password Practices
Do your users have bad habits when it comes to password security? Does your business culture encourage this? If you're not sure, read this article.
Passwords and E-mail—A Dangerous Combination
Learn about risks and problems with systems that allow users to reset their password through e-mail alone.
About the Free Upgrade to Microsoft Windows 10
Who is eligible, time deadlines, and more
The Windows 10 Free Upgrade of 2015
Deceptive practices, unwanted upgrades, and more shenanigans from Microsoft
Google Apps and G Suite
An overview of the business applications offered by Google, Google Accounts and editions of G Suite (formerly Google Apps), pricing and features, and a little history
What's Probably Wrong with your Unmanaged IT System
Here is a list of the most common things we find are wrong with the typical unmanaged IT system, costing time, money, and productivity while increasing risk of data loss or downtime.
All about the inexpensive laptop running on a Google software platform. Covers related devices like the Chromebox and Chromebase.
Your Public Internet Presence
What you should know about your domain name registration, website hosting, and e-mail.
The "Goto Fail" and "Heartbleed" Bugs
They were called the worst security flaws in Internet history. Read about what happened, what was done to fix them, and their implications for the future of Internet security.
Securing Your Network in the Wi-Fi Era
How to make sure your wireless (Wi-Fi) network isn't allowing unauthorized access to your servers, printers, and storage.
Investing Smart in IT
Eleven tips on managing and planning IT equipment and software investments for your business.
Electronic Waste Recycling
Multi-part article covering disposal of electronic waste, which isn't allowed to be put in the trash, as well as ensuring your confidential data isn't exposed in the process.
Digital Signatures for E-mail
If your business may require a high level of integrity in e-mail communications, read this article to learn about digital signatures for e-mail—what they are, what they can do to ensure messages are legitimate, how they work, and how you can deploy them.
What Warranty Should You Get?
How to evaluate manufacturers' warranties on information technology equipment
Choosing a Website Designer
Despite the proliferation of social media for business promotion, your own website is still the best way to present your business online exactly the way you want. Websites are more art than technology, so choosing the right designer for yours is a critical step in realizing your vision.
What a Business Manager Should Know About Software
This article addresses challenges relating mostly to conventional software that businesses still encounter, even as cloud and mobile software gain greater prominence in modern IT systems. Learn some software licensing and deployment basics, when to use conventional software vs. cloud or mobile applications, when to choose perpetual licensing vs. subscriptions, and how to avoid inadvertant software piracy.