J.D. Fox Micro Resource Center

Articles

Business
Business

For Business Managers and Self-Employed Professionals

This section is for an organization with a handful to a few hundred employees, in one or more locations, that utilizes information technology to support conventional business processes. If this describes your company and you're involved in technology decisions, read these articles to learn about current products and services available, how you can utilize them in your business, and challenges you might face, with insight and analysis you can use to make profitable decisions.

There are 36 articles in this category.

SPF, DKIM, and DMARC
What business managers should know about these e-mail sender authentication technologies

Windows 7 End of Support
Microsoft ended support for Windows 7 on January 14, 2020. Read about what this means, and what you should do about it if you're still running Windows 7.

Scanning Directly from a Scanner to an E-mail Address
Workgroup scanners support sending scanned documents directly to an e-mail address as an attachment. This article explains why this function should be disabled, and discusses alternatives to this scanning method that will improve productivity and security.

Dangers in the Modern Era of Business Information Technology
The current era of unprecedented convenience and simplicity in IT brings with it a new range of threats to your information security, that may require changes in your approach.

Sharing Passwords
Users sharing passwords is a common practice that leads to a tremendous number of information security breaches. Learn what to do about it.

Cloud Providers and the Safety of Your Data
Despite the maturity of cloud storage and applications, the threats of unauthorized access, accidental or malicious erasure or corruption of your data, or loss due to hardware failure, and the means by which these threats may be realized, are all still there. In fact, these can be even greater in the cloud. Read this article to learn more, and what you can do to protect yourself.

Business Classifications for IT Management
Is your business a SOHO, SMB, or Enterprise? Is your management approach correct for your classification? Should you upgrade your equipment, software, and services to match your requirements and get better value? Or, conversely, could your IT systems manager be overselling you on products that you don't need? Learn how to assess your operations so you can apply the management model and IT products that will maximize value and minimize risk.

Windows-as-a-Service
Is Microsoft going to charge a subscription fee for Windows 10? Learn the answer, and what impact Microsoft's modern method of delivering and supporting Windows might have on your business.

The "Meltdown" and "Spectre" Vulnerabilities of 2018
Why they are called the worst security flaws in history, and what you should do about them.

Password Complexity and Expiration
Understanding why passwords have complexity requirements and expiration dates, how you should configure such policies on your own systems, and what you should do with accounts on partners' or third-party websites

Bad Password Practices
Do your users have bad habits when it comes to password security? Does your business culture encourage this? If you're not sure, read this article.

Passwords and E-mail—A Dangerous Combination
Learn about risks and problems with systems that allow users to reset their password through e-mail alone.

About the Free Upgrade to Microsoft Windows 10
Who is eligible, time deadlines, and more

The Windows 10 Free Upgrade of 2015
Deceptive practices, unwanted upgrades, and more shenanigans from Microsoft

Google Apps and G Suite
An overview of the business applications offered by Google, Google Accounts and editions of G Suite (formerly Google Apps), pricing and features, and a little history

What's Probably Wrong with your Unmanaged IT System
Here is a list of the most common things we find are wrong with the typical unmanaged IT system, costing time, money, and productivity while increasing risk of data loss or downtime.

Chromebook
All about the inexpensive laptop running on a Google software platform. Covers related devices like the Chromebox and Chromebase.

Your Public Internet Presence
What you should know about your domain name registration, website hosting, and e-mail.

The "Goto Fail" and "Heartbleed" Bugs
Information security lessons from 2014 still relevant today.

Securing Your Network in the Wi-Fi Era
How to make sure your wireless (Wi-Fi) network isn't allowing unauthorized access to your servers, printers, and storage.

Investing Smart in IT
Nine tips on managing and planning IT equipment and software investments for your business.

Electronic Waste Recycling
Multi-part article covering disposal of electronic waste, which isn't allowed to be put in the trash, as well as ensuring your confidential data isn't exposed in the process.

Digital Signatures for E-mail
If your business may require a high level of integrity in e-mail communications, read this article to learn about digital signatures for e-mail—what they are, what they can do to ensure messages are legitimate, how they work, and how you can deploy them.

What Warranty Should You Get?
How to evaluate manufacturers' warranties on information technology equipment

Choosing a Website Designer
Despite the proliferation of social media for business promotion, your own website is still the best way to present your business online exactly the way you want. Websites are more art than technology, so choosing the right designer for yours is a critical step in realizing your vision.

What a Business Manager Should Know About Software
This article addresses challenges relating mostly to conventional software that businesses still encounter, even as cloud and mobile software gain greater prominence in modern IT systems. Learn some software licensing and deployment basics, when to use conventional software vs. cloud or mobile applications, when to choose perpetual licensing vs. subscriptions, and how to avoid inadvertent software piracy.