By LMS September 26, 2019

Tech Talk – September 2019

A Note from the President

This time of year is my favorite. Slight chill in the air, high expectations for Michigan Football, kids sports, Michigan Football let down, etc. September is September, a great month!

For IT, and this year in particular, September is your 4-month warning of when your Windows 7 computers and Windows 2008 servers will be end of support, and your business at risk if you still have them running in January.

If you are serious about protecting your business, get serious about planning and scheduling your Windows 7 and Windows 2008 replacements.

I will warn you each month until January… don’t wait!

Happy Fall!

Scott Shatzkamer

3 Simple Things to Protect Against Cyberattacks

uused with permission from
by Anita Campbell


You might not be able to hire a full-time cybersecurity specialist or install top-of-the-line software, but protecting your business’s data doesn’t necessarily need to be complicated or expensive

There were nearly 42,000 online security incidents around the world over the past year. And about 43 percent of those targeted small businesses. That means that small businesses are more likely than any other entity to fall victim to data breaches and cyber attacks.

These incidents can lead to financial loss, stolen customer data or compromised proprietary information. So it’s essential that you take steps to lessen your chances of falling victim to cyber attacks, and to lessen the impact if you do.

However, small businesses also tend to have fewer resources to avoid these attacks than large enterprises and government entities. For example, you might not be able to hire a full-time cybersecurity specialist or install top-of-the-line software. But protecting your business’s data doesn’t necessarily need to be complicated or expensive. Here are some of the simplest things you can do today to lessen your company’s chances of falling victim to a cyber attack.

Read more

What is a digital footprint? And how to help protect it from prying eyes

used with permission from Norton by Symantec

Your “digital footprint” includes all traces of your online activity, including your comments on news articles, posts on social media, and records of your online purchases.

When you know the boundaries of your digital footprint and take steps to contain it, you can help protect your identity and your reputation.

What is a digital footprint?

Every time you post something online, share content, or even when a website collects your information by installing cookies on your device, you are creating a digital trail. This includes your IP address, your login details, and other personal information that you reveal online. Information that is posted about you also gets added to your data trail.

Read more

Can Old(er) SMBs Learn New Tricks?

used with permission from HP Tech@Work

Advice for digital transformation

They say you can’t teach an old dog new tricks, but older businesses will have to prove that adage wrong if they want to run with the big dogs in this evolving age of technology.

Developing a digital transformation plan is a key step for small businesses that want to futureproof their business models, further their successes and retain happy customers – not to mention keep other small businesses from outpacing them in their markets.

Woof, Here It Is

Before we talk about the whys and the hows of digital transformation, let’s make sure we’re all clear on what that process enTAILS. (See what we just did there?)

Digital transformation is more than just adopting a new form of technology or learning a few new high-tech tricks. It encompasses your entire company culture. Daniel Newman, founder and digital analyst for Futurum Research and best-selling author of “Futureproof: 7 Key Pillars for Digital Transformation Success,” defines it as a people-led, experience-led change for businesses that want to extend their success far into the future – a convergence of people and technology to deliver experiences faster than the rate of marketplace change.

Read more