ES Consulting Blog

ES Consulting, based out of Ohio, has been serving the US since 2001, providing IT Support services such as technical helpdesk support, computer infrastructure support, and IT consulting to small and medium-sized businesses.

Your Logs Hold the Secrets to Increase Network Performance and Security

b2ap3_thumbnail_keep_logs_around_400.jpgUsers log on and off your company's network all day long. You may think, "No big deal. It's part of the process." But data extrapolated from user logs is a big deal. It can provide your business with valuable information about network security and give you insight on how to improve operations.

0 Comments
Continue reading

Prepare Your Business for the Relevant Disasters, Not the Absurd Ones

b2ap3_thumbnail_recovery_for_business_continuity_400_20141006-170612_1.jpgHow prepared is your business for a disaster, and are you prepared for the right disaster? When it comes to making your organization's business continuity plan, the scenarios you plan for need to be realistic. Otherwise, all the hard work of planning will be for nothing.

0 Comments
Continue reading

6 Bring Your Own Device Tips to Help Bring the Business

b2ap3_thumbnail_bring_your_own_for_work_400.jpgDoing business in today's world is dependant on mobility, and if you aren't ready to shift toward this new technology trend, you should seriously reconsider. A lot of the time, businesses will allow their employees to bring in their own mobile devices for use in the workplace. This trend is called a Bring Your Own Device (BYOD).

0 Comments
Continue reading

Unified Threat Management: Ultimate Protection for a New Era

b2ap3_thumbnail_data_and_network_security_400.jpgEverything changes in due time. Computers grow less secure, malware grows more sophisticated, and hackers' methods change. According to Processor magazine, 80 to 90 percent of attacks are targeted at devices rather than networks and servers. Just like the weakest link in a fence, all it takes is one weak point for a hacker to take down your entire network.

0 Comments
Continue reading

Quit Avoiding Proven Technologies!

b2ap3_thumbnail_solutions_for_business_400.jpgIt's the nature of technology to take a while for the market to fully appreciate it. After it's released, there's an implementation phase where the benefits are weighed against the risks. This phase is usually a slow one, but if the technology is good, then its acceptance will be widespread and businesses will have to give excuses on why they're not using it.

0 Comments
Continue reading

The Embarrassment of When an IT Emergency Isn’t Really an Emergency

b2ap3_thumbnail_it_support_is_a_must_400.jpg"Quick, to the emergency room!" These are dreaded words that nobody wants to hear. An emergency like this implies a life or death scenario, and it gets everybody worked up into a frenzy. After arriving to the ER and getting a doctor's diagnosis, how quickly do people's attitudes change when the emergency turns out to be false?

0 Comments
Continue reading

Are You or Your Team a Security Threat to Your Business?

b2ap3_thumbnail_manage_your_risk_400.jpgData security should be a top priority for every business. Having good security means identifying risks. Surprisingly, some of the biggest data risks come from within. If employees aren't following your organization's data management policies, then they're your biggest threats.

0 Comments
Continue reading

Not All Server Units are Created Equal

b2ap3_thumbnail_custom_server_solutions_400.jpgBusinesses love one-size-fits-all solutions, especially when it comes to technology. Cookie cutter solutions are easy to budget around and easy to implement. However, there are some aspects of a company's technology that shouldn't be standardized, like server units.

0 Comments
Continue reading

Old Devices Can Compromise Security

b2ap3_thumbnail_device_security_400.jpgAs a responsible business owner, you know that using the latest technology and running updated software is a key component to your company's network security. However, your employees may not value the latest tech like you do, which could result in a major data breach, despite your best efforts to keep your company current.

0 Comments
Continue reading

ITaaS: Transform Your IT Department Into a Service!

b2ap3_thumbnail_managed_services_provider_400.jpgWhat are managed IT services all about? You've heard about how businesses are saving on their IT costs by outsourcing their technology needs, but how does this service work? The money-saving answer comes from this radical new approach to treating IT as a Service!

0 Comments
Continue reading

3 Signs Your Business is Stuck in the Not-So-Good Old Days

b2ap3_thumbnail_paper_technolgy_waste_400.jpgThere are some good things about the past. Events that happened then have led you to where you are now - you're an owner of a thriving business, and you can remember being a startup like it was yesterday. But, does your technology also remember those halcyon days? If so, you might be due for a much-needed upgrade.

0 Comments
Continue reading

Do Your Remote Workers Have You On Pins and Needles?

b2ap3_thumbnail_remote_worker_concern_400.jpgGiving your team the opportunity to work from home can be tricky business. Who knows how distracted they can get without you around to keep them on track? Still, working remotely has its advantages, for both you and your employees - even if you feel disconnected from them.

It doesn't have to be that way, though. By taking certain steps and measures, you'll feel like your out-of-office team is right in the office with you. Here are a couple of tricks you can use to bring your remote employees into your office... remotely!

0 Comments
Continue reading