RethinkIT!: BYOD Networking Part 2

In Part 2 of 2, Jeremiah talks about potential options employers have to address the increasing reality and challenges when employees use their personal mobile devices, tablets and computers at...

RethinkIT!: BYOD Networking, Part 1

In Part 1 of 2 of this topic on Bring Your Own Device (BYOD) networking, Jeremiah talks about potential options employers have to address the increasing reality and challenges when employees use their personal mobile devices, tablets and computers at...

Case Study: Hub International

“Last week, our executive team used the new audio conferencing system and loved it! The clarity and sound is awesome. Medlin is delightful to work with, their follow-up is wonderful and I’d recommend them to anyone.” – Janice Johnson VP, Director of Facilities...

Cybersecurity 101 – 10 Tips for Success

Ransomware attacks have calmed for a while, but hackers and other cybercriminals are always looking for new ways to access protected data. Even though we don’t hear about them on the news, small businesses are one of the top targets for restless cybercriminals. Here...

5 Variations of Email Phishing To Watch Out For

It’s been 35 years now since the first computer virus and, in the meantime, computer security seems to keep getting worse. With the proliferation of firewalls, antivirus software and other security precautions, many hackers now choose to access protected systems using...

Discuss These 5 Things Before Making An IT Decision

Choosing a new IT tool is hard work. After first identifying what kind of tool will do the job perfectly for your company and reporting on the in-depth cost/benefit analysis you’ve performed, making an IT decision means you need to find and compare vendors and...