Get Started Today!  732-747-9373   

Fotolia 68929807 M new

DeckerWright Corporation Blog

DeckerWright Corporation has been serving the Red Bank area since 1984, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile device management

DeckerWright Corporation is delighted to announce the introduction of its latest service offering for the management of mobile devices.  Now as a business owner, you can get control of mobile devices that access your company’s data but have been beyond the reach of your corporate policies.  Do your employees use an iPhone, iPad or Droid based device to access the company’s data?  DeckerWright Corporation’s mobile device manager will allow for remotely wiping the device, changing passwords and will log device locations throughout the business day.

Tags:
0 Comments
Continue reading

Step 1: BYOD Policy

Long before a company allows business documents to be accessed on devices owned by employees (Bring Your Own Device, BYOD), a strong and clear corporate acceptable use policy needs to be developed.  The policy should include how the employee’s device may be used on business time and what applications are acceptable.  The employee must agree to whatever software the company uses to distribute, secure and manage corporate documents.   The policy must include an acknowledgement from the employee that the company has the right to wipe the data from the device and that the company cannot be held liable for the possible destruction of any of the employee’s data.
Recent comment in this post
Taylahfry
In every organization there is a requirement of a policy. The policy main purpose is to enhance the company activity and the safe ... Read More
Wednesday, 07 December 2016 11:12
1 Comment
Continue reading

Mobile Security in three parts

The wide-spread use of SmartPhones, Tablets and Laptops have put a company’s data out into the “wild” like never before.  Securing corporate data, some of which may be protected by regulations like HIPAA and PCI, constitutes a major problem for businesses.  The three basic parts of protecting this important corporate asset includes device level security, data protection and employee agreements.  I will be conducting a seminar on the topic on March 19, 2013 that is hosted by the Monmouth Ocean Development Council (MODC).  Click on this link to register for the event. 
0 Comments
Continue reading

Is your business ready for BYOD?

A trend in technology has been for employers to allow employees to use their own devices to access corporate data.  The trend is referred to as “BYOD”, for Bring Your Own Device.  Employers have been quick to allow the access to employees without fully understanding the security and business implications.  If the company’s customer list winds up on the device of a person who just left the company, whose data is it and how can the company be sure it has been eliminated?  Employee handbooks and confidentiality agreements can establish data ownership, but how can you be sure the data has been cleaned off?  There are technologies available to both safeguard the data in the wild, and to erase the data if the device is lost, stolen or belongs to a former employee.
0 Comments
Continue reading

Is Windows 8 ready for business?

Windows 8 is Microsoft’s most recent desk top software release. Turning on your computer you will be greeted with a foreign user interface, the same kind used on a Windows phone or Surface tablet. If you don’t have one of those mobile devices, you are going to be lost and frustrated immediately. Should you get a business PC with Windows 8 pre-installed? The short answer is no, unless you are already a Surface or Windows phone user.
0 Comments
Continue reading

A Lesson from Super-Storm Sandy

Super-storm Sandy provided a lot of lessons for those of us who live in area subject to major storms of floods.   Having an agile system architecture proved to be one of the biggest lessons.  An agile systems architecture combines both cloud and premised based solutions so that a company’s data is everywhere.   Life is good in IT land when you have power and internet access.  When either of these fail, it causes a problem.  During the storm, we had three weeks of either no or sporadic power.  Internet access was out regionally for some carriers, locally for others, or simply overloaded on the cellular networks.
0 Comments
Continue reading

Facebook for normal people - How to upload pictures

Technology is finally becoming useful.  Combine a Smartphone and Facebook, and you can instantly post pictures for millions to see!  Click here to read about how your phone can talk to Facebook.
Recent comment in this post
Bellamaxwell
This is one of the most entertaining topic because there is not anybody who don't like to know about his favorite Facebook. I love... Read More
Friday, 23 December 2016 03:07
1 Comment
Continue reading

Office 365 Planning Guide

Office 365 is Microsoft's "cloud" e-mail offering.  Tight Outlook integration, shared contacts and calendars and ActivSync make Microsoft's "cloud" offering a great value.  Click here to read for insights into planning for an Office 365 e-mail migration.
0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Latest Blog

United States - InterMedExploit: Compromised Email Account InterMed: Maine-Based Physician GroupHackers gained access to four employee email accounts that contained patients’ protected health information. The first employee account was accessed on September 6th, an...

Account Login