Get Started Today!  732-747-9373   

Fotolia 68929807 M new

DeckerWright Corporation Blog

DeckerWright Corporation has been serving the Red Bank area since 1984, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Mobile Security in three parts

The wide-spread use of SmartPhones, Tablets and Laptops have put a company’s data out into the “wild” like never before.  Securing corporate data, some of which may be protected by regulations like HIPAA and PCI, constitutes a major problem for businesses.  The three basic parts of protecting this important corporate asset includes device level security, data protection and employee agreements.  I will be conducting a seminar on the topic on March 19, 2013 that is hosted by the Monmouth Ocean Development Council (MODC).  Click on this link to register for the event. 
0 Comments
Continue reading

Windows 8, Ready or Not!

In recent discussions with my suppliers I learned that the major manufacturers, Dell, HP and Lenovo are in the process of transitioning their PC product lines to Windows 8.  The target for completion of this transition is the end of April.  What does this mean?  It means that if the Microsoft and the manufacturers stick to this schedule, by the end of April you will not be able to purchase a PC with Windows 7 pre-installed.  If you are thinking of getting a new PC with Windows 7, better hurry!
0 Comments
Continue reading

Is your business ready for BYOD?

A trend in technology has been for employers to allow employees to use their own devices to access corporate data.  The trend is referred to as “BYOD”, for Bring Your Own Device.  Employers have been quick to allow the access to employees without fully understanding the security and business implications.  If the company’s customer list winds up on the device of a person who just left the company, whose data is it and how can the company be sure it has been eliminated?  Employee handbooks and confidentiality agreements can establish data ownership, but how can you be sure the data has been cleaned off?  There are technologies available to both safeguard the data in the wild, and to erase the data if the device is lost, stolen or belongs to a former employee.
0 Comments
Continue reading

Mobile? Grab this Article!

Qr Code

Latest Blog

The advent of Covid-19, a Coronavirus, is accelerating a trend we have been seeing with our clients for many years. Employers are seeking out the best person for the job regardless of where they may be located. Many of our clients have employees scattered around the country,...

Account Login