• Your 2015 IT Project Shopping List

    By: mindSHIFT Technologies on Monday, December 22, 2014

    With the holiday season here and the new year not far behind, now’s a good time to put your list together for IT projects in 2015. This blog outlines the top information technology projects you should have on your shopping list for 2015. 

  • If You Are Still Running Windows Server 2003 - Prepare for the Migration

    By: mindSHIFT Technologies on Wednesday, December 17, 2014

    With the impending end of support for Windows Server 2003, it’s time to get your migration plans in place. Read this blog for information on the top issues to consider when replacing and upgrading your old servers. 

  • What to Do About WinShock to Protect Your Business

    By: Matt Lunzer, mindSHIFT Technologies on Friday, November 21, 2014
    You may have heard about the latest vulnerability in your Windows® computers that could be putting your company data at risk. It's called WinShock. Is it bad? The answer is yes, and no. That’s not very comforting, so we’ve boiled down the critical steps you should take to protect yourself and your company data from WinShock.

  • Ten Days after a Disaster

    By: mindSHIFT Technologies on Wednesday, September 24, 2014

    Tornadoes, fires, floods, blizzards, earthquakes, electrical blackouts, steam pipe explosions and many other natural or manmade disasters can strike with little or no warning.

    There’s a long list of events that can damage or shut down your business operations in a moment.

    Travel back in time with us to watch how a business recovers from a disaster. Which decisions would you make?


  • Bad Weather Keeps on Coming – Is Your Business Prepared?

    By: mindSHIFT Technologies on Thursday, May 22, 2014

    Is your business prepared for weather disasters and other emergencies? Two disaster preparedness goals to start with are continuity plans for communications and mission-critical IT operations.


  • Email Encryption for Your Protection

    By: Bob Lanier, mindSHIFT Technologies on Friday, April 18, 2014

    Shhh!...We’re going to let you in on a secret: if you can read an email message, so can everyone else on the Internet. But there is good news—you have the power to help protect your company from prying eyes with email encryption tools.


  • The Heartbleed Vulnerability and Your IT Systems

    By: mindSHIFT Technologies on Friday, April 11, 2014

    On April 7, 2014, a vulnerability in a key piece of widespread security software on the Internet was revealed by OpenSSL® Project, a collaborative organization that distributes the OpenSSL Secure Sockets Layer toolkit.

    This blog outlines some of the basic information you need to keep your IT systems, data, and business or organization safe from the Heartbleed vulnerability.


  • Will April 8 Be The Day the Earth Stood Still for Windows XP Users?

    By: mindSHIFT Technologies on Tuesday, April 8, 2014

    In the movie The Day the Earth Stood Still (the original, from 1951), a simple phrase in an alien tongue saved the world from the robot Gort.

    It won’t be that easy to save your Windows XP® systems from threats and hackers after April 8, 2014. On that date, Microsoft® ends support for this operating system that first launched in 2001. If your Windows XP computers are connected to the Internet, you are at risk for a world of trouble.

  • Questions to Ask a Desktop as a Service (Daas) Provider

    By: Rob Duffy, mindSHIFT Technologies on Tuesday, April 1, 2014

    When preparing to make the move to a Desktop as a Service (DaaS) operations model for some or all of your company’s desktops and laptops, you’ll want to focus on a few key questions when considering vendors.


  • Solve the Big Problems when Moving Your Software Business to the Cloud

    By: Tom McCormack, mindSHIFT Technologies on Tuesday, March 4, 2014

    Converting the mechanics of your software application to a subscription-based licensing model is certainly a challenge. But don’t let the big cloud infrastructure challenges hold you back. Use an experienced and trusted cloud hosting provider to smooth the path for you.


  Showing Page: 1 of 6



Cloud Computing Small Business IT SMB IT Windows Server 2003 EOL cloud services cloud servers IT outsourcing WinShock Windows vulnerability Disaster recovery disaster planning business continuity disaster preparedness hurricane season email backup server backup cloud backup email encryption data encryption data breach HIPAA data security Heartbleed OpenSSL website security Windows XP virtual desktop cloud desktop desktop as a service DaaS VDI software application hosting ISV SaaS Mobile Device Management MDM Bring your own device BYOD smartphone security smartphone hacker smartphone malware IT consulting IT strategy VoIP IT Management Services desktop virtualization Education IT Solutions E-rate IT management IT staffing SharePoint 2013 Intranet Office 15 SharePoint migration SharePoint 2007 SharePoint 2010 Collaboration Business Intelligence Apple® iOS 7® operating system iPhone® 5s iPhone® 5c iPhone® 4g iPhone® 4s iPad® 2 iPad mini iPod® touch hosted cloud services security data center managed IT services managed service provider MSP IT support IT support healthcare IT ePHI enterprise mobility management tablet security tablet pc security mobile phone security app security smart phone compliance hosted mobile device management SaaS MDM mobile content management MCM cloud mobile device management mobile application management Legal IT Solutions Law Firm IT Sitecore Sitecore CMS Content Management System Telligent social marketing social media communities data backup desktop backup laptop backup SharePoint migration IBMi Power Systems iSeries AS/400 System I Power 7+ AIX Maxava iTera Mimix Vision Solutions Sitecore CMS 6.5 Hosted Desktop encryption compliance Document Management Virtualization videos customer testiomonials Green IT cloudshift Protected Health Information regulatory compliance IT Services for Law Firms Desktop vitrualization EHR Electronic Health Records