The Computing Center acquires the assets of Sherpa Technologies, Inc.

 FOR IMMEDIATE RELEASE

The Computing Center acquires the assets of Sherpa Technologies, Inc

Ithaca, NY (September 8, 2017) - The Computing Center, an Ithaca, NY based computer technology systems integration company is pleased to announce that it has acquired the assets of Sherpa Technologies, Inc. The acquisition has been under discussion since May, 2017 and closed on September 6th.

[More]

Developing & Using Good Executive Summaries

Most business owners have a general idea of the executive summary that comes with the traditional business plan. However, in the real world, summaries come up much more often than just in the business plan. How to create the summary, and how to use it, depends on the business objective.

The summary you say every day

I’ve always liked “Say your business plan every day,” which I heard first from Jim Blasingame, small business advocate. Business is normally chaotic, so a quick reminder is a good idea.

[More]

Dealing with Ransomware

Ransomware can ruin your day. It can be an annoyance or it can wreck you company or organization. The most important piece of advice we give our clients that, in spite of everyone's best efforts, should they be attacked by ransomware is to first: DO NOTHING! Call us. We've been quite successful in helping to recover from ransomware attacks, even for those who are not our clients. However, once non-technical people start trying to fix an attack themselves, things can spiral out of control very quickly. This article from our friends at Norton by Symantec provides basic advice for individual and small systems users. It also contains good general advice for users and systems of all sizes.

Malicious software that uses encryption to hold data for ransom has become wildly successful over the last few years. The purpose of this software is to extort money from the victims with promises of restoring encrypted data. Like other computer viruses, it usually finds its way onto a device by exploiting a security hole in vulnerable software or by tricking somebody into installing it. Ransomware, as it is known, scores high profile victims like hospitals, public schools and police departments. Now it has found its way into home computers.

The nefarious ransomware business model has turned out to be a lucrative industry for criminals. Over the years its ill repute has made law enforcement team up with international agencies to identify and bring down scam operators.

[More]

Why Bother with Upgrades & Updates


"If it ain't broke, don't fix it!" That saying applies in many places, but NOT to computer hardware and software. It’s clear that many of today’s cyber attacks prey on vulnerabilities present in old software and hardware. This is especially true for operating systems such as Microsoft Windows.

It may not be “broke”, but it’s still old and very likely out-of-date. “Working” does not mean “secure”. Old software and hardware simply do not have the latest defenses like security patches and advances in firmware to keep you safe from new and ever-evolving threats. And depending on how old, some products are no longer supported or able to be upgraded at all.

[More]

Marketing Mistakes that Can Lead to Trouble.

Advertising and marketing is regulated by federal law, and if you’re not on top of the regulations that apply to you, your ads could end up costing you more in fines than they bring in business. The Federal Trade Commission regulates and enforces advertising laws. Here are some key advertising and marketing mistakes small business owners should avoid.  

Mistake #1: Sending SPAM email. No one likes to receive spam, but you’ll be really unhappy if you are accused of sending it. If enough of your business emails get marked as spam, the recipients’ ISPs could block your emails, or your email service provider could shut off your campaign. But that’s the least of your worries, because breaking CAN-SPAM laws could cost you as much as $16,000 for each spam email.

[More]

More Entries