From IT, With Love

Ideas, Insights and Issues Relevant to Your Business

We are your advisor – think of us as your outsourced Chief Technology Officer (CTO). Information technology can be overwhelming, and it’s our intention to help you choose the right solutions, implement them cost effectively, and have them disappear into the background allowing you to focus on your business, not your technology. Our blog articles are written and curated to be relevant to you.

Why is Antivirus Protection Important?

Small businesses are increasingly targeted by cybercriminals due to perceived weaker security defenses.  Malware and ransomware can compromise sensitive customer data, financial records, and even bank accounts.  An effective antivirus solution will detect and block these threats before they infiltrate your computer systems and network thereby preventing data breaches and financial losses.

Read More

Are You Vulnerable to a Cyber Attack?

Many Ace Hardware retailers don’t see themselves as potential victims of a cyber attack. By the statistics, this is simply not true.

Read More

What Does The Ace Cyber Attack Mean For You?

Now that Ace has recovered from the attack, can things return to normal for you? This blog post details what YOU should do to prepare.

Read More

Eagle Point-of-Sale System Security

Andy Carlson discusses how Ace Hardware store owners and managers should secure their Epicor Eagle point-of-sale system.

Read More

Why Windows Passwords?

One of the things we find among the Ace clients we serve is many computers not secured by passwords.  We realize this is often a trade-off between customer service and security.  However, it is potentially a dangerous trade-off that can be mitigated with some simple steps.

Read More

Why is the DilSe.IT File Share Better?

NextCloud never has access to user data, as it is stored independently by DilSe.IT.  Our cloud storage servers are located in a world-class data center in DTC with 24/7 security.  

Read More

Email Attacks Are On The Rise

In 2022, 84% of organizations faced at least one successful phishing attack. 64% of organizations were infected by ransomware!

Read More

Does the FCC’s Recent Ban Impact Your Surveillance System?

In November of this year, the U.S. Federal Communications Commission (FCC) announced a ban on the import and sale of new technologies from the following Chinese telecommunications and surveillance firms: Huawei Technology CompanyZTE CorporationHytera Communications […]

Read More

The Importance of Endpoint Protection

An “endpoint” is today’s buzzword for any device connected to a network, such as a computer or virtual machine (PC, Mac or Linux) as well as Android and Apple iOS mobile devices.  Your endpoints are […]

Read More

 The Dangers of Email Attacks on Small Businesses

Email is one of today’s most common and most beneficial ways to communicate among your employees.  But, it is also a primary tool used by attackers to steal money, account credentials and sensitive information.

Read More