“Hello, How Can I Help You?” Meet Brenda, Advanced Systems Telecommunications Specialist

By Dave Quint | Nov 7, 2018 1:04:58 PM

Acquiring a new phone system can be a confusing mess. Our telecommunications implementation specialist, Brenda Schares, takes the confusion out of the process for our customers.

Many of our customers (maybe even you!) don’t know that we offer business phone systems -- including voice over IP.

I’d like to introduce you to our own “Phone Lady.”

Read More >

5 Tips for Choosing the Right Production Printer for Your Office

By Mike Andrews | Nov 1, 2018 1:45:04 PM

Even as the “less paper” office becomes more realistic and we seem to do everything on apps, paper still plays a key role in marketing, invoicing, and other large-volume and high quality printing functions.

When you need to print high-volumes at high quality, you need a production printer. With so many options, what are the important things to look for as you search?

Read More >

6 Careless Ways to Expose Sensitive Documents and Risk a Data Breach

By Dave Quint | Sep 24, 2018 5:11:01 PM

It should be impossible to ignore security challenges today - though many offices do continue to try.

We’re bombarded with commercials, ads, radio spots, articles in the newspaper and magazines, podcasts, news programs, and even this blog (sometimes) about various security issues.

Most of this content focuses on securing networks, which is a huge, complex, and important topic. We’ve focused on the issue of copier security.

I’d like to bring the focus down to a level we’re all familiar with -- the humble document. We all work with documents. Paper or digital, sensitive documents need to be secured.

Here are six ways documents could be accessed by the wrong people -- and what to do about it.

Read More >

Get Rid of Toner Pirates -- Free Downloadable Tip Sheet

By Dave Quint | Sep 19, 2018 10:41:17 AM

Avast there, me hearties!

In case you didn’t know it, today is Talk Like a Pirate day.

Over the years, we’ve had these scallawags attempting to board our clients. Most recently, a handful of our clients were attacked.

Fortunately, these boarding attempts were repelled as our clients knew to call us and not answer the high-pressure techniques of the toner pirates.

Others may not be as lucky.

Read More >

Print Rules Saved Us Money -- Smart Printing in Action

By Dave Quint | Sep 6, 2018 3:44:02 PM

One of the most inelegant phrases in all of information technology is “eat your own dog food.”

When someone asks an IT software company or an IT services-related company that question, it means “do you use the product you’re trying to sell me”?

Read More >

Paper Documents and Disaster, or the Problem With Betty

By Lane Lebahn | Aug 23, 2018 5:29:20 PM

One overlooked downside of an over-reliance on paper documents is that you're probably in trouble in the case of a disaster.

Many companies backup their data and think they have a disaster recovery plan.

Some companies have their documents on paper in a filing cabinet, tucked away in the corner and think “Safe! Hackers can't get me!”

Many companies don't even think about preparing for a disaster.

Everyone should.

Read More >

Don’t Be Boarded By Toner Pirates – 7 Tips to Sink Their Ship

By Dave Quint | Aug 20, 2018 12:29:00 PM

I know, “toner pirates” sounds like a crazy Saturday Night Live sequel to the “Makin’ Copies” skits of the 90s (the phrase always makes me start humming “A Pirate Looks at 40” by Jimmy Buffet).

Unfortunately, they’re real (in 2016 Iowa Attorney General Tom Miller secured a judgement against three Orange County, CA operations barring them from targeting Iowa offices with “a classic toner pirate scam”). When originally created this post after two of our customers had been victimized. They're at it again.

Here's how they tried to board three of our clients just this past week.

Read More >
COMMENTS