Business IT Experts

6 Reasons You Need to Use Virtual Desktops

Your employees need access to their work in any situation. Whether it's a last minute change to a presentation, taking a sick day and working from home, or conducting a meeting with company members around the world, virtual technology is a business reality.  And a virtual desktop allows you to work from anywhere, anytime.

Topics: Disaster Recovery Citrix Business Continuity Virtual Desktop

What Do Cyber Protection Teams Do?

Your business uses the internet in a multitude of ways. You use it for communications, purchasing, customer service, and cloud backup and data storage.

Topics: Disaster Recovery Security Cybersecurity

11 Tech Leaders Share How They'll Overcome Their Biggest Challenges This Year

Broussard Group CIO, Micheal Goodwin, participated in a round-table at the Forbes Technology Council to discuss challenges for IT organizations in 2018 and what they hope to do to meet them.

Topics: Data Management

Is the Microsoft Office 365 Suite Right for Your Business?

Deciding on an office suite for your business doesn't have to be overwhelming and confusing.  The right office suite for your business will help your productivity and poise your organization for growth.  So let's look at the features of Office 365 to help you join the 60 million monthly Office 365 users worldwide.

Topics: Outlook Office 365

Cybersecurity with Virtual Desktops -- As Seen on

Server@Work's COO, Micheal Goodwin, penned an article for Forbes that was published online on March 21, 2018. The article, Cybersecurity Threats May Have Saved Virtual Desktops, makes a case for the expanded need for virtual desktops and desktop-as-a-service due to the greater need for cyber security.

Topics: Citrix Security Cybersecurity

Are Password Managers Safe?

I got a text from a friend last week. "My wife keeps changing our Netflix and other online passwords and doesn't tell me so we get in a password change battle. What can I do?"

Well, I'm not a marriage counselor but I do know something that can help. There is a huge market of good password managers and most have family plans where people can have their own passwords and share others with select family members. A perfect solution for Hulu passwords and bank account login info. With one password or fingerprint authentication to your password manager, you can store all your other passwords and easily login to your web sites and services with a single touch.

But with so much access to your personal information stored in one place, users need to know, are password managers safe?

Topics: Security Cybersecurity

Work Better From Home By Lowering Your Internet Latency

I have worked remote via Windows Remote Desktop Services and Citrix virtual desktops since 2003. Back in 2003, I was using an AT&T aDSL connection that would blink out a couple of times a day but otherwise, I had good experiences working remotely. But back then I did not have to complete with Netflix and Hulu, YouTube and online gaming, or a half dozen smartphones streaming Spotify in my house. Checking DHCP leases recently, I found 21 devices on our home router. TWENTY ONE! Gradually over the past few years, it seems my entire house connected to the Internet. These connected devices have brought many conveniences and more than a little entertainment, but they also brought aggravation when working from home in the form of laggy remote desktop connections, spotty VoIP, and staggering video conferences.

Topics: VOIP Remote Access Citrix Virtual Desktop Skype

Updates to Creating a Strong Password

In July of 2017, the National Institute of Standards and Technology (NIST) published a somewhat controversial update to its recommended password standards. The NIST is the US Federal agency that, among many things, researches and creates policies regarding Information Systems controls and standards. NIST policies serve as standards for many industry security controls and laws including FISMA, HIPAA, FINRA, PCI, SEC and SOX. So a change to accepted password security norms from the NIST is a pretty big deal and over time will cycle down into accepted security standards like COSO and ISO.

Topics: Compliance Security Cybersecurity Security Risk Assessment

Dedicated Managed Service Providers Focus Only on IT Business Support

Delivering IT computer support to businesses is a full-time job but many IT companies do not devote their full attention to their business clients. Most IT support companies continue to provide technical support the same way they have for dozens of years by using the "Break/Fix" support model. But with the growing complexity of business technology, cloud services, and cyber security concerns, IT businesses are being forced to make a choice between residential "Break/Fix" support and the more specialized and technical business support.

Topics: Managed IT Business Support Computer Support Technology Management

Security Risk Analysis and Risk Management for Small Healthcare Providers

For years, your patients have needed to guard against paper cuts when going to your office as they scribbled their names on your official "Patient Privacy" forms. These documents state that you, the medical provider, will protect the patients personally identifiable information (PII) and will guard the information they share with you. And while you hear about the occasional breach from larger hospitals and insurance providers, you feel comfortable knowing you are a small target and the Internet doesn't really care about "Jane Smith's General Practice". But the facts are that over three million patients records were compromised in 2017 across the healthcare spectrum and small and independent practices were breached, hacked, and ransomed just like the larger healthcare organizations.

Topics: HIPAA Compliance Security Security Risk Assessment