Privacy Policy Last updated: January 24, 2024 This Privacy Policy describes Our policies and procedures on the collection, use and disclosure of Your information when You use the Service and tells You about Your privacy rights and how the law protects You. We use Your...
Search results
Our People
At Waident, we want our tech people to think like business people. We want the first thing that IT thinks about when starting a task is “How will this impact the users?” How will it impact their jobs, their time doing their tasks, the effort to learn a new approach,...
The CFO’s Guide to Choosing an MSP
The CFO’s Guide to Choosing an MSP helps executives identify and select an MSP that adds strategic value to your organization, not just control IT costs.
Curious Tech – April 2023
Here are my favorite items from the recent Consumer Electronic Show (CES), where tech giants and innovators introduce new technology: Peddle-powered bike desk You gotta peddle to charge the battery or no power for your laptop...
“Free” Blackberry Enterprise Server
Android, Windows Mobile, and iPhones sync directly with an email server. Blackberry's sync with a Blackberry Enterprise server. With all of the iPhone, windows Mobile, and Android devices being released over the past couple of years, RIM decided to create a free...
Choosing an MSP: No. 2. Strategic Alignment and POV on IT
Does the MSP share our vision for IT and its purpose? Financial viability is critical for an MSP. Prudent financial management ensures that the proper investments are being made in the business and that the MSP can survive the booms and busts of technology trends....
Your Phishing Guide: How to protect your business
One of the most common ways to breach business systems is phishing. All it takes is one employee, one email, one click and your business is at risk and your data vulnerable. Email phishing is a type of cyber-attack that has been around for many years and continues to...
How to Prevent a Ransomware Attack on a Financial Services Firm: Best Practices
Cyber Security Best Practices SUMMARY: Company leaders often think that a cyber attack will never happen to them because their company and its data are of no interest to hackers. This article explains why financial services firms should be concerned about ransomware...
SPAM – What the heck can be done to make it go away!
No one likes SPAM. I used to tolerate it, but now that I get over 100 a day, it is really beginning to get on my nerves. I'm not sure who actually buys anything from those incessant emails for replica OmegaRoexWatches, VIP Casino, V1agra!, and all of the other crap...
Waident Recognized on the INC. 5000™ List of Fastest Growing Companies second year in a row
2024 is truly a remarkable year for Waident! Not only did we celebrate our 20th anniversary, but we also earned a spot on the prestigious INC. 5000™ list for the second consecutive year. This year, we climbed the ranks from #3076 to #2497, surpassing 579 companies...
Multiparty videoconferencing on the cheap
We work with many of our clients to help determine the best communication platform to align with their business needs. Whether it be videoconferencing, web collaboration, conference calling bridges, IP phones, desktop video, or anything that helps people and/or teams...
Economy Problem? Try leasing a car…
The economy is in a bad spot lately and people aren't buying cars - at least that is what the news proposes. I think that may be true, but the car dealers are either dumb or just don't care. This is my story....My company car lease was up in May so I figured the...
9 Steps Manufacturers Can Take to Prevent a Ransomware Attack
Attacks on critical suppliers in the gas and food industries have illustrated how hackers attack easy targets, inflict serious pain, and extract easy money from pressured executives. Using what we've learned from recent attacks here are 10 steps manufacturers can take...
Frequently Asked Questions (FAQ)
Learn how we keep your people productive, your enterprise running, and your data safe.About Waident Why we suck less—The Waident WayBecause we suck less! We do get this question way too often. The standard of service for a lot of IT providers is unfortunately pretty...
Data Encryption: Best Practices for Business Owners
Waident’s cybersecurity philosophy is simple: Hackers hack easy targets, so the more layers of security an organization puts in place the harder the effort to penetrate and the less attractive a target it becomes. Encryption is one of those important layers. It is a...
Did You Know…How to Manage Your Mailbox Size?
Task: Managing your e-mailbox size for optimal performance. Eliminate notices that your mailbox is too full or nearing the limit and restricting your ability to send or receive emails. Solution: Clean up your mailbox. Identify the current size of your mailbox and...
What is Resilient IT and How to Develop It
We didn’t coin the term “resilient IT” —we just perfected it.Companies with Resilient IT approach technology strategically and proactively. Resilient IT reduces the frequency, severity, and duration of fiascoes. More importantly, it gives you an evergreen lens...
Expert View: Navigating AI Compliance and Risks in the Midwest
At Waident, a Chicago-based leader in cybersecurity, we've launched a series of expert interviews to share valuable insights into AI technologies. Today’s guest on "Expert View" is Waident’s Chief Information Security Officer, Patrick Giantomasso. We asked Patrick how...
Why so many spyware infections?
Across the board, our clients get spyware/malware infections. Not on a daily basis, but often enough to cause quite a bit of disruption. We are asked why these infections are happening even with up to date virus and spyware protection - shouldn't the infections be...
Resilient IT: The Pragmatic Solution to Any Fiasco
Companies with Resilient IT approach technology strategically and proactively. Resilient IT reduces the frequency, severity, and duration of fiascoes. More importantly, it gives you an evergreen lens through which to make important IT decisions for the post-COVID-19...
Did You Know…How to Change the Default Save Location in Word
Task: Word automatically saves your files in a predefined location but many people prefer to save their files somewhere else. It gets tiresome navigating through the folders to change the save location or manually moving files every time. Boost your productivity by...
Microsoft Office Compatibility Pack
I've written about this before but figured it was worth mentioning again. We have had several clients needing this simple and free program to help with file sharing problems. No need to uninstall Office 2007 so the other users in your office can read and use your...
Technology Management
For a cost effective fixed monthly fee you get a comprehensive set of services to handle all of your technology needs. Unlimited responsive end user support, complete technology management 24/7/365, and strategic guidance are included in the plan. Below is a high...
Interesting Applications (I mean technology) for October
Veebeam - http://www.veebeam.com/OK, it is not a software application, but it is an appealing little device that will allow your laptop to wirelessly transmit its screen and sound to your TV in HD. I’ve actually been looking for such a device for a while to use in...
A GDPR Primer
You have probably heard about GDPR (General Data Protection Regulation) recently and/or have gotten a slew of emails from different 3rd parties updating their security or information sharing policies. All of this is promoted by the new GDPR rules being rolled out and...