And it’s already May! Some ideas on how to impress your friends and family. Here is my May curious tech list: Giant Spider Pillow It is kind of creepy having a huge fuzzy spider pillow, but it is kind of cool....
Search results
Detecting Cyber Risks in SMBs Using the NIST Framework
You have been following the NIST framework and have successfully identified the areas of risk and implemented protections against them. We're now at the stage to ensure that we are able to detect any breaches that make it over the proverbial "wall." This is a CRITICAL...
Why so many spyware infections?
Across the board, our clients get spyware/malware infections. Not on a daily basis, but often enough to cause quite a bit of disruption. We are asked why these infections are happening even with up to date virus and spyware protection - shouldn't the infections be...
Frequently Asked Questions (FAQ)
Learn how we keep your people productive, your enterprise running, and your data safe.About Waident Why we suck less—The Waident WayBecause we suck less! We do get this question way too often. The standard of service for a lot of IT providers is unfortunately pretty...
Curious Tech – August
Hey there, tech enthusiasts, get ready to be impressed by Curious Tech! Summer is still here, you can use a few of those items. Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Anti-flies fan BBQ season is still here! Annoyed by flies checking...
Frequently Asked Questions
Who is the ideal client for the Waident Service offerings? Our ideal client is a small to mid-sized business that views technology as vital to its success – an investment in future productivity, not just an expense to be avoided. We have many clients in the...
The Biggest Ransomware Fiascoes of 2019
Company leaders often think that a cyber attack will never happen to them because their company and its data are of no interest to hackers. The list of companies below shared that point of view. But not anymore because they have made the list of the biggest...
Free Applications Worth Checking Out
There are thousands (tens of thousands, hundreds of thousands?) of applications to use so I am always in the hunt for an exceptionaly useful one that is free. I often wonder why someone would create a good application and then give it away, but I'm not complaining or...
Why Backups And MFA Are So Important For Ransomware
Two of the simplest and cheapest ways to protect your company from a ransomware attack are Multifactor Authentication and a fresh backup. Here's why. Back up everything! You are not invulnerable. Catastrophicdata loss can happen to you - one worm or Trojanis...
The Pitfalls of Unwisely Retiring Old Office Technology
Pursuing sustainability is a noble goal and more and more environmentally conscious businesses are rising to the challenge. A common example is upgrading and then reselling old technology like routers, firewalls, and switches to others who extract more life out of...
Event: AI For Business in Milwaukee
Join us for an exclusive panel discussion on the cutting edge of Artificial Intelligence in Milwaukee. Our event will feature leaders from diverse industries, including marketing, IT services, consulting, finance, and law, who are actively adopting and shaping AI...
Did You Know…How to Change the Default Save Location in Word
Task: Word automatically saves your files in a predefined location but many people prefer to save their files somewhere else. It gets tiresome navigating through the folders to change the save location or manually moving files every time. Boost your productivity by...
Resilient IT: The Pragmatic Solution to Any Fiasco
Companies with Resilient IT approach technology strategically and proactively. Resilient IT reduces the frequency, severity, and duration of fiascoes. More importantly, it gives you an evergreen lens through which to make important IT decisions for the post-COVID-19...
Phishing Happens and MFA May Not Save You
I wrote a blog article a while ago about how sh*t happens. Sh*tty things will happen no matter how hard you try to avoid them, so the important thing is how you deal with them when they become reality. Well, some cybersecurity sh*t happened recently and it was a great...
A Cyber-risk Self-Assessment that Makes a Difference
Dealing with cybersecurity is on nobody’s fun list. While there are a ton of moving parts that affect nearly all aspects of your business in a thorough cybersecurity plan, it is much easier than you may think to protect your business. I know this as a business owner,...
What is Resilient IT and How to Develop It
We didn’t coin the term “resilient IT” —we just perfected it.Companies with Resilient IT approach technology strategically and proactively. Resilient IT reduces the frequency, severity, and duration of fiascoes. More importantly, it gives you an evergreen lens...
Apple iPhone works with Outlook like a Blackberry
Not yet, but it is coming, and not exactly like a Blackberry. It should working like any other Windows mobile device using the Exchange server Active Sync though which ain't too bad. At least you will get pretty much real time syncing and access to your e-mail,...
Coffee and free wifi – Does it make sense?
I just read the Chicago Tribune article "Coffee shops take different approaches with laptop squatters" and it raised some interesting points and got me thinking. Does it makes sense for the business to offer free wifi and power to all of their customers? Not too long...
Wired NextFest – Check Out Tomorrow’s Technology Today
If you are in to technology and are interested in what the future holds, this is the place to be when it comes to town September 27th to October 12th. Wired magazine sponsors a future technology event which they call NextFest. A few years ago it was held in Chicago...
Basic IT Hygiene to Prevent Ransomware-10 Steps All Financial Firms Must Take
These are some thoughts from John Wooden, legendary coach of 10 UCLA Bruins NCAA Championship teams, which included notable NBA Hall of Fame players, Kareem Abdul-Jabbar, Bill Walton, and Gail Goodrich. “I believe in the basics: attention to, and perfection of, tiny...
Applications and technology of the month
Gwabbit (http://www.gwabbit.com) - The tool is not free but it pays for itself quickly if you need to add a lot of contacts to your Outlook on a regular basis. Wouldn't it be great if you could click on someone's signature in their email and have it create an Outlook...
AT&T U-Verse – Cable TV and broadband using your phone lines
If you have not heard about AT&T U-Verse, you will soon enough. I'm getting weekly marketing slicks in the mail and seeing a lot of commercials. So what is it and why do you care? Well, you might not care at all if you are happy with your current broadband and...
Careers
Why Work at Waident? At Waident, we believe that since you spend one-third of your life at work, you may as well enjoy it. We strive to provide stimulating work for our associates, in an atmosphere that's friendly, challenging and supportive. Because we're a small...
How Do You KNOW That You Have Not Been Hacked?
We had a client recently ask a good security question. I am paraphrasing, but it went something like: How do I know that someone is not hacked into my network right now and able to get to my data? Sadly the answer was: You do not know. The reality is that with all of...
We Will Fail and Disappoint You, and That is a Good Thing
Recently, a prospective client shared how the IT firm they had been using for years was failing to deliver. They felt it was time to switch to a new IT partner. When they switched, they didn't become a Waident client; they hired...