- "If you are a small business owner with 10 or more computers looking for good computer support then contact us for a FREE HEALTH AND SECURITY CHECK of your network!"
Or subscribe by email:Subscribe to our informative technology blog from Erlach's technology experts by email, RSS feed or through Facebook's NetworkedBlogs
Author Archives: Tim Erlach
Provide clients with professional guidance and technical skills to allow them to leverage technology to improve their businesses profitability. This position is responsible for the planning, design, implementation and operation of network systems to further client’s business goals in a manner that meets or exceeds client expectations.
ESSENTIAL JOB FUNCTIONS:
Supervisory &/or Lead Responsibilities
EDUCATION AND WORK EXPERIENCE:
JOB KNOWLEDGE, SKILLS AND ABILITIES:
CERTIFICATES AND LICENSES:
A friend passed along a recent experience in recovering his lost iPhone Camera Roll. I thought I would share it with you. If you think you may have lost all your pictures, this may give you some hope. Following is his email describing the situation:
“In my case, I was able to retrieve my Camera Roll, which was crucial, as I had video from my baby’s birth.
Also, every single contact came back, as well as all of my apps. I did have to “Update All Apps”, as it restored the app, but the apps were all out of date for some reason.
I’m passing alond an email that was forwarded to me. I don’t claim to have written it. Research shows that it, or similar emails, have been going around since 2006; however, it is good common sense on simple steps to protect your technology from allowing someone to exploit you. (On a side note, I really appreciate that it was well written with nice format and grammar. Seems a lost art in forwarded emails.)
Begin Forworded Text:
Not all thieves are stupid.
This gives us something to think about with all our new electronic technology.
Erlach Computer Consulting Commits Two Year Contract in Pro Bono Services to Big Brothers Big Sisters of Northern Nevada
Reno, Nev. — May 7, 2012 — Erlach Computer Consulting has committed to provide a two year contract to Big Brothers Big Sisters – Northern Nevada for computer management and services pro bono. Erlach Computer Consulting (ECC) is investing the work and staff talent to the local non-profit to support the organization’s service to the community.
Following an initial project to overhaul Big Brothers Big Sisters’ IT infrastructure, ECC will provide ongoing support; equipping the organization with the latest IT management resources, optimizing performance and security, and providing unlimited support, troubleshooting and professional CIO guidance.
The cloud has been around for a while and is really starting to take off! Here are some thoughts on security that may be useful and help you get your head around your security exposure.
Originally presented to the Washoe County Bar Association April 12, 2012.
End User Devices
This is where most data security issues originate. Individuals do not have the resources, patience, time and focus to assess and counter all the vectors for loss. This area is the greatest threat. At the same time it is the area you have the greatest control over. Review the following recommendations and see if they apply to you: