Posts by Chris Swinson
Employee Departure Guide
While losing a valued team member is a hard pill to swallow, it is the void they leave in their absence that creates the greatest hardships for an organization. Not only does an individual’s departure have the potential to stunt operational systems, it can also disrupt communication with clients, generate unnecessary costs, and leave the organization open to a plethora of security risks.
To mitigate the impact of an employee’s departure, it is important to proactively evaluate your organization’s current data management and security policies. In particular, business leaders should pay close attention to three key areas: cloud data, subscriptions, and email.
Read MoreRocket IT Business Podcast | Kelly Brewer | The Importance of Implementing Core Values | Ep 1
Does your organization have clearly defined core values? Are they something that you attempt to live and breathe every day? Do these values positively impact the lives of your team and the community you service? In the inaugural episode of the Rocket IT Podcast, we interview a guest from a special non-profit that truly takes their core values to heart.
Read MoreWindows 10 Easter Eggs: Discovering Microsoft’s Hidden Features
When someone mentions the words “Easter egg”, your first thoughts may bring about imagery of brightly colored eggs, waiting to be placed in well-hidden locations. While, in the traditional sense, this is correct, the modern-era has brought about a new definition for the term. Today, Easter eggs can refer to hidden features, placed secretly within a technology’s software or hardware.
Despite most major tech developers now including some form of Easter egg in their products, Microsoft is the master of embedding helpful features deep within its Windows operating system. Now, with Windows 7 soon reaching its end-of-life, Microsoft has almost entirely shifted its focus to Windows 10, resulting in a regular stream of newly updated Easter eggs.
While some of these hidden components are simply included for novelty purposes, others have the potential to positively impact your user experience. Therefore, Rocket IT has studied Microsoft’s extensive documentation, to bring you 10 Easter eggs to maximize your productivity.
Read MoreRocket IT and Eagle Ranch Team Up for Annual “Run the Ranch 5k”
On June 1, 2019, it’s time to lace up, hit the trails, and make a difference in the lives of local children and their families. In tandem with Eagle Ranch, Rocket IT’s sponsorship of the Run the Ranch 5k affords participants the opportunity to get involved with one of the nations leading nonprofit residential children’s programs.
Read MorePassword Security: Part Three – Two-Factor Authentication
Over the past few weeks, we’ve covered everything from password complexity to the management that sustains it. Now, we’re ready to make the leap into a slightly more complex layer of password security, two-factor authentication. In this final installment, we’ll wrap things up by highlighting the benefits of implementing one of these services, while helping you decide which method may be right for you.
Read MoreGoing Green: Decrease Organizational Tech Costs, Improve Productivity, & Embrace Social Responsibility
Searching for technology-driven methods to decrease organizational costs, while improving productivity and social responsibility, can sometimes feel like an unending search for a pot of gold at the end of a rainbow.
Needless to say, an organization cannot simply rely on the luck of the Irish to generate these profits. Instead, business leaders should consider implementing a series of green IT initiatives, providing their organization with a long-term foundation to achieve sustainable results.
Read MoreRocket IT Promotes Leadership Team to Support Organization’s Growth
Since the genesis of a Leadership Team at Rocket IT in 2012, the organization has experienced a steady upward trend in client and team growth. Faced with this surge of success, and the challenges that come with it, certain members of Rocket IT’s Leadership Team have continued to demonstrate the qualities associated with an executive-level team member.
Read MorePassword Security: Part Two – Managing Multiple Passwords
If you read the first part of our password security series, you understand the significant impact that passphrases can have on account security. This week, we’re focusing our attention on the importance of using multiple unique passphrases, while giving you some handy methods to keep track of all your new login credentials.
With just a couple of (free) changes, you can add an additional layer of security to all of your online accounts.
Read MorePassword Security: Part One – Implementing a Passphrase Standard
While protecting an organization’s network from the threat of hackers is a complex task, doing so starts at a rudimentary level. By ensuring every employee is vigilant in implementing proper password security practices, an organization can greatly mitigate the risk of of a total network takeover.
Simply put, Rocket IT suggests that an organization’s leaders start by mandating a series of company-wide password security rules. Although, over the next few weeks, we’ll share some of these suggestions, it’s important to start by addressing the foundational cause of security breaches, a lack of password complexity.
Read More