Disaster recovery: what's at stake, the limits of engineering, and why you should practice your BC/DR plan.Read More
Any time you receive a text, remember to think before you tap. Texts are used for identity theft, bank account take-overs and to acquire personal or company confidential information. Read on for tips of how to spot red flags.Read More
The solution to the paper sign-in sheet, the nice-but-probably-unnecessary receptionist, and the awkward business card exchange: Haven, a visitor access management system. We've developed a sign-in process that's unobtrusive and convenient for visitors while providing increased awareness and monitoring of your campus.Read More
Your personal data is everywhere on the internet. It's necessary to utilize the services you rely on daily; your Gmail, Twitter, and Amazon accounts are all associated with your name, email, password, and phone number (not to mention credit card information for online shopping). But the very data that's stored with your online account can leave you open to exploitation when one of your favorite online sites experiences a data breach.Read More
The IT Customer Support Engineer serves as the first point of communication with clients, resolving issues or escalating tickets to senior engineers. This person provides hands-on support at our Data Center, which includes but is not limited to: daily maintenance and monitoring of data center services.
This position will primarily serve as the first line between customer service requests and senior engineers. This position will also help manage our Data Center, working onsite at our facility in downtown Milwaukee.Read More