HELP DESK Support(678) 387-5715

  IT Services(678) 387-5717

Modern Businessman managing IT assets digitally

Professional IT Asset Management: A Modern Business Necessity

In the current business environment, IT asset management (ITAM) — proactive deployment, tracking, maintaining, planning for replacement (or upgrade) and disposal of all IT assets — is a requisite for business success. Yet, many companies are still struggling with ungainly spreadsheets or other outdated methods for managing their assets. Furthermore, most of the business leaders …

Professional IT Asset Management: A Modern Business Necessity Read More »

Hacker on the Dark Web

The Dark Web in 2022: What You Need to Know; What You Must Do Now

In the late 1990s, the U.S. Department of Defense (DoD) launched what would later be known as the dark web. Designed for anonymous communications with informants and others whose identities needed to remain secret, it was soon discovered and exploited as a “back channel” for cybercriminals seeking a payday. What Is the Dark Web, and …

The Dark Web in 2022: What You Need to Know; What You Must Do Now Read More »

Warning - Phishing Scam Alert

Phishing Training and Testing: A Necessary Defense Against Cyberattacks… and Worse

With cyber risks being one of the biggest concerns for companies in 2022, shrewd organizational leaders are taking steps to reduce their exposure. From ransomware attacks to data breaches, the odds of being targeted by a crippling threat are extremely high. Further complicating matters for business leaders, the most common entry point for attacks or …

Phishing Training and Testing: A Necessary Defense Against Cyberattacks… and Worse Read More »

Multi-Factor Authentication

Multi-Factor Authentication: The Security “Option” that Isn’t Optional

With 61% of data breaches involving lost or stolen credentials such as passwords, the evidence is overwhelming that simple password authentication is inadequate for any business serious about security. Any Internet-connected company that takes this approach may already have been compromised by adversaries seeking to steal information or resources of value. Multifactor authentication (MFA) provides …

Multi-Factor Authentication: The Security “Option” that Isn’t Optional Read More »

Protect Your Data

Why It Is Important to Protect Your Company’s Intellectual Property

Are You Doing Everything You Should to Protect Your Company’s Intellectual Property? Data Loss Prevention (DLP) is an information security tool that can detect and report potentially suspect movements of your company’s data into the possession of unauthorized persons.  DLP systems have become primary security tools within the large corporate arena with these companies investing …

Why It Is Important to Protect Your Company’s Intellectual Property Read More »

Insider Threat

Have you Assessed a Potential Insider Threat to Your Business?

It’s nothing new.  Confidential information, sensitive financial records, critical customer data, and intellectual property are core assets for any successful business.   Protection of these assets is critical to the longevity of any successful business.   Theft of these assets have long provided the motivation to individuals and competitors to go off-script to indulge in nefarious …

Have you Assessed a Potential Insider Threat to Your Business? Read More »

The 2020 Bulldog 100 Includes JETT Business Technology

For the second year in a row, JETT Business Technology has been named to the Bulldog 100.  This year JETT was named to the distinguished Bulldog 100 out of over 550 nominations.  Applicants were measured by their outstanding performance in compounded annual growth rate during a three-year period.  The average compounded annual growth rate for …

The 2020 Bulldog 100 Includes JETT Business Technology Read More »

Access and Data of Your Remote Workers – Is It Secure?

Providing safe and effective protection for remote workers is not a new topic. But today, more than ever, this is a key priority of all IT Departments, large or small.  The responsibility of keeping networks and data safe considering the exponential growth in remote workers is an onerous task. IT security teams need to be …

Access and Data of Your Remote Workers – Is It Secure? Read More »

JETT Strengthening Low Voltage Cabling and Premise Security Services

JETT Business Technology is pleased to announce the establishment of our in-house Low Voltage Cabling and Premise Security Division. Although JETT has historically provided low voltage cabling services to existing customers, this new Division will bring added expertise, focus, depth, and breadth to the products and services we can now offer.   Chris Nichols has …

JETT Strengthening Low Voltage Cabling and Premise Security Services Read More »

An Explanation of What ‘The Cloud’ Really Is (Without the Geek-Speak)

Almost every day, someone on the JETT BT Team is engaged by a customer or potential customer with the following line of questioning: What Is ‘the Cloud’?  What Does It Really Mean?  Do I Need ‘The Cloud’? Webster’s Dictionary defines Cloud Computing as “the practice of storing regularly used computer data on multiple servers that …

An Explanation of What ‘The Cloud’ Really Is (Without the Geek-Speak) Read More »

Scroll to Top