Over the holiday break, I picked up a complimentary copy of Industry Magazine (NJ Edition) at Ray Catena Range Rover, Jaguar.  The publication, right at home in this luxury auto dealership, bills itself as an upscale print magazine that brings to life the world of fashion, entertainment, and luxury lifestyle for tastemakers and trendsetters.  I […]

It doesn’t seem possible to be able to forward a voicemail on Verizon wireless.  SERIOUSLY?  How can that be?  Is this not a very BASIC voicemail function?  Note the title of this blog post mentions iPhone, but it really doesn’t matter if it’s an iPhone or any other mobile phone.  Forwarding a voicemail message is […]

Did you know that you can make Microsoft (MS) Office documents automatically back up, so you never have to lose your progress if your computer or application crashes? The following tip is one of the most important Microsoft Office tips. You can set this up for Word, PowerPoint, Excel and other Microsoft Office Suite applications. […]

This morning, we sent out a notice to our customers regarding an email that purports to be from UPS.  It looks like a legitimate delivery notice.  It has an attachment as well.  The sender’s goal is to have you click on the link(s) or attachment in order to effectuate the attack. We don’t have specifics […]

Most Windows computer users, by default, are granted administrative privileges or “admin rights” to their PC that allow them to access administrative functions, such as installing software and changing various Windows settings. This privilege, however, can be the catalyst for far greater risk than benefit, as it is the very privilege that could lead to […]

HIPAA and the HITECH Act are U.S. federal laws that apply to most physicians’ offices and healthcare facilities.  They set forth the requirements for the safeguarding of identifiable health information, also called Protected Health Information or PHI. HIPAA and the HITECH Act also require these entities to sign agreements (called business associate agreements BAAs) with […]

You may have seen a lot of encryption news lately, and you aren’t alone. According to Hoffman & Hoffman Worldwide the level of interest in encryption and the number of encryption-related news articles are at an all-time high. What’s causing all the attention? A few things: Increased Breaches As more breaches occur and news outlets […]

We Join Drew Carey and Add To Reward for Capture of Autism Pranksters I was moved and saddened by the heinous act inflicted on a young man with autism in Ohio.  Exigent Technologies would like to add $500 for information leading to the arrest of the person(s) responsible for this atrocious act.  I invite others […]

In the latest edition of Small Business Tech Talk, Chris and Dan go over some of your most pressing questions on cloud computing. Is cloud computing always cheaper? Is cloud computing safe? When we built out our own cloud, we decided that transparency was one of the most important things we could offer to our […]

As more and more employees are using their own mobile, electronic devices for work, employers must recognize and address the many issues that arise from this practice. Today employees typically own three separate electronic devices (smart phones, tablets and laptops), which all potentially can be used for work. In the very near future, e-mails and […]

Great news.  We were just named among the world’s best IT services companies.  Exigent made it on the MSPmentor 501 Global Edition, published by Nine Lives Media. The report is based on a range of measures, such as annual managed services growth, revenue per employee, managed IT services offered and customer equipment under management. Per […]

I was recently interviewed by a trade magazine that was putting together a story with predictions about tech trends for the upcoming year. One of the things I mentioned was that, 2013 will be a year of “churn and burn” for small business cloud services. Let me explain. Hoards of eager, early adopters of small […]