See What’s on Jason’s Mind
RTO: Making the Office a Magnet Rather than a Mandate
Modern workplaces are not what they used to be; many organizations have transitioned from...
Read MoreGetting Started with Copilot
In a world where creativity fuels productivity, the relentless management of emails, meetings, data,...
Read MorePutting Your IT on “Autopilot”: The Benefits of Microsoft Intune
IT professionals have had to adapt to many changes over the course of the...
Read MoreWebexOne Recap: How Cisco is Reimagining the Modern Workplace
Hybrid and AI: two words that sum up much of the buzz in the...
Read MoreFraudGPT: AI-Equipped Cybercriminals Have Arrived
Large Language Models (LLM) like ChatGPT have sparked a slew of articles and research...
Read MoreGaps in Governance: The Threat in Your P&P Binder
Every IT department knows it needs to have a solid set of policies and...
Read MoreAre You Losing Your Users Because of IT Tool Fatigue?
Have you noticed that, despite investing in the latest productivity tools for your organization,...
Read MoreMake Your IT Team Advocates with Psychological Safety
As a corporate IT leader, you know that technology is a key driver of...
Read MoreFaster, Cheaper, Smarter? How IoT Will Change Manufacturing
No, IoT and Programmable Logic Controllers (PLCs) are not a new idea for manufacturers....
Read MoreDo IT Teams Need Certifications?
The value of a credential can vary for a professional depending on the industry...
Read MoreHow CIOs can Stay Ahead of Inflation
In a recent survey conducted by Info-Tech, two-thirds of CIOs interviewed expect their budgets...
Read MoreRetaining Tech Talent in the Digital Age
Technology has played a larger role in the business world, but in the wake...
Read MoreImportance of Data Backups
Data is the backbone of the digital economy, and your organization probably collects a...
Read MoreIntroducing: Hammer Cloud with Webex
Collaboration platforms often have a predictable process to them: speaking with a provider results...
Read MoreHow to Thwart Sophisticated Cyber Attacks with Cisco
Cyber threats have become far more sophisticated over the years, and will continue to...
Read MoreCybersecurity Basics: What Do the Pros Look For?
The idea that everyone needs a cybersecurity plan isn’t entirely new; the internet has...
Read MoreManaging IT Governance: The Overlooked Aspect of Cybersecurity
With how quickly technology changes, there’s no shortage of opportunities to invest in cutting...
Read MoreMost Underutilized Aspects of Microsoft 365
Microsoft is ubiquitous in the business world; the vast majority of organizations likely have...
Read MoreTop Challenges of Adopting a New Collaboration Platform
Collaboration is incredibly valuable to businesses, because it can lead to more creative ideas...
Read MoreWhat to Know About iSeries and Colocation
The business world continues to adopt technology in a variety of ways to improve...
Read MoreWhat People Get Wrong About Disruption
Many news stories these days are talking about the possibility of a looming recession...
Read MoreCybersecurity Comes Down to One Word: Planning
Cybersecurity has always been a concern for business leaders, but with the recent changes...
Read MoreTop 4 Trends in IT Operations for 2023
With every new year comes a bunch of new tech trends that everyone has...
Read MoreResiliency Over Reputation – The New Focus of Cybersecurity?
In the last few years, I have noticed a shift in client conversations regarding...
Read MoreThree Ways Companies Lose Money – And Don’t Even Know It
Companies need to make money in order to survive long term, and many established...
Read More3 Reasons You Can Skip a Site Survey.
Business leaders often express skepticism about the value of a site survey, because there’s...
Read MoreA Primer on Data Breaches
You’re probably already familiar with what a data breach is, and maybe you know...
Read MoreTop Myths About Wireless Site Surveys
Every business leader understands how difficult it is to move offices, and if you’ve...
Read MoreShadow IT, the hidden threat inside your organization
Let’s face it, most end users aren’t focused on security, which makes the work...
Read MoreOctober – Cyber Security Awareness Month
Ah, Fall is finally here… pumpkin lattes, fire pits, and a crispness in the...
Read MoreAsset Lifecycle Management – What’s your strategy?
No matter what industry your business serves, Asset Lifecycle Management (ALM) is a crucial...
Read MoreZero Trust – Verify Then Trust?
Today’s workforce is distributed more than ever before. With remote work increasing every day, the need to...
Read MoreWhat Executives Need to Know about SD-WAN
Tired of being locked into expensive, complex, and restrictive contracts with a single carrier?...
Read MoreDigital Transformation in 2021
Over the last 3-5 years, the term “Digital Transformation” has come to the forefront...
Read MoreDNS Based Infrastructure Protection
Protection of infrastructure, data, and end user devices are one of the most important...
Read MoreAdvantages And Benefits Of Cloud Computing
Eight reasons to consider a move to the cloud. If you’re reading this, there’s...
Read MoreCyber Crime on The Rise
According to the FBI’s Internet Crime Complaint Center, cyber-attackers caused over $1.8 billion worth...
Read MoreSelecting a Collaboration Platform in a Hybrid World
We at Weidenhammer have seen countless technological innovations evolutions over our more than 43...
Read MoreAccelerating Business – Technology is Often the Easy Part
As we work with companies to help them accelerate their business, we are often asked to...
Read MoreIt Takes Two … Business Strategy and Technology
Think your business isn’t a tech company? Think again. What 2020 reinforced for all...
Read MoreSecurity Cameras: Not Just for Security Anymore
Security cameras have been around for close to 100 years, and have provided protection...
Read MoreWiFi 6: Is your wireless obsolete?
Hearing a lot of buzz about this WiFi 6 thing? Yeah, I am too....
Read MoreModernize your Anti-Virus with EDR
New modern end point security solutions use a technology called Endpoint Detection and Response...
Read MoreWhat is GDPR? Do I Need to Do Anything?
Well let’s start with the easy part – GDPR stands for General Data Protection...
Read MoreOctober is Cybersecurity Awareness Month
Ransomware and threats are morphing. How is Your Cybersecurity Awareness? I remember my first...
Read MoreWhat’s the Stock Price of Project Management?
You are probably wondering what does a stock price have to do with Project...
Read MoreHow to Stay Virtually Connected with Your Customers
We can all agree that right now, more than ever before, we need to...
Read MoreMajor Disruptions Can Happen at Any Time
How you plan will determine if you will stay open for business. Major disruptions...
Read MoreManaging Passwords: Do’s and Don’ts
Managing passwords and knowing the do’s and don’ts are critical in both our personal...
Read MoreBest of Platform – The Security Solution for CIOs
Today’s CIOs are not only fighting a war against cyber threats, they are also...
Read MoreIncorporating Pandemic Planning into Your BCM Program
With the outbreak of the coronavirus, organizations that have incorporated pandemic planning into their...
Read MoreLicense Compliance in Cloud Deployments
What you need to consider about your software license compliance when moving to the...
Read MoreVulnerability Assessment vs. Penetration Testing
As I continue to engage prospective clients regarding their security needs, there seems to...
Read MoreCloud Computing Basics
Don’t know the first thing about cloud computing? Let’s start with the basics. While...
Read MoreLearn More About Jason
Jason specializes in configuring and maintaining security solutions for our clients. He has an AS in Information Systems Security from ITT-Tech and is certified in CCNA and CMNA. Jason enjoys working with a great team and believes you “[shouldn’t] sweat the small stuff”