Northcentral Technical College (NTC) in Wausau has been named a top training college in North America by the Learning Resources Network (LERN).The 2019 LERN Contract Training Award for Excellence in Improving Client Productivity was presented to NTC during the 2019 LERN conference. LERN is t…

“Phishing,” “spear phishing,” “spoofing” are all techniquesused by unscrupulous people to hack into or otherwise install malicious soft-ware.Phishing emails are typically made to looklike they were sent by a known contact or organization using email spoofing.Email spoofing is the root of all…

Consider this stat regarding the typical customer buying cycle: as much as 70 percent of a buyer’s journey is complete before he or she reaches out to sales (thank you, SiriusDecisions). 

The Weston village board approved a development agreement with TDS Telecom to build a fiber network and deliver up to 1-gigabit internet speeds, TV, and voice services to the community.

Consumers are concerned about their data privacy now more than ever. The establishment of the General Data Protection Regulation, known as GDPR and officially enacted last May by the European Union, gives EU citizens more rights to their data and aims to protect their data. Though it is an E…

Smartphones have become a tool most business people rely on as much as their office computer, and sometimes more. What was once the fantasy vision of Steve Jobs wanting everyone to have a computer in their hand has become a reality, but I'm not saying anything you don't already know.

It’s hard to miss all the hype about moving your infrastructure to “the cloud.” On paper, it seems like a great idea: get rid of your servers, migrate your applications and services to a third party, and store your data and backups in the cloud.

Managed Services allows a business to offload specific IT operations to a service provider, known as a Managed Service Provider (MSP). The MSP assumes ongoing responsibility for monitoring, managing and/or problem resolution for the selected IT systems and functions on your behalf.

The Wisconsin Economic Development Corporation (WEDC), in collaboration with Wisconsin Manufacturers & Commerce, Wisconsin Center for Manufacturing & Productivity, Wisconsin Manufacturing Extension Partnership, and the state's regional economic development organizations is hosting fi…

When it comes to disaster recovery, complacency is the biggest hurdle most organizations face. Who wants to think about, spend money on and plan for a disaster that might never occur — especially when everything is working just fine? Nobody.

Nearly everyone has heard about Bitcoin by now even if you don't really understand how to mine for it. Bitcoin — and its dozens of competitors — is a new class of currency called “cryptocurrency.” These digital currencies are paid as a reward for digital mining, an activity that is like mini…

You receive an official email from the United States government requesting your presence before a grand jury. Your stomach is churning as you read through the attached subpoena and supporting documentation. What happened? What will you do? Who can help you?

Businesses of all sizes are threatened by increasingly aggressive and brutal ransomware attacks. Compromised data, loss of access to critical files, and the demand for payment can cause massive disruption to an organization’s productivity and profitability. What does a typical attack look li…

This past summer, I was discussing plans with my family to attend the Minnesota State Fair. We decided that leaving by 7 a.m. would allow us the best chance of beating the morning rush. My older brother, Steve, announced to the room of about 10 people, “Hey Siri, set an alarm for 5 a.m.” Thr…

There’s a good chance that technology and social media is playing a large role in how your company attracts new customers and employees. It may also be attracting another unwanted element: cyberattacks. The attack could be coming from a curious hacker, a criminal intent on profiting from you…