Blog

The 1st recipient of the Brian J. O’Connor Award : Andy Hardecopf

April 14th, 2016

2016 Honoree - Andy Hardecopf

We are pleased to announce our 1st recipient of the Brian J. O'Connor Award, Andy Hardecopf!

This award was established in 2015 to honor the memory of Brian J. O'Connor. The purpose of the award is to recognize an outstanding leader in the Veracity Technologies organization who, by their actions, emulates a commitment to service excellence through hard work, extraordinary customer care and a passion for self-improvement.

4 BYOD security risks you should address

April 13th, 2016

In the 21st century, personal computing is with us wherever we go. This is all thanks to the proliferation of mobile devices such as smartphones and tablets. These devices allow us to take work home with us. And, with bring your own device (BYOD) strategy, businesses have never been so productive.

What is the Blue Screen of Death?

April 6th, 2016

So your computer just crashed. Our condolences. When your PC displays a blue screen and spontaneously restarts your computer, this is called the Blue Screen of Death (BSoD). These errors are usually caused by internal failures in your hardware or, sometimes, your software.

5 tips for using Facebook reactions

April 5th, 2016

Simply getting a ‘Like’ on your post is not enough anymore. It doesn’t give you any other useful data and you can’t immediately tell what people feel about your post. However, with Facebook reactions, you can be getting just what your company’s social media page needs.

How to calculate your technology ROI

April 4th, 2016

When purchasing new technology, how often do you consider its return on investment? For many business owners, calculating ROI is a tricky task that is sometimes skipped altogether. It shouldn’t be because if IT isn’t saving you money, it’s costing you.

7 Warning signs of malware infection

March 29th, 2016

As companies go to the Internet to conduct their business, their IT security becomes more vulnerable to many hackers and viruses. That’s why it’s even more important to recognize whether or not your systems are under threat from malicious software to swiftly fend off the infection.

Disaster Recovery myths that no longer apply

March 21st, 2016

With technology changing so rapidly, it’s easy to get caught up in outdated beliefs. And when it comes to Disaster Recovery, far too often do we see business owners still clinging to ideas that no longer apply. So, what kind of DR myths are still widely accepted by the masses? Here are three that need to be retired into IT folklore.

Revive your old laptop this Spring

March 17th, 2016

There comes a point in the life of every laptop where its hard drive slows and it begins to function at a snail’s pace. At this point, many people either toss it or retire it to the back of a closet. If you’re one of the latter, then this Spring you may be able infuse life into it.

Tips to monitor employee activities online

March 15th, 2016

When it comes to monitoring your employees online, there are potential positives and negatives for your company. But as a business owner who’s never done it before, you may be clueless as to what these are. So to help, we’ve come up with a list of the pros and cons of employee monitoring.