If you’re not already feeling the heat of compliance-regulatory scrutiny, there’s another cybersecurity-related acronym that just joined the list. Add to PCI, SOX, GLB, and HIPAA the European Union General Data Protection Regulation, or GDPR. Those of you outside of the EU may be scratching your heads at that and saying, “Well, that doesn’t apply […]

There are many reasons business owners are feeling the pull to migrate to cloud solutions as an answer to their data protection and storage challenges. Many feel that on-premise file servers are an outmoded technology compared to the burgeoning presence of cloud storage and other services which entice with their ease of use and access. […]

The Hewlett-Packard Enterprise Global Partner Conference (GPC) 2016 took place in Boston September 12 – 14th, and PNJ Technology Partners was fortunate enough to be among the attendees for this exciting event. The purpose of the GPC was to provide HPE channel partners like P&J with resources to continue to grow and succeed in the ever-changing […]

As the top-rated business email client in the land by 2016 estimates, Outlook runs on approximately half a billion devices, or half the Microsoft Office Suite users. If you’re in the mood for something fun and different when it comes to Microsoft Outlook plugins, we’ve found 5 that are fun, practical, and will boost your […]

June 2016 — This time, it was the University of Calgary – a sign that ransomware attackers are increasingly choosing academic institutions as a favorite victim. IT Specialist is calling it a “successful attack,” and certainly it was successful for the ransomware-ists on multiple levels. The University, in acceding to the demands of data-rustling scum […]

It’s something that many companies overlook, but regular performance assessment of IT infrastructure is vital to overall performance and security. Not performing regular system checks of your entire data network is similar to forsaking vehicle maintenance and continuing to drive it on a daily basis. Holistic diagnostic and performance checks will also let you know […]

In case you needed another reason for regularly changing your passwords, the recently-uncovered Yahoo hack of 500 million accounts is probably the reason of the decade so far. The hack and subsequent data theft involving half a billion Yahoo accounts is the largest of its kind – ever. Granted, it is Yahoo, where most people […]

It’s become an all-too-common occurrence: Cyberattack in the form of ransomware, resulting in major payouts to both hackers and in potential HIPAA fines. Ultimately, many of these increasing ransomware attacks are caused by a convincing-looking link embedded in official-looking emails. A healthcare employee or Business Associate (BA) of the hospital or healthcare facility casually clicks […]

Some smartphone battery-charging myths die-hard. One of them is that allowing your phone to charge all night is a good idea. It isn’t. Frequently charging your phone is also a bad idea, believe it or not. Why? Ions traveling from the electrical outlet to the battery cause wear and tear on the battery, which in […]

It can be a chore to move one SQL server database to another – if you want to save all the login and password information as well, that is. It’s easy enough to back-up and restore all the information on one SQL server database and transfer it to the new one, but what can be […]

In our ever-changing world, you need IT services that match up to the rapid-fire changes in telecommunications and business computing interconnectivity. And, you want those services to be flexible, yet pro-active and responsive to your IT network’s particular design and demands. That’s why PNJ Technology Partners is in business – to deliver you and your enterprise the […]

Proper and careful cyber risk assessment and management allows you and your SMB enterprise the long-range assurance needed in order to plan and fulfill your business goals. Optimum security as well as performance tend to walk hand in hand with most IT networks, either because one is an outgrowth of the other, or because it […]