Resources
Articles and more
Check out the resources below to help with your technology proficiency. Articles, videos, and the Technology Playbook from PCA Technology Solutions, your Technology Coach.
Blog Library

Do You Have an IT Roadmap for Success?
by PCA Contributor | February 2, 2023 | Coaching, Featured, Managed Solutions | 0 Comments
These days, it is not enough to have a roadmap. You need a strategic IT roadmap that’ll help your company grow.

What is a Managed Security Service Provider (MSSP)?
by PCA Contributor | January 20, 2023 | Coaching, Featured, Managed Solutions | 0 Comments
Even small and mid-size companies can benefit by offloading IT tasks to a managed service provider who can provide services remotely.

Pick Up The Phone and Consider a VoIP Telephone System
by PCA Contributor | January 14, 2023 | Coaching, Featured, Phones/VoIP | 0 Comments
VoIP stands for Voice over Internet Protocol, which is a cloud based phone system. Why choose VoIP over traditional phone lines? Multiple excellent reasons.

When Disaster Strikes, What’s Your Backup Plan?
by PCA Contributor | January 7, 2023 | Backup Management, Cybersecurity | 0 Comments
What’s your backup and recovery plan? Disasters happen. Many companies don’t survive, because they didn’t have a disaster and recovery plan in place.

DIY Technology Is Over, Proven By Local Ransomware Attacks
by Ted Clouser | November 14, 2022 | Cybersecurity, Featured | 0 Comments
Earlier this week, one of our teammates sent me an article late in the day to read from our local NBC affiliate entitled “Over thirty Arkansas counties impacted by cyber-attack”. The very next morning, I was in a meeting discussing this very topic: ransomware.

Warning! Phishing Doesn’t Look so Phishy
by Shelby Beadle | October 6, 2022 | Cybersecurity, Featured | 0 Comments
As of January of 2022, the most common phishing scheme used to steal data from businesses appears to be sent by company vendors.

Building a Culture of Cybersecurity
by Ted Clouser | September 8, 2022 | Cybersecurity, Featured | 0 Comments
Cybersecurity can be underestimated, and must be woven into the culture of your workplace and prioritized. So, how do you foster a cybersecurity culture within your entire organization?

Shortcuts that are WORTH Taking
by Shelby Beadle | August 10, 2022 | Featured, Uncategorized | 0 Comments
Some Shortcuts are worth taking. Use this guide to learn how Control (CTRL) commands can speed up your workflow, saving you time.

It’s Time for A Mid-Year Assessment
by Ted Clouser | August 10, 2022 | Coaching, Cybersecurity, Featured, Managed Solutions | 0 Comments
Now is a perfect time for a mid-year assessment of where you are in your businesses and preparing for next year’s goals and objectives. While doing so, how are you planning for cybersecurity risks, technology needs and the ever-changing landscape that businesses are experiencing in 2022?

Help! IT’s Just Too Much
by Ted Clouser | July 13, 2022 | Featured, Managed Solutions, Uncategorized | 0 Comments
Picture it – the year 2000. We had just survived Y2K and the world was a much better place. IT was simpler then. It was completely normal for an IT department for a mid-sized business to consist of one or even two people to take care of it all. That is not the case in 2022.

Why IT Needs a Seat at the Table: The Threats Are Real
by Ted Clouser | April 27, 2022 | Cybersecurity, Featured, Uncategorized | 0 Comments
Technology is moving faster than ever. Whether it’s targeted warfare, or just “spraying” to determine who’s vulnerable, the threats are real.

Oh Password, Where Art Thou?
by Ted Clouser | November 13, 2021 | Cybersecurity | 0 Comments
I have longed for a ‘passwordless society’ for some time now and Microsoft has taken steps this year toward that possibility. The company announced in mid-September of 2021 that it will introduce a “passwordless account” option for all users of several popular services such as Microsoft Outlook and Microsoft OneDrive in the coming weeks.

4 Steps to Securing your Personal Data After a Breach
by Ted Clouser | July 8, 2021 | Cybersecurity | 0 Comments
Protecting your personal data is a growing concern in our society. There is news of cyber attacks and data leaks being reported constantly and we are all potential victims.

Your Business has been HACKED — Now What?
by Ted Clouser | April 3, 2021 | Cybersecurity, Featured, Managed Solutions | 0 Comments
While proper cyber hygiene comprised of layered security solutions and ongoing staff training are key ingredients to preventing an attack, a plan for disaster recovery is still essential. Cyber criminals are becoming more and more sophisticated in their attacks, making no one completely safe.

Ready for a Virtual Platform? Keep Security Front and Center
by Ted Clouser | December 5, 2020 | Cybersecurity, Managed Solutions | 0 Comments
2020 has proven to us that virtual is essential for survival. And it is not likely going to ever be the same again. Is your financial institution bracing that change? If not, what is stopping you?

PASSWORD: Password
by Ted Clouser | November 21, 2020 | Coaching, Cybersecurity, Featured | 0 Comments
If you use the same email address and password combination for your accounts and subscriptions, and a hacker gets access to one, they now have access to all.

The First Step to Preventing a Cyberattack Starts with….
by Ted Clouser | October 5, 2020 | Cybersecurity, Featured | 0 Comments
How do I prevent ransomware? How do I prevent phishing? How do I protect my company from being hacked in a cyberattack?

Q&A: with us: Protecting Your Present and Future Office Environment
by Ted Clouser | May 19, 2020 | Coaching, Managed Solutions | 0 Comments
Join technology experts from PCA Technology Solutions and ESET for a Q&A session on how businesses can protect.