IT Horizons Blog

IT Horizons is not just your IT go-to team, we are your business partners!

IT Horizons Blog

We are IT Horizons - an IT company that strives to provide the ultimate solution for all your technology needs. We are blogging to help educate businesses in our community and keep them informed of current trends and opportunities.
Alex Saltman

Why Businesses Hire IT Consultants

now_hiring

So you’re thinking of hiring an IT consultant? Coming from our totally unbiased position (Note: we’re totally biased), we think that’s a great idea!

 

 

Continue reading
14 Hits
Alex Saltman

How Can IT Management Help My Business?

how_can_it_management_help_my_business

IT (Information Technology) is an essential component for most businesses these days. Thanks to the Internet and computers, it’s far cry from the old days of pens, papers, and floor-to-ceiling filing systems. We can do tons more than we used to, but taking care of this technology brings some challenges.

In broad terms, modern IT management involves managing all the tech stuff at your business. Large corporations will have entire departments to handle this. While IT Horizons does help large businesses set up components for these kinds of setups, the bulk of our business is providing IT support and management for organizations that don’t need a dedicated department.

Continue reading
130 Hits
Alex Saltman

All About Hybrid IT Management

blended_it-01

Do you remember the olden days, when an office would have a big monitor at each desk, under the desk everyone had their own chunky tower, a big noisy server sat in the back office, and a stream of cords connected everything together to make a ‘modern’ office? It’s almost crazy to try to imagine doing business that way now!

Of course, if you have an office (and you may not even need one of those anymore), you’ll still have some on-site equipment. But now you’ve also got cloud-based ‘equipment’—services that are accessed from anywhere and provide an essential link to co-workers, customers, projects, and data.

Continue reading
138 Hits
Angie Saltman

Why You Want to Spend More on Business Class Hardware

Why You Want to Spend More on Business Class Hardware
When helping our Grande Prairie clients plan their hardware lifecycle I’m often asked about the price difference between consumer and business class devices. If you can go down the street to Costco or Best Buy and pick up the latest back-to-school-special laptop for $500, why on earth would you spend two or even three times that amount for a business-line laptop from Lenovo or Dell? Here are some important points to consider when purchasing computers to make sure you’re getting the best return on your investment. In the Windows PC market, inexpensive home lines come with whatever low-cost surplus components are available to the manufacturer on the factory floor at the time. Because of this, the specifications change month-to-month or even faster and there can be wide differences in the nuts and bolts even within a single model of PC or laptop. This means that not only are you often...
Continue reading
4023 Hits
Alex Saltman

Our IT Managed Services Could Have Saved $1000s from Ransomware

Our IT Managed Services Could Have Saved $1000s from Ransomware
You’ve probably heard of Cryptolocker. It’s the nefarious ransomware trojan targeting Microsoft Windows that made the rounds via email starting in 2013-2014 that locked businesses out of their own files by encrypting them and holding them hostage. It impacted many – including Grande Prairie organizations that you know and may do business with! Cryptolocker and its many ransomware cousins act like typical viruses in the way they’re spread and distributed. But what makes ransomware so dangerous to you and your business is the fact that it specifically targets corporate data for monetary gain and the results can be catastrophic for those whose network is unprepared and inadequately protected from such an attack. Ransomware works by encrypting and locking you out of the files on your computers, server, and network storage. These files could include your policies and procedures, sensitive contracts and agreements, or your accounting database and financials. The attackers...
Continue reading
3734 Hits