Marcus Networking is now a preferred ASPA Vendor
Marcus Networking Inc. is pleased to announce its new partnership with Arizona State Physicians Association. …
10 worst-case BYOD scenarios (and how to prevent them)
When it comes to BYOD, the best defense is a good offense. These proactive strategies will help you anticipate and avoid potential problems. Bring Your Own Device has stirred plenty of controversy. Companies are either embracing it to its fullest extent or avoiding it like …
10 things you shouldn’t virtualize
Virtualization delivers a host of benefits — but that doesn’t mean that everything is a good fit for a virtual environment. Here are 10 things that should probably stay physical. Virtualization provides a solid core of benefits — cost savings, system consolidation, better use of …
$1.36 a year to power your iPAD?
JONATHAN FAHEY Published: Dec 30, 2013 FILE -This combination of Associated Press file photos shows, left, a Cingular “Fast Forward” cradle and Motorola mobile phone in New York on Tuesday Nov. 4, 2003, and an Apple ultracompact USB Power Adapter, on Friday, Sept. 19, 2008, …
Happy New Years from Marcus Networking Inc.
We at Marcus Networking Inc. wanted to be the first to wish you a Happy 2014 New Year! We hope you have a happy and healthy year full of prosperity. …
Day 5 of the Do’s and Don’ts of Protecting Your Data
5 Do – Publish policies and educate employees. Data security is not just the responsibility of the IT group — it also depends on the day-to-day behavior of all employees. But employees need help to become security-aware. To encourage positive behavior by employees, IT departments …
Marcus Networking Listed in 2014 Book of Lists
Did your IT or Telecom Company make the list? We sure did for 2 different categories. We are proud to be associated with the Phoenix Business Journal and what they stand for. …
Day 4 of the Do’s and Don’ts of Protecting Your Data
4 Do – Use integrated products with simplified operations and management. SMBs are taking advantage of the same new technologies as large enterprises. Unfortunately, all too often, IT administrators end up with separate management tools for each new technology. For example, in a recent study, …
Day 2 of the Do’s and Don’ts of Protecting Your Data
2 Do – View security and backup as partners in protecting data. Even organizations that pay a lot of attention to security sometimes look at data backup as a secondary priority. But security and backup are actually equal partners in protecting data. To minimize downtime …