The Zeppelin Group is Making Us Ramble On About Ransomware

The Zeppelin Group is Making Us Ramble On About Ransomware We apologize for the pun, but we couldn’t help ourselves. When you go about your business and attempt to onboard a new client or implement a new tool for your company, you spend time getting to know what your business is doing and why. Well, […]

How To Spot a Phishing Email

How To Spot a Phishing Email Earlier today I received an email from a contact who works in the private equity field.  I met Rob R. at the AM&AA event in Dallas earlier this summer, and we had a great discussion on the importance of technology due diligence during the acquisition process.  He asked that […]

Business Technology Challenges to Think About

Business Technology Challenges to Think About Business technology is far from the easiest thing to manage, and it’s mostly because managing technology is not the sole focus of companies (unless you’re us, of course). If you can’t overcome your IT challenges, your business could be held back needlessly. Let’s go over some of the common […]

A Vulnerability in Your Windows Calculator?

A Vulnerability in Your Windows Calculator? Sometimes security breaches and hacking attacks come from the most unlikely of sources, even going so far as to utilize trusted applications to infect an endpoint or network. This is the case with a new phishing attack which uses the Calculator application that comes built-in with Windows in a […]

IT Helpdesk Engineer

Job Description Ashton Technology Solutions, Inc.: We are an established, financially strong, fast growing Managed IT Services firm based in Beachwood, OH, with clients throughout the Greater Cleveland and Northeast Ohio area. We work with clients in professional services, manufacturing and non-profit sectors. The Ashton mission and purpose is to make businesses more productive with […]

Bring Out Your Dead (User Accounts)

Bring Out Your Dead (User Accounts) Riverbank Ruminations; Observations from The Banks of The Technology River Tom Evans ~  Ashton Engineer Emeritus   Not Dead But Should Be The Dead Collector: “Bring out yer dead.” Large Man with Dead Body: “Here’s one.” The Dead Collector: “That’ll be ninepence.” The Dead Body That Claims It Isn’t: […]

How to Navigate the Modern Threat Landscape

How to Navigate the Modern Threat Landscape Cybercrime is a problem that is only getting worse, and as you might expect, it’s no good for business. It puts your organization in a position where it has to take steps toward securing its infrastructure, whether you like it or not. Let’s go over some of the […]

Catastrophic Failures Can Ruin a Business’ Momentum

Catastrophic Failures Can Ruin a Business’ Momentum Businesses these days rely on technology to keep themselves running, and without it, their ability to function can be compromised. Whether it’s a natural disaster or a cyberattack against your organization, you need to be prepared for catastrophic failure. What does this type of failure look like and […]

Tip of the Week: Bringing Legacy Systems to Modernity

Tip of the Week: Bringing Legacy Systems to Modernity There are numerous reasons to update your business’ technology—particularly if this technology is crucial to your business’ processes. However, many businesses still rely on legacy systems. This makes it a challenging prospect to update them appropriately, unless you know what you’re doing. This week, we’re devoting […]

What Kind of a Tool is Cloud Computing?

What Kind of a Tool is Cloud Computing? Cloud computing is used by just about all businesses in some capacity, but how much should your company rely on it for its important functions? Let’s discuss some of the options you have for your cloud computing infrastructure and how it can all contribute to your business’ […]