What's New

News, Upcoming Events, & Blog

Newsletter Articles

  • Choosing between Windows 7 or 8.1

    April 02, 2014

    As we’ve previously discussed, businesses that put off upgrading to Windows 7 or Windows 8.1 will not only miss out on powerful new features, they’ll also waste time and money on custom Microsoft or third party services to support an obsolete system prone to cyber attack. The question then isn’t whether to replace XP, but rather what to replace it with.

    Full story

  • FFIEC Issues Statement on End of Microsoft Support for Windows XP

    April 02, 2014

    The Federal Financial Institutions Examination Council agencies have issued the following statement for financial institutions about the end of support for Windows XP and regulatory guidance for addressing the risk from its continued use.

    Full story

  • Windows XP: Time is running out, are you ready?

    April 02, 2014

    One of the most popular and longest lived Microsoft operating systems that we all know and love, Windows XP, has almost run its course. The clock is ticking... And on April 8, 2014, Windows XP will officially be “dead”, with no more extended support, and—more importantly—no more security patches. Hopefully, this news does not come as a surprise, as Microsoft has foretold the fate of XP since its release back in 2001.

    Full story

  • You are not a User

    February 10, 2014

    I'm going to let you in on an industry secret: technology objectifies you. Every day, in every Getting Started Guide, How-to article, Google search, and industry certification exam, you are distilled to the very essence of your basic interaction with technology. You are defined, quite simply, as a User. As if your use of technology is all that matters. As if when the using is done, so are you. As if technology were a drug, and you its addict.

    Full story

  • MITC Spotlight

    February 10, 2014

    Matson & Isom Technology Consulting would like to shift the spotlight to the winners of the MITC Peer Recognition Awards of 2013: Joel Biddle, Cesar Reyes, Kimberly Nguyen, Jennifer Cohea, David Jensen, and Chris Harp (not pictured). Congratulations!

    Full story

  • Avoid tech support phone scams

    February 10, 2014

    Cybercriminals don't just send fraudulent email messages and set up fake websites. They might also call you on the telephone and claim to be from Microsoft. They might offer to help solve your computer problems or sell you a software license. Don't let them fool you!

    Full story

  • Debunking Cyber Security Myths

    February 10, 2014

    How did you decide where to live? You probably wanted a good neighborhood close to your work or local shops, maybe in a top school district. I’ll bet you gave it a lot of thought and did your research. But, even if you are lucky enough to live in a safe area with low crime rates, you probably still lock your house when you go out and check the door before you open it to a stranger. We take certain precautions to ensure our safety. It’s the same for our lives online. There are Internet “street smarts” you have to learn in order to stay safe and protected from the growing threat of cybercrime.

    Full story

  • Copier Data Security: A Guide for Businesses

    February 10, 2014

    Does your company keep sensitive data — Social Security numbers, credit reports, account numbers, health records, or business secrets? If so, then you’ve probably instituted safeguards to protect that information, whether it’s stored in computers or on paper. That’s not only good business, but may be required by law.

    Full story

  • Microsoft releases new Remote Desktop App for Mac, iOS and Android

    February 10, 2014

    Microsoft has had a Remote Desktop Client application for Mac for a quite a while, but just this week they released a new free app named Microsoft Remote Desktop for iOS, Android, and Mac. The new application fills a need left by iTap Mobile when they announced that they will no longer be developing their line of remote desktops apps effective October 8.

    Full story

  • Prevent Threats to Your IT Infrastructure

    November 07, 2013

    Many of our clients approach us with questions regarding network and computer security. Most of them have disparate business needs which require different approaches to security in order to mitigate threats; yet, several common best practices emerge that can prove to be the vital foundation of your company’s IT security policy.

    Full story

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. Next page
Contact Us

To discuss how we can help your organization, call us at 530-891-9146.

Join Our Mailing List

Join our mailing list to receive news, tips & tricks, and special announcements.