Clicky

TechnologyEdge Blog

Michael Zenzer is a veteran in the field of Information Technology. He started taking apart Apple II's and programming in 1984, and going to college right out of high school for Computer Science in 1987. Sitting at a desk typing code wasn't really his thing, and after a brief notion of switching to the medical field, he got back into computing after ending a three year career as a Private Investigator in the mid-90s. Starting in basic hardware repair and quickly moving into Network Administration roles on Novell networks and then on to SysAdmin positions using Microsoft platforms, he is now an 21 year veteran and Information Technology Manager at TechnologyEdge LLC, where his duties include managing a staff of seven Network Engineers and Help Desk personnel, sales and marketing support, and of course ensuring the smooth and secure operation of not only TechnologyEdge's systems but a large customer base as well.

Outside of I.T., Michael has a wife and five children and when he's not spending time with them he enjoys any number of hobbies including scuba diving, hiking, kayaking, health and fitness, basically anything that gets him off the couch and in the outdoors. He holds numerous certifications starting way back in 1999, including CompTIA A+, MCSE NT4.0, MCSE 2003, MCITP 2008 Enterprise, CompTIA Security+, and several others and seems to be perpetually training in something I.T.

The End for Windows Server 2008 and Windows 7 Just Days Away

The End for Windows Server 2008 and Windows 7 Just Days Away

Microsoft is just days away from officially retiring their Windows 7 and Windows Server 2008 R2 operating systems. If your business is, for whatever reason, still using this software, you will need to upgrade by January 14 or face using unsupported software that could quickly become a security problem for your business. Let’s take a look at your options.

0 Comments
Continue reading

Your Business Will Benefit from Proper Data Management

Your Business Will Benefit from Proper Data Management

As digital systems have been adopted by more businesses, data has become a bigger tool. This is due to businesses having the initiative to direct this data into creating strategy. Today, data services are a desirable component for a business to embrace. Let’s take a closer look at how businesses are expanding their use of their data.

0 Comments
Continue reading

Baseline Cybersecurity

Baseline Cybersecurity

More than any time before, cybersecurity has to be a major consideration for businesses. It is, in fact, one of the biggest problems the modern business has to face day-in and day-out. Shortage in cybersecurity talent and antiquated strategies are making it difficult for businesses to find the knowledgeable resources that will help them work to secure their network and data from threats to the business.  

0 Comments
Continue reading

How a Co-Managed Strategy Can Be a Game Changer

How a Co-Managed Strategy Can Be a Game Changer

We always try to communicate the numerous benefits of managed IT services, but when your business is happy to have their own internal IT department, those benefits tend to look less appealing. For organizations that rely on the expertise of their internal IT staff, they may not think they have a need for--or simply can’t afford--an outside IT presence. This misconception may actually be harming their businesses. Today, we will introduce co-managed IT services, and how they can be leveraged to maximum benefit.

0 Comments
Continue reading

Smartphone Malware Is a Serious Threat

Smartphone Malware Is a Serious Threat

We all know how important it is to protect your desktop and laptop computers from malicious threats. Installing antivirus and security software is one of the first steps you take when you get a new computer, and for good reason. An unprotected device is at great risk. With that said, a lot of users don’t think about the threats that target their most-used devices, their smartphones.

0 Comments
Continue reading

Tip of the Week: How Bandwidth Works (and Why It Matters)

Tip of the Week: How Bandwidth Works (and Why It Matters)

Businesses require a lot of their Internet connections, especially if they’re using technologies like VoIP, screen-sharing, and/or webinar platforms. If you’re looking to incorporate these features, you need to be sure you have enough bandwidth to support them. We’re looking at a few reasons that your bandwidth matters, and how to tell if you have enough for your needs.

0 Comments
Continue reading

What Does It Mean to Plan for the Worst?

What Does It Mean to Plan for the Worst?

You don’t need to be repeatedly told just how important risk management is. If you did, you probably wouldn’t have made it this far. One problem you see from business owners today is that while they understand just how many problems there are--and which ones they need to find solutions for first--they want to grow their company so fast that they overlook potential problems and end up hurting their business as a result. This month, we thought we would talk a little bit about contingency planning and how, if it is done right, it can have a marked effect on your business’ ability to carry-on after a problematic event. 

0 Comments
Continue reading

Armored Car Cybersecurity

Armored Car Cybersecurity

It’s fair to say that most business owners aren’t cybersecurity experts. That’s why there is such a large investment in cybersecurity solutions. That outlay is justified, sure, but is it effective? Today, we’ll talk a little bit about network and cybersecurity, and how all the capital investment in the world may not actually keep your network secure. 

0 Comments
Continue reading

Is Your Computer Slow? This Simple Upgrade Makes a World of Difference

Is Your Computer Slow? This Simple Upgrade Makes a World of Difference

Few things are more frustrating and annoying than a slow computer. There are a lot of things that can slow a computer down, too: viruses and malware, excess applications running in the background, even time can seem to turn a relatively fast computer into a slow-as-molasses impediment to productivity.

If your computer is overall healthy but starting to slow down, there is one simple upgrade that can make a whole world of difference.

0 Comments
Continue reading

Windows 7’s Time Has Come

Windows 7’s Time Has Come

Chances are if you are still using Windows 7, you’ve begun to see warning messages about its imminent end-of-support date. Microsoft is retiring support for one of its best tools on January 14, 2020 and if you are still running Windows 7 after that date, it could put your whole IT infrastructure at risk. Let’s take a look at the particulars of Windows 7’s retirement and what your options are.

0 Comments
Continue reading

Google Password Checkup Tool Works to Keep You Secure

Google Password Checkup Tool Works to Keep You Secure

Imagine a world where there wasn’t a singular dishonest being. Passwords would simply vanish from our everyday lives, as we would not be paranoid of a breach or other forms of cybercriminal activity. The harsh reality is this will never become reality. Even worse, the cybercriminals don’t just skim for lack of passwords. Instead, the dishonest criminal goes even further; they take advantage of common or recurring passwords. So how do you know if your password practices are leaving you vulnerable? Google is here to help. 

0 Comments
Continue reading

Getting Your iMessages on Windows 10

Getting Your iMessages on Windows 10

Just a short time ago, applications were very specific to the type of devices they could be used on. Today, software communicates in a way that has transformed the usability of our apps. One of the most useful examples, are the expansions on messaging. Messaging no longer means cellphone-to-cellphone, or computer-to-computer. Today, we take a look at how you can utilize the iMessage application’s versatility, by getting it on your Windows 10 PC. 

0 Comments
Continue reading

VoIP Gets You Where You Need to Go

VoIP Gets You Where You Need to Go

Do you run into a scenario like this in your work? You are out of the office and you are made aware of a situation that has resulted in an irritated client. You call the client to make things right, and you successfully smooth the situation over. A while later the client wants to discuss something with you and he calls your personal phone directly. You try to politely direct him to use your business line, but over time, he makes your personal line his business’ support number.

0 Comments
Continue reading

Disaster Recovery: RPO & RTO

Disaster Recovery: RPO & RTO

For the modern business, ensuring that you have contingencies in place will go a long way toward keeping you in business if disaster strikes. One of the contingencies many businesses choose to make as part of a business continuity strategy is a disaster recovery plan. Disaster recovery is more than restoring data, it can mean mobilizing people and capital against time. Let’s take a look at two of the core components of a comprehensive disaster recovery strategy, Recovery Time Objective and Recovery Point Objective. 

0 Comments
Continue reading

You Have to Be Smarter About Your Data

You Have to Be Smarter About Your Data

You’ve heard it over and over for the past several years: data loss is a disaster. A data breach can ruin your business. Ransomware is a business’ biggest enemy. Your reputation can never recover after a data breach. These statements may be redundant, but if you don’t heed the message behind them, you will likely regret it. 

0 Comments
Continue reading

Everything You Need to Know About Data Backup

Everything You Need to Know About Data Backup

You know the phrase, “Don’t put all of your eggs in one basket?” 

The idiom comes from the novel Don Quixote, and is used as a lesson to not put all of your efforts and success on a single thing. For computing, we say it like this:

“Don’t put all of your data in only one place… or else.”

0 Comments
Continue reading

Diving Into the Differences Between Proactive and Reactive

Diving Into the Differences Between Proactive and Reactive

When it boils down to it, there are really only two ways to operate a business: proactively, or reactively. While many businesses still rely on their reactivity to deal with their technology issues, the opposite approach is demonstrably more effective for the modern business. Let’s explore some of the effects that a proactive and reactive strategy can each have on your operations.

0 Comments
Continue reading

Does Tech in School Fill Up the Honor Roll or Seats in Detention?

Does Tech in School Fill Up the Honor Roll or Seats in Detention?

We typically use this blog to share information about the technology that a business should be leveraging - but in this blog, we’ve decided to focus on a different group that is increasingly reliant on technology: students. As these pupils will someday make up the workforce and almost certainly utilize technology on a daily basis, it is important that their education reflects this increase in their curriculums. Here, we’ll consider some of the effects (good and bad) that this has had.

0 Comments
Continue reading

Celebrating Cybersecurity in Professional Services

Celebrating Cybersecurity in Professional Services

The professional services space is filled with important information. Lawyers, accountants, doctors, and many more professionals have access to some of the very most personal information available. For this reason, they are continuously targeted by hackers. Since October is cybersecurity awareness month, we thought we would take a look at modern cybersecurity practices to see which ones were working best for professional services firms. 

0 Comments
Continue reading

Enhancing Mobility Can Bring Stark Benefits

Enhancing Mobility Can Bring Stark Benefits

For a growing business, mobility has a distinct place. It isn’t all about using a phone for productivity, or having access to tools when you are out of the office, it is a philosophical decision to get the most out of your company’s data. Let’s look at the ways that enhanced mobility can benefit your professional services firm.

0 Comments
Continue reading

Latest Blog

We all know how important it is to protect your desktop and laptop computers from malicious threats. Installing antivirus and security software is one of the first steps you take when you get a new computer, and for good reason. An unprotec...

Contact Us

Learn more about what TechnologyEdge
can do for your business.

gold partner plain resize

504-334-TECH(8324)

TechnologyEdge
3900 River Road Suite 7
New Orleans, Louisiana 70121

Account Login