Are IT issues driving you crazy?

We manage your IT, so you can manage your business.

Shadow IT solution

Shadow IT: How to develop a shadow IT solution (Part 3)

  The second article of this series, “Shadow IT: Why it’s a problem,” explained why shadow IT is an issue for the modern day business and why it must be addressed via thorough analysis and strategic planning. Shadow IT is any hardware or software used within a business that’s not approved or supported by the company’s IT department. This part of the series will explain what companies can do to integrate…
Read More
Shadow IT problems

Shadow IT: Why it’s a problem (Part 2)

The first part of this series, "Shadow IT: What it is," reviewed what constitutes shadow IT and why it's used in the workplace.  As described in the preceding article, shadow IT is any hardware or software used within a business that’s not approved or supported by the company’s IT department. This portion of the series will cover not only the problems the unauthorized use of technology can create for an…
Read More
Shadow IT trends

Shadow IT: A definition and description of Shadow IT trends (Part 1)

  In recent years, shadow IT trends have emerged as a common issue as businesses attempt to embrace technology innovations while maintaining network security. Shadow IT is any hardware or software used within a business that’s not approved or supported by the company’s IT department. Most companies are aware of the risks this ubiquitous technology entails, but many are oblivious just how deeply shadow IT is integrated within their business…
Read More
cybersecurity threats

The future impact of cybersecurity threats on businesses

In 2014, 71% of organizations reported to have been affected by a cyber security attack. Phishing and malware scams have proven to be two of the top threats impelling businesses to attempt to safeguard their network security. The methods hackers are using to fool victims into doing things such as clicking on a malicious link or downloading fake software are becoming increasingly more difficult to identify as threats. As 2016 commences,…
Read More
disaster recovery and business continuity

The difference between disaster recovery and business continuity

Disaster recovery (DR) and business continuity (BC) are often confused by businesses as being the same. However, it's important companies understand the difference between disaster recovery and business continuity to ensure they are well prepared if a disaster occurs. Essentially, both preventive strategies cover how employees will communicate, where they will work, and how they will continue working in the event of an emergency. According to the U.S. Small Business…
Read More
Hunger Busters

Aldridge helps feed Dallas youth at Hunger Busters event

Aldridge President, Bryan Gregory, participated in a Hunger Busters event hosted by Entrepreneurs for North Texas (EFNT), a program that helps its member companies to engage in philanthropy activities to serve both their business and the Dallas/North Texas community. The event was held on Wednesday, June 23, 2016 at the Hunger Busters center in Dallas. Participants helped prepare over 800 sack lunches for marginalized youth in Dallas Independent School District.…
Read More

Book Review for “Who: The A Method for Hiring”

Geoff Smart and Randy Street are the authors of “Who: The A Method for Hiring,” a book that has paved the way for businesses to develop thorough and effective processes around recruiting and hiring. For Aldridge, the book has been a cornerstone in establishing the company’s foundation for hiring employees as it outlines how businesses can avoid common process pitfalls, identify “A” players in the industry, and ensure such candidates…
Read More
HIPAA violation

Non-profit business associate faces penalties for HIPAA violation

  A recent report of a data breach incident has left a bitter taste in the mouths of HIPAA bound business associates (defined below) across the nation. Such organizations were already rattled by the Office for Civil Rights’ (OCR) plan to hold a series of random audits throughout 2016, but the OCR's decision to find blame and assess a fine against the business associate directly has elicited additional concern. On…
Read More

Aldridge CEO to explain how to make money in the cloud at the 2016 Cloud Services Community Roadshow

Aldridge CEO, Patrick Wiley, will be a panelist for the Cloud Services Community Roadshow at the Dallas Tower Club on Thursday, June 23. The panel, “Where is the profit?” will include two other cloud business owners and will feature a discussion of how these entrepreneurs make money in the cloud. The Cloud Services Community was started in September 2012 by Baptie and Co. The community grew out of a need…
Read More
acquire LinkedIn

Microsoft to acquire LinkedIn and bolster social media presence

On Monday, June 14, 2016, Microsoft announced its plans to acquire LinkedIn for $26.2 billion in cash. The deal is scheduled to close by the end of this calendar year and both companies expect the merger to enhance their growth and competitive position within the business sphere. LinkedIn’s CEO, Jeff Weiner, will retain his role, and report to Microsoft’s CEO, Satya Nadella. Microsoft says LinkedIn’s unique brand and culture will…
Read More
packet-drivers-it-support-services