(520) 743-7554

Read Our IT Blogs to Get the Latest IT Tips

Is Your Business Ready for Windows 11? The Clock is Ticking!
Cyber Security and Compliance

As the October 14, 2025, end-of-support date for Windows 10 approaches, it's crucial to understand the implications for your business and the advantages of transitioning to Windows 11. Here's what you need to know:

read more
Is Your Competitor Using Your Client Database? How Would You Know?
Cyber Security and Compliance

In today’s data-driven world, your client database is one of your most valuable assets. It’s the lifeblood of your business, containing the information you need to build relationships, close deals, and grow revenue. But what happens when this critical resource is stolen or misused?

read more
Hackers Are Watching: Follow These Simple Steps For Safe Holiday Traveling
Cyber Security and Compliance

As holiday travel picks up, hackers see a prime opportunity to exploit travelers who may let their guard down on their digital security. Security risks like phishing, public WiFi and lost devices can easily compromise your personal information during travel. But it’s not just your data at stake – when employees let their guard down, they can unknowingly open the door to threats for their entire company.

read more
6 Shopping Scams and How To Avoid Them This Holiday Season
Cyber Security and Compliance

Spooky season is here and you can finally feel good about buying the Halloween candy that has been on the shelves since July 5th. It ALSO means the biggest online shopping day of the YEAR is just weeks away: Cyber Monday. Unfortunately, it’s also open season for cybercriminals. Now that’s scary. Because preparation is the best prevention, we’re covering the six most common shopping scams this time of year and how to avoid them.

read more
COVID-19 Coronavirus and Impact on I.T.
Managed IT Services

While we do not wish to raise alarm or cause unnecessary panic over the situation, we do believe that businesses should remain vigilant throughout this epidemic and prepare ahead of time to minimize risk. Our team here at Computer Dimensions is closely monitoring the situation and has already taken steps and put in place contingency plans at Computer Dimensions to mitigate the risks so that we are able to continue servicing our clients.

read more
The Marriott Breach And What You Need To Know
Cyber Security and Compliance

As you may have heard, Marriot has reported that their Starwood reservation database was hacked, potentially compromising upwards of 500 million records. Marriott is one of the largest hotel chains in the world. Anyone who made a reservation for a Starwood property on or prior to September 18, 2018 is at risk. Breached information includes names, credit card numbers, birth dates, arrival and check out dates, and passport numbers.

read more
Developing Custom Software Is Easier, Cheaper & A Huge Time Saver
Custom Programming and Software Development

The construction industry has always been mobile with field employees at jobsites, in transit and set up in mobile offices. Keeping the field and office teams in real-time collaboration is invaluable, especially if it means major cost savings to your business as well as the customer.

read more
Malicious Activity in the Office 365 Cloud
Cyber Security and Compliance

The accelerating migration to the cloud is creating an attractive target for cybercriminals. One of the primary cloud offerings is Microsoft Office 365 which is being heavily targeted. I have provided a brief history of Office 365 attacks in order to illustrate the challenges of effectively protecting employees from danger once your company makes the move to a cloud offering such as Office 365. It is also worth pointing out that Office 365 is considered to be one of the more secure cloud offerings.

read more
ABA & Literacy Connects of Tucson
Company News

Every year Computer Dimensions looks to play an active role in our community by donating resources to causes looking to make a difference. One such opportunity presented itself at the Arizona Builder’s Alliance Annual Chairman’s Installation Dinner and Auction. The ABA holds a silent and live auction each year with proceeds going towards a Tucson non-profit organization that helps our community. This year’s organization is Literacy Connects which has a mission of connecting people of all ages to a world of opportunities through literacy and creative expression. Computer Dimensions and Hamilton Distillers, makers of Del Bac Whiskey, partnered to offer a live auction item of a private tour and tasting as well as a unique gift basket that was a big hit at the auction. We found it to be a great way to offer unique Tucson experiences while benefiting community organizations that make a big difference.

read more
Have A Backup Plan
Backup and Disaster Recovery

It is a certainty that people will make mistakes. This is especially true when speaking about technology. People will yank the wrong plug, click on a malicious link, open a suspicious email attachment, or compromise an entire network with a personal usb key. They trip, spill and sync dangerous third-party apps to the network. They visit inappropriate and unsafe websites. They delete business critical files, both accidentally and intentionally. It’s natural, we are humans after all.

read more
Cornerstone Nomination
Company News

We were honored to be nominated for the Professional Service Company of the Year Award at the 22nd Annual Cornerstone Building Foundation Awards Banquet, held at the J.W. Marriott Starr Pass Resort on Tuesday, March 8th, 2016. Although we didn't win, we thank those (whoever you are) for nominating us and understanding the hard work and dedication we put in on your behalf. The Cornerstone Foundation:

read more
Computer Dimensions’ Customer Appreciation Party
Company News

Our customer appreciation event was a great success this year with a wonderful turnout. The venue was stunning at the Miniature Time Machine with it's holiday decor and one of a kind world of miniatures. Adding to the fun was a holiday themed scavenger hunt which had all participants searching the displays in the hopes of winning the big prize. We're grateful to all of our wonderful clients and partners and could not think of a better way to spend an enchanting evening.

read more
Managed IT Services: A Proactive Model
Managed IT Services

There are many compelling reasons to engage in a managed IT service model from your technology partner. It allows for a clear and simple model of pricing while delivering a comprehensive service solution to your business. It provides a far better value to businesses both large and small. Most importantly, it allows for a methodology of proactive response and the addressing of potential issues before they happen.

read more
Harvest For Hope 2015 - Fun For All
Company News

Great weather, a fantastic turnout and of course a wonderful cause resulted in another successful Harvest for Hope event. People from all ages came out to run, walk and even skip in the 5k as well as help to raise much needed food for the community. Aside from the walk/run, the event hosted a dj music area, balloon makers and shirts and medals for all attendees. Even Golder Ranch Fire Department made an appearance to join in the fun. Thank you to all who helped to put on this great event as well as all participants who help to make the Tucson community one large family.

read more
Monster Marketing Mashup
Company News

The Southern Arizona Architects and Engineers Marketing Association (SAAEMA) 2015 marketing clinic was a great event. Presenters Jack Enfield, Kristyn Meza and Maisha Christian Hagan delivered powerful trends and tools for marketers as well as business best practices. The event was hosted at Psomas with a fun mixer taking place after the event at Sir Veza’s Taco Garage. Thank you to all in attendance as well as everyone involved in putting together a great event. We look forward to seeing everyone again next year.

read more
Farewell To The Password
Cyber Security and Compliance

Let’s see if I can guess your password. 123456? qwerty? Password1? Let’s try abc123, 111111, monkey or Trustno1 (very clever on that last one)? Did I guess correctly? If so, congratulations on having one of the twenty five most popular (moronic) passwords of 2015.

read more
Data Backup
Backup and Disaster Recovery

You finally took that big step and made sure your data is backed up and secure. It’s time to relax knowing that monkey is off your back. Think again. While data backup is a critical step, it gives you little to no information as to how long it will take to recover your data. Does the backed up data include critical software and system data which will allow for a quick rebuild of failed hardware? What is the process in place for testing the reliability of the backed up data? How do I know all my data will be restored in perfect condition regardless of how long it takes? In short, data backup is only the process of copying files. There are a myriad of ways it can be done which you would likely have no interest in learning the technical details involved. What is necessary in learning is how your backup process allows for a fast recovery and a methodology of testing the data backups on a regular basis. Waiting until disaster strikes is not a good time to find out if everything works as you had assumed.

read more


Call Us Today (520) 743-7554