When you think of world-class customer service, Disney is at the top of the list. Every guest interaction is designed to be smooth, proactive, and downright magical. But what if your IT support could deliver the same level of seamless service?
read moreAI is revolutionizing business operations, but for small to mid-size businesses, the biggest challenge isn’t adopting AI, it’s making sure it actually delivers value. Too many companies waste money on overhyped tools that don’t integrate well, fail to generate ROI, or create security risks.
read moreCybercriminals are using AI to launch sophisticated attacks faster than ever before. Deepfake scams, AI-powered phishing, and ransomware that learns from you are no longer just Hollywood fiction—they’re real threats facing small and midsize businesses today.
read moreStriking the perfect balance between IT investment and cost efficiency is a challenge for any growing business. Spend too little, and you risk security vulnerabilities and outdated technology holding you back. Spend too much, and you’re throwing money at solutions you don’t need.
read moreCybercriminals are using Valentine’s Day as the perfect cover for phishing scams, fake websites, and CEO fraud, targeting businesses just like yours. With a 39% spike in love-themed cyber threats, hackers are crafting emails, invoices, and even phone calls that look convincingly real.
read moreTechnology is evolving rapidly, and businesses that fail to adapt risk falling far behind. From AI-driven automation to the power of cloud computing, the next five years will bring transformative changes that can enhance your operations, improve security, and drive growth. Are you ready to future-proof your business and stay ahead of the competition?
read moreAs you kick off your health and fitness goals for the year, have you considered how secure your personal health data really is? Popular fitness apps may help track your progress, but they could also be exposing your sensitive information to third parties without your knowledge.
read moreSocial engineering attacks are becoming more sophisticated every day, using human psychology to bypass even the strongest technical defenses. From phishing emails to voice phishing (vishing) calls, attackers are finding new ways to trick individuals into sharing sensitive information or granting access to systems.
read moreGood password hygiene is more important than ever in today’s threat-filled digital landscape. Yet, many businesses still rely on weak or reused passwords—leaving sensitive data vulnerable to cyberattacks. Did you know that 75% of passwords are reused across accounts, making it easy for hackers to exploit?
read moreThe cybersecurity landscape is evolving at lightning speed as we enter 2025. Cybercriminals are adopting advanced AI tactics, regulations are tightening, and the stakes for businesses have never been higher.
read moreThe year 2025 promises to be a turning point for artificial intelligence and its impact on how we interact with information online. A combination of technological innovation, legal battles, and shifting consumer behavior is poised to transform the AI landscape and search is at the center of this revolution. Here's how AI will shape search in 2025 and what businesses need to know to stay ahead of the curve.
read moreThe holidays are the perfect time for gifting exciting tech like smartphones, tablets, or gaming consoles. But did you know these devices can pose serious security risks if not set up properly?
read moreAs holiday travel picks up, hackers see a prime opportunity to exploit travelers who may let their guard down on their digital security. Security risks like phishing, public WiFi and lost devices can easily compromise your personal information during travel. But it’s not just your data at stake – when employees let their guard down, they can unknowingly open the door to threats for their entire company.
read moreAs the October 14, 2025, end-of-support date for Windows 10 approaches, it's crucial to understand the implications for your business and the advantages of transitioning to Windows 11. Here's what you need to know:
read moreIn today’s data-driven world, your client database is one of your most valuable assets. It’s the lifeblood of your business, containing the information you need to build relationships, close deals, and grow revenue. But what happens when this critical resource is stolen or misused?
read moreAs holiday travel picks up, hackers see a prime opportunity to exploit travelers who may let their guard down on their digital security. Security risks like phishing, public WiFi and lost devices can easily compromise your personal information during travel. But it’s not just your data at stake – when employees let their guard down, they can unknowingly open the door to threats for their entire company.
read moreSpooky season is here and you can finally feel good about buying the Halloween candy that has been on the shelves since July 5th. It ALSO means the biggest online shopping day of the YEAR is just weeks away: Cyber Monday. Unfortunately, it’s also open season for cybercriminals. Now that’s scary. Because preparation is the best prevention, we’re covering the six most common shopping scams this time of year and how to avoid them.
read moreWhile we do not wish to raise alarm or cause unnecessary panic over the situation, we do believe that businesses should remain vigilant throughout this epidemic and prepare ahead of time to minimize risk. Our team here at Computer Dimensions is closely monitoring the situation and has already taken steps and put in place contingency plans at Computer Dimensions to mitigate the risks so that we are able to continue servicing our clients.
read moreAs you may have heard, Marriot has reported that their Starwood reservation database was hacked, potentially compromising upwards of 500 million records. Marriott is one of the largest hotel chains in the world. Anyone who made a reservation for a Starwood property on or prior to September 18, 2018 is at risk. Breached information includes names, credit card numbers, birth dates, arrival and check out dates, and passport numbers.
read moreThe construction industry has always been mobile with field employees at jobsites, in transit and set up in mobile offices. Keeping the field and office teams in real-time collaboration is invaluable, especially if it means major cost savings to your business as well as the customer.
read moreThe accelerating migration to the cloud is creating an attractive target for cybercriminals. One of the primary cloud offerings is Microsoft Office 365 which is being heavily targeted. I have provided a brief history of Office 365 attacks in order to illustrate the challenges of effectively protecting employees from danger once your company makes the move to a cloud offering such as Office 365. It is also worth pointing out that Office 365 is considered to be one of the more secure cloud offerings.
read moreEvery year Computer Dimensions looks to play an active role in our community by donating resources to causes looking to make a difference. One such opportunity presented itself at the Arizona Builder’s Alliance Annual Chairman’s Installation Dinner and Auction. The ABA holds a silent and live auction each year with proceeds going towards a Tucson non-profit organization that helps our community. This year’s organization is Literacy Connects which has a mission of connecting people of all ages to a world of opportunities through literacy and creative expression. Computer Dimensions and Hamilton Distillers, makers of Del Bac Whiskey, partnered to offer a live auction item of a private tour and tasting as well as a unique gift basket that was a big hit at the auction. We found it to be a great way to offer unique Tucson experiences while benefiting community organizations that make a big difference.
read moreIt is a certainty that people will make mistakes. This is especially true when speaking about technology. People will yank the wrong plug, click on a malicious link, open a suspicious email attachment, or compromise an entire network with a personal usb key. They trip, spill and sync dangerous third-party apps to the network. They visit inappropriate and unsafe websites. They delete business critical files, both accidentally and intentionally. It’s natural, we are humans after all.
read moreWe were honored to be nominated for the Professional Service Company of the Year Award at the 22nd Annual Cornerstone Building Foundation Awards Banquet, held at the J.W. Marriott Starr Pass Resort on Tuesday, March 8th, 2016. Although we didn't win, we thank those (whoever you are) for nominating us and understanding the hard work and dedication we put in on your behalf. The Cornerstone Foundation:
read moreOur customer appreciation event was a great success this year with a wonderful turnout. The venue was stunning at the Miniature Time Machine with it's holiday decor and one of a kind world of miniatures. Adding to the fun was a holiday themed scavenger hunt which had all participants searching the displays in the hopes of winning the big prize. We're grateful to all of our wonderful clients and partners and could not think of a better way to spend an enchanting evening.
read moreThere are many compelling reasons to engage in a managed IT service model from your technology partner. It allows for a clear and simple model of pricing while delivering a comprehensive service solution to your business. It provides a far better value to businesses both large and small. Most importantly, it allows for a methodology of proactive response and the addressing of potential issues before they happen.
read moreGreat weather, a fantastic turnout and of course a wonderful cause resulted in another successful Harvest for Hope event. People from all ages came out to run, walk and even skip in the 5k as well as help to raise much needed food for the community. Aside from the walk/run, the event hosted a dj music area, balloon makers and shirts and medals for all attendees. Even Golder Ranch Fire Department made an appearance to join in the fun. Thank you to all who helped to put on this great event as well as all participants who help to make the Tucson community one large family.
read moreThe Southern Arizona Architects and Engineers Marketing Association (SAAEMA) 2015 marketing clinic was a great event. Presenters Jack Enfield, Kristyn Meza and Maisha Christian Hagan delivered powerful trends and tools for marketers as well as business best practices. The event was hosted at Psomas with a fun mixer taking place after the event at Sir Veza’s Taco Garage. Thank you to all in attendance as well as everyone involved in putting together a great event. We look forward to seeing everyone again next year.
read moreLet’s see if I can guess your password. 123456? qwerty? Password1? Let’s try abc123, 111111, monkey or Trustno1 (very clever on that last one)? Did I guess correctly? If so, congratulations on having one of the twenty five most popular (moronic) passwords of 2015.
read moreYou finally took that big step and made sure your data is backed up and secure. It’s time to relax knowing that monkey is off your back. Think again. While data backup is a critical step, it gives you little to no information as to how long it will take to recover your data. Does the backed up data include critical software and system data which will allow for a quick rebuild of failed hardware? What is the process in place for testing the reliability of the backed up data? How do I know all my data will be restored in perfect condition regardless of how long it takes? In short, data backup is only the process of copying files. There are a myriad of ways it can be done which you would likely have no interest in learning the technical details involved. What is necessary in learning is how your backup process allows for a fast recovery and a methodology of testing the data backups on a regular basis. Waiting until disaster strikes is not a good time to find out if everything works as you had assumed.
read more