As the October 14, 2025, end-of-support date for Windows 10 approaches, it's crucial to understand the implications for your business and the advantages of transitioning to Windows 11. Here's what you need to know:
read moreIn today’s data-driven world, your client database is one of your most valuable assets. It’s the lifeblood of your business, containing the information you need to build relationships, close deals, and grow revenue. But what happens when this critical resource is stolen or misused?
read moreAs holiday travel picks up, hackers see a prime opportunity to exploit travelers who may let their guard down on their digital security. Security risks like phishing, public WiFi and lost devices can easily compromise your personal information during travel. But it’s not just your data at stake – when employees let their guard down, they can unknowingly open the door to threats for their entire company.
read moreSpooky season is here and you can finally feel good about buying the Halloween candy that has been on the shelves since July 5th. It ALSO means the biggest online shopping day of the YEAR is just weeks away: Cyber Monday. Unfortunately, it’s also open season for cybercriminals. Now that’s scary. Because preparation is the best prevention, we’re covering the six most common shopping scams this time of year and how to avoid them.
read moreWhile we do not wish to raise alarm or cause unnecessary panic over the situation, we do believe that businesses should remain vigilant throughout this epidemic and prepare ahead of time to minimize risk. Our team here at Computer Dimensions is closely monitoring the situation and has already taken steps and put in place contingency plans at Computer Dimensions to mitigate the risks so that we are able to continue servicing our clients.
read moreAs you may have heard, Marriot has reported that their Starwood reservation database was hacked, potentially compromising upwards of 500 million records. Marriott is one of the largest hotel chains in the world. Anyone who made a reservation for a Starwood property on or prior to September 18, 2018 is at risk. Breached information includes names, credit card numbers, birth dates, arrival and check out dates, and passport numbers.
read moreThe construction industry has always been mobile with field employees at jobsites, in transit and set up in mobile offices. Keeping the field and office teams in real-time collaboration is invaluable, especially if it means major cost savings to your business as well as the customer.
read moreThe accelerating migration to the cloud is creating an attractive target for cybercriminals. One of the primary cloud offerings is Microsoft Office 365 which is being heavily targeted. I have provided a brief history of Office 365 attacks in order to illustrate the challenges of effectively protecting employees from danger once your company makes the move to a cloud offering such as Office 365. It is also worth pointing out that Office 365 is considered to be one of the more secure cloud offerings.
read moreEvery year Computer Dimensions looks to play an active role in our community by donating resources to causes looking to make a difference. One such opportunity presented itself at the Arizona Builder’s Alliance Annual Chairman’s Installation Dinner and Auction. The ABA holds a silent and live auction each year with proceeds going towards a Tucson non-profit organization that helps our community. This year’s organization is Literacy Connects which has a mission of connecting people of all ages to a world of opportunities through literacy and creative expression. Computer Dimensions and Hamilton Distillers, makers of Del Bac Whiskey, partnered to offer a live auction item of a private tour and tasting as well as a unique gift basket that was a big hit at the auction. We found it to be a great way to offer unique Tucson experiences while benefiting community organizations that make a big difference.
read moreIt is a certainty that people will make mistakes. This is especially true when speaking about technology. People will yank the wrong plug, click on a malicious link, open a suspicious email attachment, or compromise an entire network with a personal usb key. They trip, spill and sync dangerous third-party apps to the network. They visit inappropriate and unsafe websites. They delete business critical files, both accidentally and intentionally. It’s natural, we are humans after all.
read moreWe were honored to be nominated for the Professional Service Company of the Year Award at the 22nd Annual Cornerstone Building Foundation Awards Banquet, held at the J.W. Marriott Starr Pass Resort on Tuesday, March 8th, 2016. Although we didn't win, we thank those (whoever you are) for nominating us and understanding the hard work and dedication we put in on your behalf. The Cornerstone Foundation:
read moreOur customer appreciation event was a great success this year with a wonderful turnout. The venue was stunning at the Miniature Time Machine with it's holiday decor and one of a kind world of miniatures. Adding to the fun was a holiday themed scavenger hunt which had all participants searching the displays in the hopes of winning the big prize. We're grateful to all of our wonderful clients and partners and could not think of a better way to spend an enchanting evening.
read moreThere are many compelling reasons to engage in a managed IT service model from your technology partner. It allows for a clear and simple model of pricing while delivering a comprehensive service solution to your business. It provides a far better value to businesses both large and small. Most importantly, it allows for a methodology of proactive response and the addressing of potential issues before they happen.
read moreGreat weather, a fantastic turnout and of course a wonderful cause resulted in another successful Harvest for Hope event. People from all ages came out to run, walk and even skip in the 5k as well as help to raise much needed food for the community. Aside from the walk/run, the event hosted a dj music area, balloon makers and shirts and medals for all attendees. Even Golder Ranch Fire Department made an appearance to join in the fun. Thank you to all who helped to put on this great event as well as all participants who help to make the Tucson community one large family.
read moreThe Southern Arizona Architects and Engineers Marketing Association (SAAEMA) 2015 marketing clinic was a great event. Presenters Jack Enfield, Kristyn Meza and Maisha Christian Hagan delivered powerful trends and tools for marketers as well as business best practices. The event was hosted at Psomas with a fun mixer taking place after the event at Sir Veza’s Taco Garage. Thank you to all in attendance as well as everyone involved in putting together a great event. We look forward to seeing everyone again next year.
read moreLet’s see if I can guess your password. 123456? qwerty? Password1? Let’s try abc123, 111111, monkey or Trustno1 (very clever on that last one)? Did I guess correctly? If so, congratulations on having one of the twenty five most popular (moronic) passwords of 2015.
read moreYou finally took that big step and made sure your data is backed up and secure. It’s time to relax knowing that monkey is off your back. Think again. While data backup is a critical step, it gives you little to no information as to how long it will take to recover your data. Does the backed up data include critical software and system data which will allow for a quick rebuild of failed hardware? What is the process in place for testing the reliability of the backed up data? How do I know all my data will be restored in perfect condition regardless of how long it takes? In short, data backup is only the process of copying files. There are a myriad of ways it can be done which you would likely have no interest in learning the technical details involved. What is necessary in learning is how your backup process allows for a fast recovery and a methodology of testing the data backups on a regular basis. Waiting until disaster strikes is not a good time to find out if everything works as you had assumed.
read more