The Meridian Blog: Tech News, Tips & More for SMB and Enterprise Environments

Windows XP & 2003 Upgrade Essential for Network Security & Compliance

Jordan Arnold

Posted by Jordan Arnold
Tue, Sep 17, 2013


Windows Server 2003, Windows XP, and Exchange 2003 will reach their end-of-life on April 8, 2014, which means that Microsoft will no longer support maintenance, security updates and patches for the systems.

After this date, these systems will lack protection from Malware and Spyware software—hackers are waiting in the wings to attack once these systems become vulnerable. Furthermore, systems running on Windows Server 2003 or XP will no longer be HIPAA Compliant once the deadline hits.

Read More

Finding Happiness in ESOP

Todd Stanton

Posted by Todd Stanton
Tue, Sep 10, 2013

Read More

Patent Trolls: A Security Threat That Costs Small Businesses Billions

Shannon Goff

Posted by Shannon Goff
Tue, Sep 03, 2013


If you have yet to hear from or about patent trolls, you're lucky. Patent trolls, or PAEs (patent assertion entities), are becoming more common and increasingly threatening to businesses everywhere, especially to small businesses that do not have access to as many resources to fight back. With 62% of all patent lawsuits in the US brought on by these entities—and their existence largely causing the creation of the 2011 America Invents Act—it's time to arm yourself with the knowledge necessary to identify PAEs and fight back.

Read More


Robert Bruce

Posted by Robert Bruce
Tue, Aug 13, 2013

Are We Cyber Secure, or Cyber Insecure?                              

I’m stuck in traffic near the Pentagon, and the heat is rising off the asphalt in waves. The air conditioner is on full blast, but I’m still sweating. After five minutes without moving an inch, I decide to check my e-mail. No signal. Maybe it was the 95 degrees. Maybe it was my proximity to the Pentagon. But, my first thought was—cyber attack. They’ve shut down our critical infrastructure. How else could I not get a signal right next to the Department of Defense?

Read More

Cloud-Based IT Security Offers Protection from Malware, Spyware and More

Victor Apple

Posted by Victor Apple
Tue, Aug 06, 2013

Understanding that the largest risk to any system is ultimately the end-user is a key element to providing proper IT support solutions that protect both the user, as well as their data from the perils of the internet. It is critical that we have a strong system in place to provide both a constant level of protection with little oversight; while at the same time providing instant reaction time should a threat happen to present itself. 

Read More

Top 5 Reasons Your Organization Should Perform an IT Assessment

Juliana Lee

Posted by Juliana Lee
Thu, May 02, 2013

Is your IT a Burden or an Enabler? 

Read More

A Power Shift - CFOs Now Have More Control of IT Services Spending

Brandon Phillips

Posted by Brandon Phillips
Wed, May 01, 2013

CFOs are continuing to have more control over their organization’s IT spend. As this power shift continues to move away from CIOs, companies should continue to look to Managed IT Services as a value-added technology investment.

Read More

Leave A Comment

About this blog

News, best practices and more to help you get the most out of your office technology. Whether you're an SMB owner who wears a lot of hats, or an enterprise IT director, facilities manager or just someone who wants to work smarter — this blog has the resources you need to maximize the business impact of all your tech investments. Be sure to subscribe to receive email updates about new posts!

Download our eBook



Sort Posts by Topic

see all