Is Your IT Services Provider Proactive or Reactive?
/The IT department of a company needs to be proactive and reactive towards any problems that might rise during business hours, know more about it.
Read MoreAffinity Technology Partners - Powering Growth Through Technology since 2002. Learn more about topics like apps, security and more on our blog.
The IT department of a company needs to be proactive and reactive towards any problems that might rise during business hours, know more about it.
Read MoreIt’s that time of year again! Time to make your holiday shopping lists and find the best deals on gifts for friends and family. And if you’re shopping for kids and teens, there’s a good chance that a number of those gifts involve technology. From smartphones and tablets to gaming systems, kids and teens love devices that keep them connected.
As fun as these devices are, they carry hidden dangers, such as potential exposure to pornography, sexting, and cyberbullying. So, before you hit the stores on Black Friday, gift yourself peace of mind by putting healthy guardrails around the technology you give your kids this holiday season.
Read MoreKnow in depth about what EPHI is and what other information falls under the categorization of EPHI under HIPAA.
Read MoreWe are the lead sponsor for the “Bike and Hike Thing”, a bike riding fundraiser organised by Daystar counselling ministries, a non-profit organization.
Read MoreTake our ten questions, self assessment test in order to determine your level of data security this, national cyber security month.
Read MoreKnow everything you know about the founders of Affinity technology partners, Sean and Betsy Wright about their journey to fulfill their dreams.
Read MoreThe national cyber security month is here and now is the great time to know all about cyber security at work and personal use.
Read MoreMany of the precautions businesses need to protect their data involve sophisticated, high-tech safeguards, such as antivirus software or virtual disaster recovery solutions. While these are important, it’s also critical that businesses don’t forget the actual, physical security of the devices and infrastructure that store and transmit their data. While not as sexy as high-tech safeguards, these low-tech precautions are essential components of any business’s cybersecurity strategy.
Read MoreAffinity Technology Partners, together with Constangy, Brooks, Smith and Prophete LLP and the Nashville Area Chamber of Commerce’s Business Studio, are looking to change the perception about cyber security and educate small business owners on best practices to protect their businesses. The organizations are hosting two seminars entitled Small Business, BIG Target: How to Protect Your Company from Cyber Attacks, as part of National Cyber Security Awareness Month (NCSAM) on Oct. 18th and Oct. 27th.
Read MoreBook Sean Wright today to speak to your organization by emailing booking@affinitytechpartners.com. Get tips on how to protect your business assets.
Read MoreHere we go again. We’ve previously written about the dangers of anonymous social media apps targeted at younger users, such as Yik Yak and After School. Regardless of their developers’ intentions, these apps have earned a reputation for facilitating cyberbullying. And today we add Sarahah to our growing list of app alerts for parents.
Read MoreGet an update on the rising sophistication of phishing attacks. Contact us to get rid of such attacks. Take security to the next level.
Read MoreTo what extent does your business rely on a high-speed internet connection? For most of our clients, a fast, reliable connection is ether extremely important or vitally important to their business operations. Almost no one can afford the service slowdowns, let alone outages, that happen far too often even with business-grade service offerings from the major ISPs.
Read MoreAs summer break comes to an end, both parents and kids alike take advantage of back to school sales and tax-free weekends to meet their technology needs for the upcoming school year. For kids, that translates into new tech devices to learn, have fun, and communicate with friends.
But the risks associated with technology—cyberbullying, sexting, exposure to pornography—are real and rampant. With careful planning, parent-child communication, and the right tools, however, parents can put guardrails around their kids and teens’ digital experience.
Read MoreKnow about the newly appointed Kevin Foster, Systems Administrator and Jeremy McNutt, Project Manager and Systems Administrator. Help us congratulate both.
Read MoreOutsourcing IT to a managed services provider (MSP) is becoming a common practice for small and mid-sized businesses. But for many of those companies, the extent of that “outsourced IT” function is support services. Seeking a help desk, they want to be sure that someone is available to address technical issues as they encounter them.
Read MoreOne of the biggest tech trends to emerge over the past few years has made it easier than ever to connect everyday household items to the internet. Sometimes called the Internet of Things (IoT), this new wave of innovation allows us to interact with these devices in ways we once only thought possible in Star Trek or The Jetsons.
Read MoreIt’s common these days for businesses to offer WiFi to their guests. For better or worse, many customers, vendors, partners, and contractors may expect to be able to access WiFi when they’re in your store or office.
There is, however, a right and a wrong way to set up guest WiFi. The right way ensures that guests can access the internet on their devices with minimal hassle, without exposing your internal resources. Setting up guest WiFi the wrong way, however, can create serious security risks.
Read MoreThis past weekend, the world experienced the first truly international ransomware attack. The WannaCry ransomware has infected over 100,000 organizations in 150 countries since it was first discovered on Friday. WannaCry exploits a vulnerability in older or unpatched versions of Windows in order to carry out its mission: to encrypt victims’ data, holding it hostage until the user pays a ransom of $300. It has been spread largely through the use of spam emails containing malicious attachments.
Read MoreThese days, busy professionals in fields from financial services to graphic design are increasingly relying on multiple apps to get their work done, often running two, three, or more apps at the same time. And the more we flip back and forth between email, spreadsheets, and various business-grade apps in our daily work, the more extra screen real estate becomes a necessity.
Read MoreCategories
Recent News
We are committed to powering your growth through an unrivaled service experience and with solutions that work—work for you, and work for your industry.
© 2025 Affinity Technology Partners