cjan centrix

5 Things Your IT Company Should Be Doing for You … But Probably Isn’t

It’s not uncommon for small businesses to employ IT companies to manage their IT-related issues and functions to maintain operational efficiency. But not all IT companies are created alike. In fact, some may not even be doing what they are supposed to be doing to address the business’s needs. Here are five aspects small business owners should consider.

Read More

How To Know When You’ve Outgrown Your IT Provider

Many IT companies specialize in offering services to companies of a specific size. Others are just one person and perfect for a small business just starting out. Still others specialize in offering fully managed services to small businesses and some offer the same to large businesses and even giant corporations.
Some IT providers can grow with you, but oftentimes small businesses outgrow their IT providers. How do you know it’s time to move on?
Read More

In-House vs. Outsourced IT: What Is Best for Your Business?

There are no “normal” information technology (IT) requirements for a company in today’s market. Some businesses require extensive information security and attention to compliance requirements. Another may be looking for public cloud solutions. Maybe your business needs all these tools and more, and you aren’t sure where to go with IT services. According to CIO Magazine, an average of 4 to 6 percent of revenue is spent on IT.

With a cost that adds up to this much revenue, having a competent and trustworthy IT team is essential. Once the need for IT specialists is apparent, the question is one of insourcing vs. outsourcing and whether to hire an in-house team or an outsourced team on an as-needed basis.

Read More

The Complete Guide To Securing Your Company’s Network

The threats of cybersecurity attacks and hacking aren’t limited to large enterprises. The importance of securing your company’s network could not be understated.
 
Small and medium-sized businesses frequently face these threats, too. According to a UPS Capital report, small and medium-sized businesses represent almost two-thirds of companies that experience a cybersecurity breach in the United States.
 
Moreover,  data breaches continue to climb and went from just 200 data breaches in 2005 to 1,300 in 2017. With data breaches forecasted to rise, it’s important to be aware of some of the top types of security breaches your company is up against and how to secure your company’s network. Here’s how you can get it done.
Read More

centrexIT Announces New CEO, New HQ and a Total Company Re-Focus on Culture and Customer Care

Today, centrexIT is turning a page in its history by announcing the return of the company’s founder, Dylan Natter, who is re-assuming the role of CEO. This executive shift in leadership comes at a time when the company is poised for continual growth. Dylan’s mission is to ensure that this growth is built upon the company’s culture of customer care and consistent with the company’s vision and core values.
Read More

centrexIT Partners with San Diego Humane Society’s Walk for Animals

centrexIT is proud to announce we will be attending and contributing to the San Diego Humane Society’s Walk for Animals on Saturday, May 5 at Liberty Station! This exciting event is open to the public and will raise awareness and funds for animals in need within our community. The walk will be held from 7am to 12pm at NTC Park at Liberty Station. 2455 Cushing Rd. San Diego, CA 92106
Read More

Why a Company Should Migrate from On-Site Servers to Cloud Servers

For a small to mid-size company,  IT services can be an expensive challenge. Having a fully-staffed IT department is cost-prohibitive. Having just one IT person on salary will not be enough to handle all the issues that arise with on-site servers, hardware, and the internet. Contracting for these services often means delayed repairs and a piecemeal approach to a vital business operation.
Read More

Why centrexIT Did a Mannequin Challenge

I’m a sucker for a challenge.

My niece Kaydence recently told me about the Mannequin Challenge, which has swept the internet in the past few months. You’ve probably seen one – a big group of people remain totally motionless while a video camera swoops around them.

Read More

How Cybersecurity Worked Before 1970

Today, cybersecurity is a hot topic. You can’t turn on the news without hearing about hacking, protecting against hacking or other cybersecurity-related topics. In fact, the term “Cyber”, no longer meaning “Cybernetic”, has become IT slang for “Cybersecurity”.  Cybersecurity is portrayed today as a war between the good guys and bad guys. This war is nothing new, in fact cybersecurity began when humans made the first technological advance.
Read More

What is a CASB & When Should You Use One?

Over the last year, I’ve been asked many times about Cloud Access Security Brokers (CASB)s. Even if people don’t use those words, the topic comes up over and over. This blog is a quick reference to discuss cloud authentication, Single-Sign-On (SSO) and other related technologies.
Read More