Wilson Technology Group and More

Your One Stop IT and Telecommunications Firm

Leave a comment

Social Media and Information Compliance

Within just a few short years, social media has gone from an emerging experiment in new ways to interact and connect to a legitimate channel in which businesses of all types engage.  The result?  People are now communicating through many different avenues in unprecedented volumes and speed.  Before it was a phone call or email.   Now, via Facebook, Twitter and LinkedIn (to name a few), people are able to reach hundred if not even thousands of people through one click of a finger.

This has resulted in new legal and compliance challenges. To address existing, new, and emerging requirements, it will be important for businesses to understand how they and their employees engage in social media and the solutions necessary to stay compliant.  We will see social media models, along with legal and regulatory agencies, evolve.   Businesses will need to look to develop policies and deploy solutions that are flexible as social media continues to evolve.


Find us on:  Facebook and LinkedIn


Leave a comment

Tips for the Care and Training of New Baby Boomer and Mature Users

Let’s face it.   Baby Boomers (born 1946-1964) and Matures (born before 1946) were not born with a computer in-hand.   They have had to LEARN the technology that the Millennial (born 1980-2000) in particular, takes for granted.   If you are a Millennial, chances are, you have no patience for the older adult who has difficulty with technology.

Imagine – oh my – if you are the Millennial in the workplace who’s job it is to train the new user who is a Baby Boomer or worse yet, a Mature. If possible, assign this to someone from Generation X (born 1965-1979).   They generally have much more patience with Boomers and the Matures.    Members of Generation X are quite comfortable with technology but, unlike the Millennial, they were not born with a computer in their hand.

So what do you do?   The following are some tips and tricks to help with the new user:

  1. Listen to your new user.  If your new user does not understand the computing environment, do not get exasperated and angry.  Give him a training course or another user who is closer in age to train and mentor.
  2. Be generous with your support…at least at the beginning.  You do not want him to develop an “us against them” attitude.
  3. Be flexible.  Introduce new software slowly.
  4. Show him what you are willing to do rather than doing what he wants you to do.
  5. Be consistent.
  6. Be realistic – as natural as a computer is to you, it is not for the older Baby Boomer or Mature.

The success or failure depends on you and your mastery of the principles of user training.

Good luck.


Find us on Facebook and LinkedIn.

Leave a comment

The Evolution of Social Media and Information Compliance

Social media presents unique opportunities for even the most tightly regulated or highly litigated organizations.  As social media evolves, it will only become more pervasive and create changing methods for interacting with employees, clients, counter-parties, and the public at large.  At the same time social media interactions present unique risk to organizations.  As organizations develop their social media governance models, they should be mindful of the legal and regulatory environment that creates certain obligations, but also prohibit or limit some types of conduct.  More importantly, they should look beyond merely the ability to capture social media interactions and instead focus on what it all means.

Taken from:  hp.com/go/getupdated


Find us on Facebook and LinkedIn

Leave a comment

Minimum Basics of Network Security

If you don’t use your computer for much more than browsing the web, creating a couple documents, and storing family photos, then you don’t need to do much to keep everything safe.

1. Keep your software up to date: Software updates aren’t just about adding new features, they’re often about patching security holes. Thankfully, the update process is very simple. On Windows, click the Start Menu > All Programs > Windows Update. On Mac, click the Apple menu, and choose Software Update. Both update programs run periodically on their own, but it’s always good to check for a new update if you hear about a security issue.

2. Change your router’s security settings: If you’re still running your router’s default settings, then pretty much anyone can get into your home network and peek in on your computers. It’s not hard to crack WEP passwords or WPA passwords, but you should at least enable a non-default password and network name on your router.

3. Backup your photos and documents: Perhaps you’re not all that worried about what would happen if your $200 computer dies because you don’t do that much with it. Still, chances are you have a resume or some vacation photos on the hard drive. Backing up those few important files is easy. Cloud storage like Dropbox, Box, and Skydrive take very little time to set up. Once you do, your few important documents will be saved online.

4. Prevent downloaded software from installing automatically: Malware often comes in the form of a download you don’t notice happening, but it’s easy to stop. On Windows, disabling AutoRun can stop around 50% of Malware threats, and all you need is the free software Disable Autorun. On Mac, downloads shouldn’t run automatically, but if you’re using OS X Mountain Lion you can set up GateKeeper (System Preferences > Security & Privacy > General) to only allow applications from the Mac App Store for added security.

These are just the basics. If your computer is your livelihood, you need to do a few more things to keep your data secure.



Find us on Facebook and LinkedIn

Leave a comment

Cabling: You Get What You Pay For

As we become more and more dependent on our technology, it is important that we don’t forget the cabling that this  runs on.   We don’t see most cabling so we tend to forget that it exists yet it is the foundation of our network.  

Low voltage cable installers are required, by state law, to be licensed.   Is your contractor licensed?  In the state of Florida, find out by going to:  www.myfloridalicense.com.

Many also have the internationally respected credential of a BICSI RCDD – an individual who has trained and tested to the highest degree of telecommunications design knowledge known in the industry.  An RCDD is uniquely positioned to create the detailed design of new systems and/or the integration of a design into an existing system.  The credential is globally recognized within the ITS industry.   It is frequently required by many private and governmental organizations as part of the bidding criteria.

What can a BICSI RCDD offer you?


o   Every RCDD has successfully completed and passed an extensive exam on the fundamentals of telecommunications distribution design.   All RCDD’s have a minimum of five years experience.


o   RCDD’s must keep their knowledge current to maintain their designations


o   Formerly tested on their working knowledge of industry codes and standards applicable in their region


o   An RCDD is trained on both!


o   Technology is changing daily.  The required CEU’s and access to the latest industry information provides RCDD’s with accurate and current knowledge about emerging technologies.  This ensures you will receive the best in long-term cabling solutions for your organization.


o   RCDD’s have been tested in the proper design of vendor-neutral cabling systems and are not limited by specific product criteria.  BICSI credentialing encourages innovation, use of advanced industry techniques and big picture thinking.

Find Wilson Technology Group on:  Facebook: LinkedIn; and Twitter.