Monthly Archives: April 2013

Client Spotlight – 5 Bean Coffee

5 Bean Coffee is the official remote office of PC Geeks!

5 Bean serves CrimsonCup Coffee and loose leaf tea. They offer free Wi-Fi all day, TV, and a convenient drive thru and a patio.  There is something for everyone!  The staff is super-friendly and has one goal in mind – to take care of YOU!

They have a great variety of hot, over ice and blended espresso based drinks.  With over 40 different syrups and sauces, they can mix up some fabulous, unique beverages.  Don’t do coffee?  They have frozen hot chocolate, iced teas, and 12 different loose leaf teas.  Hungry? They have Sammy’s bagels, muffins, cake pops from Fantasy Cupcake, home  made cookies and caramels.

Don’t forget they can CATER!  Pick up coffee and bagels for a morning meeting.

Meet us there. We’ll buy your first drink!

HOURS Stop in to see them Monday – Friday 6 a.m. – 8 p.m.,
Saturday 7:00 a.m. – 8 p.m., and Sunday 8 a.m. – 6 p.m.

Tracy Heitmeyer
5 Bean Coffee
2087 A St. Rt. 256
Reynoldsburg, Ohio 43068
614-322-BEAN
www.5beancoffee.com

BYOD – Let the party begin!!

byodBYOD? Don’t you mean BYOB? What the heck is BYOD?

BYOD is short for Bring Your Own Device. BYOD refers to the practice of employees or clients bringing their own computing devices – such as smartphones, laptops and tablets – to the workplace for use and connectivity on the corporate network.

OH! No big deal right?

Let’s put it this way…it doesn’t have to be a big deal. But, if you don’t adapt a BYOD policy for your employees and guests, it could be! Tablets and smartphones are capable of carrying and transmitting viruses and enabling unauthorized access to your network and data, just like any PC or laptop.

BYOD Security

BYOD security starts with the company establishing (and enforcing) a BYOD security policy that clearly states the company’s position so that they can better manage these devices and ensure network security is not compromised by employees using their own devices at work.

Setting up a ‘guest’ network can allow your employees and guests to access the Internet while keeping your corporate network secure. But, if you want to allow your employees to access corporate resources via their personal devices, your BYOD security must provide detailed security requirements for each type of personal device that is used in the workplace and connected to the corporate network. You should require devices to be configured with passwords, prohibit specific types of applications from being installed on the device or require all data on the device to be encrypted. Limiting what programs or apps are permissible or requiring an approved anti-virus be installed are also recommended.

For an interesting look at how BYOD is affecting the business world, check out this infographic – http://www.biztechmagazine.com/article/2013/04/byod-growing-needs-more-support-it-infographic

We say – Join the party. It’s BYOD!
Just make sure you hold the keys.