Are You Having A Technology Emergency?

Tolar Systems Blog

Tolar Systems has been serving the Abilene area since 2000, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Beginner’s Guide to Mobile Devices and Ergonomics

Sore neck, achy back, locked shoulders – if you spend a lot of time working on computers or mobile devices, these are just a few of the ways that bad ergonomics could be taking a toll on your health and happiness.

Fortunately, there are ways to alleviate the discomfort. We’ll provide you a few tips and ideas to help make your work and life more comfortable.

0 Comments
Continue reading

Care and Feeding of Your IT Systems

Today’s small businesses owners rely on their IT systems for nearly every aspect of their business. Even the most technology averse realize that computers help people be more efficient than the old paper processes used before there was a personal computer on every desktop.

0 Comments
Continue reading

Beginner’s Guide to Data Security and Encryption

Many of our customers in Abilene and beyond are asking us,

"What are data security and encryption, and why are they important to my business?"

After all, much of the business community here in the Texas Big Country and West Texas is comprised of small and medium size businesses. You might assume that because of this, business owners here don’t face many security threats.

0 Comments
Continue reading

Leveraging the Cloud with Office 365

(This article is part three of a three-part series. Please visit our other articles on this topic.)

One of the big changes to the software industry over the last 10 years has been the transition from on-premise, licensed software installations to cloud-based or Software as a Service (SaaS) deliveries, like Office 365. Large enterprises have been using cloud based services for many years; more recently, small and medium businesses (SMBs) have also begun moving to the cloud for their business software needs.

0 Comments
Continue reading

Sharing and Collaboration in Office 365

In our last article we talked about how Office 365 helps simplify and streamline multiple streams of communication, and how some of the communication tools also offer ways to improve collaboration.

Today we’ll focus primarily on the collaboration and sharing aspects of Office 365.

0 Comments
Continue reading

Simplify Your Work and Life With Office 365

One of the big challenges facing each of us in the business world – and even in our personal lives – is that we have so much information coming at us from so many different sources. Whether the message comes from email, instant message, phone message, or social media, trying to stay organized and keep track of which conversations we had on which device is no easy task.

0 Comments
Continue reading

Tolar on BYOD

One of the newest acronyms circulating in I.T. circles is the term BYOD—Bring Your Own Device. And as much as it might sound like an invitation to a social occasion of some sort, BYOD is really a wakeup call to beware your own downfall, so to speak. Or your firewall's downfall, at least. That's because BYOD—the practice of bringing personal devices into corporate workplaces where they are used to connect with the business's wifi, its networks, and its internal processes—is a practice that is fraught with security risks.

0 Comments
Continue reading

Breaking Away from Break-Fix

Ever heard of the break-it-fix-it model? In matters of Information Technology (I.T.), break-it-fix-it refers to the too-common practice of buying a system or device for maintaining one's information systems or internal security or cyber security, then seeing that system “break” or fail, then starting the process all over again with a new purchase or some other form of Band-aid remedy. Life doesn't have to be like that.

0 Comments
Continue reading

The Importance of Buy-In

A regional oil and gas magazine recently shared this remark from Tolar Systems' founder, Lance Tolar, on the topic of I.T. security: “I think people fail to ask the right questions early. Organizational security, I.T. security, is about establishing and practicing good processes as much as it is about investing in good solutions. If you don't have corporate buy-in and a good culture not only to create good I.T. policies, but also practice them, users are going to find ways to circumvent. That's what you want to avoid.”

0 Comments
Continue reading

Professional Email Addresses: 5 Benefits of Branded Email

“The only thing that is constant is change." --Heraclitus

Having a professional email address is crucial to the branding of your business. Branded email simply indicates the customization of email for a business. Instead of using a free email server like yahoo or gmail, a branded email looks like this: . Branded email not only simplifies and secures your data management, but it gives you control over brand consistency - an effective, and critical, step in a branding strategy. But most importantly, the negative impact that generic email has on your brand proves that branded email is the only reasonable selection for a business. For that reason alone it is cost-effective! But here are 5 more ways your company benefits from branded email.

0 Comments
Continue reading

BYOD 2: Top 10 Elements of a Written BYOD Policy

BYOD: A Written Policy

On the surface, BYOD (or “Bring Your Own Device”) seems simple: let employees bring their own tablets and smartphones to work. Save a bundle on hardware. Keep your staff happy and more productive at the same time. But while it may have gone on “under the radar” for quite some time, BYOD is a trend in the modern business world that can no longer be ignored.

0 Comments
Continue reading

BYOD 1: Balancing the Benefits and the Risks of BYOD in the Workplace

“The only thing that is constant is change."
--Heraclitus

The printing press, the steam engine, the light bulb, the personal computer: all of these have revolutionized the world. And each new invention carried with it something all captains of industry learned to crave: opportunity. Opportunity takes a set of circumstances and views them in the light of possibility. But it also requires awareness of potential problems, and the imagination to provide solutions - maybe even before the problems arise.

0 Comments
Continue reading

Collaborative File Sharing Problems...Solved!

Problems with Company Document Management and Collaborative File Sharing

Collaborative file sharing is an essential part of team efficiency and productivity, but unfortunately it can be troublesome and messy. In the past, when employees needed to collaborate on a file, they would each save a copy on their local machines and then email it to each other each time changes were made. This system creates several issues. For example, there are now multiple versions of the document. How can you tell which one is the most recent? Also, it may be difficult to track down documents, and waiting on a co-worker to email a document can sometimes create a bottleneck in the work flow.

0 Comments
Continue reading

Information Technology in a Changing World

Publication Cites Tolar Systems President

The business world is changing fast, and the main reason it is changing fast is because it is being driven by information technology, more commonly referred to, today, as simply “I.T.”

0 Comments
Continue reading
TOP