Is BYOD Nothing but Hype?

Leave a comment / Posted By John Dolan on Fri, Sep 12, 2014

I have to admit, I was caught off-guard a bit by a recent MSPmentor blog post that claimed, “BYOD and BYOA is NOT at the top of the Fortune 500 CIO agenda and doesn’t even pop on the radar for small business owners.” Before I comment on this, the article does give an agreeable description...

Read More

UTG Named Member of Ingram Micro’s Prestigious VentureTech Network

Leave a comment / Posted By Eric Dykes on Fri, Sep 5, 2014

World’s Largest Technology Distributor Selects UTG to Join Elite Group of IT Solution Providers ATLANTA, GA–(Sep 5, 2014) – UTG, a local technology solution provider, has been selected to join Ingram Micro’s VentureTech Network™.  Ingram Micro is the world’s largest technology distributor. The community is an exclusive national network of technology service providers who specialize in...

Read More

Know Your Clouds: Public, Private and Hybrid

Leave a comment / Posted By Mike Verner on Fri, Aug 22, 2014

The cloud is as much an efficient approach to building out IT services as it is a technology. As an approach towards effective IT, cloud computing takes advantage of the full power of virtualization technologies to offer a wide array of cloud-powered services that can be delivered through different deployment models. In this article, we...

Read More

New Office 365 SMB Plans Starting Oct 1, 2014

Leave a comment / Posted By Brian Miller on Fri, Aug 15, 2014

Attention, small and medium-size businesses (SMBs)! Microsoft is revamping Office 365 subscriptions for SMBs with the new cloud-powered plans that bring greater choice, value and flexibility on October 1, 2014. As part of a larger plan by Microsoft, the tech giant is adding three new versions of its Office 365 suite, replacing the existing SMB plans. However,...

Read More

Join us at Camp TBI and help some special children!

Leave a comment / Posted By Eric Dykes on Fri, Aug 8, 2014

I’d like to share a recent special experience. A few days ago, I  had the privilege of spending some time with the children at Camp TBI. I felt both honored and grateful for the opportunity to make a difference in these kids’ lives. Camp TBI is a retreat packed with social events, activities, and learning opportunities...

Read More

Dell’s Five Best Practices for Maximizing Mobility Benefits [SlideShare]

Leave a comment / Posted By Eric Dykes on Fri, Aug 1, 2014

Dell recommends that companies carefully align their bring-your-own-device (BYOD) program with data security and privacy regulations to avoid any pitfalls concerning compliance. While BYOD initiatives can be great for employees, they often pose a potential nightmare for employers as failure to comply with regulations can result in companies suffering financial penalties, litigation and damage to...

Read More

UTG Named 26th Fastest Growing Ingram Micro SMB Channel Partner in the U.S.

Leave a comment / Posted By Brian Miller on Fri, Jul 25, 2014

World’s Largest Technology Distributor Recognizes United Technology Group’s Achievements and Success in Annual Ingram Micro SMB 500 List at Inaugural IMOne Event in New Orleans #IMOne2014 We are honored that UTG has been included in the prestigious Ingram Micro SMB 500 list. The annual list recognizes the top 500 fastest-growing Ingram Micro U.S. channel partners...

Read More

How to Protect Yourself with Office 365 Encrypted Email

Leave a comment / Posted By Richard Dolan on Fri, Jul 18, 2014

With ever increasing concerns surrounding privacy, security and data theft it’s wonder that more organizations aren’t leveraging encrypted email. Perhaps it’s because there really hasn’t been a comprehensive, user friendly solution for sending encrypted email. The adage that, if something isn’t simple and easy people won’t do it, comes to mind. There are many business situations where this...

Read More

Data Theft, the Black Market and How to Protect Yourself

Leave a comment / Posted By Richard Dolan on Fri, Jul 11, 2014

If you’ve ever been a victim of sensitive data falling into the wrong hands, then you know just how serious the repercussions can be. What would happen if your credit card numbers, network logins, or social security number were compromised? Credit card fraud, service disruptions due to malicious attacks and identify theft happen EVERY DAY. Someone...

Read More

Aligned IT support is happening right now for these companies: