Blog Post by Oxen Tech
Oxen TechDec 10, 2018
Confessions of an IT Professional – Part 2 - Data Backups
This week's article is the second in a series by OXEN's own Terry Allen, one of our ...
Start Reading
Oxen TechDec 3, 2018
Check email header information for signs of spoofing
Think about this scenario: A friend tells you that they received a message from your ...
Start Reading
Oxen TechNov 12, 2018
What is OneDrive for Business?
If your organization uses Office 365, then you have OneDrive. But you may not be using it.
Start Reading
Oxen TechOct 15, 2018
Potential Impact of New and Forthcoming U.S. Tariffs
OXEN Technology has recently been asked about the potential impact of new and forthcoming ...
Start Reading
Oxen TechOct 1, 2018
Our Shared Responsibility: National Cybersecurity Awareness Month
Today we kick off National Cybersecurity Awareness Month (NCSAM), an annual initiative to ...
Start Reading
Oxen TechAug 13, 2018
Eyes on Tech: The Technology Consulting Process
Eyes On Tech The Technology Consulting Process By OXEN Staff We frequently consult with ...
Start Reading
Oxen TechJul 16, 2018
What you gain with Managed IT Services
We could talk about the benefits of managed IT services all day, every day. Managed IT ...
Start Reading
Oxen TechJun 11, 2018
Basic Cybersecurity Tips for the Workplace
In our increasingly Internet-connected world, all businesses now need to ensure their ...
Start Reading
Oxen TechMay 21, 2018
Your first backup conversation: What to know, what to ask
You may wonder where to start if you’re investigating a backup solution for your business ...
Start Reading
Oxen TechApr 9, 2018
Do You Have a Digital Mindset? Office 365 Enables the Digital Workplace of the Future
The traditional 9-to-5 office job is becoming a dated concept. More and more people now ...
Start Reading
Oxen TechMar 26, 2018
Simple and Secure IT with Essential Managed Services
Your uptime and security are your most valuable network assets. Unexpected IT problems or ...
Start Reading
Oxen TechMar 5, 2018
Breaking Down Security into Manageable Parts: People, Policy, and Perimeter
Security isn’t simple anymore. Arguably, it was never simple to begin with, but there’s ...
Start Reading
