Avoid Online Bloodsuckers This Halloween

There are thousands of ghouls and goblins running amuck around the internet. They include actual people who “want to suck your blood”  a-hem…. “want to get your data.” How do you know if your computers and networks are secure from these online bloodsuckers? There are several aspects to security: virus detection, other malware detection, firewalls, secured […]

BYOD’s Blurred Lines

BYOD (Bring Your Own Device), a term coined in 2009 that became prevalent as an emerging trend in 2011, continues to be a hotly debated topic in the workplace for businesses, IT providers and employees alike. BYOD is about employees bringing their own devices into the workplace and using those devices to access privileged company […]

Data Breach!

Data breach. If you click on the term data breach hyperlink will take you to have music to the company the term data breach because the consequences can truly be quite serious and destructive. Did you know that in the first four months of 2014 there were more than 300 publicly disclosed data breaches in […]

VDI – Virtual Desktop Infrastructure

My wife informed me that my original title for this post “VDI and other productivity enhancing TLAs” was confusing, she also told in my hair looked ridiculous…She was right about the hair so I quick changed the title to the current iteration. Virtual Desktop Infrastructure or VDI, is not new to the IT computing world. […]

Open Mesh – Cloud Based Mangement Wireless Networks

We want to take a little time to tell you about an amazing modular wireless network system called Open Mesh. It doesn’t replace your router, it will expand your Wi-Fi network’s range, speed, and overall efficiency. And it is one of the most cost efficient IT solutions we have ever come across. Open Mesh is […]

The Mighty, Mini Raspberry Pi -Part Two

If you consider yourself a techno-stein, hacker, or a dedicated IT enthusiast, and you’ve never heard about the Raspberry Pi, you’re in for a treat. In our last blog simply titled Raspberry Pi we briefly explored the credit card sized computer called Raspberry Pi and the organization (Raspberry Pi Foundation) responsible for creating and marketing […]

Blogess Interuptess…It’s All Mine Moneypenny Redux.

As the Cloud Wars continue we at CSI Onsite want to keep you informed on what we have found to be useful to our customers and in our own personal/business experience. Don’t know what the Cloud Wars are?  Not to worry, the concept is very simple to comprehend. The difficulty comes in wading through the […]

Top 10 Catch Phrases that didn’t make it as CSI Onsite’s Catch Phrase

CSI Onsite…Techs you can trust. This is a great vision statement that really does capture the heart of what we want to be as a company. This statement did not just fall in our laps; we worked with nationally recognized personal and venture coach Leary Gates (Lumina Consulting Group, BoldPath Life Strategies, and LearyGates.com) to […]

Trust…

Welcome to CSI Onsite’s Blog. Normally we blog about a variety of topics in the Information Technology arena, this post is no different save that we want to wax philosophically rather than practically. Let’s begin by asking you to answer a simple question. Why do you choose a certain Automotive Technician over another to repair […]

Moments of Joy

Being a one stop IT shop in the Twin Cities, communication is of paramount importance for our team to provide solid customer service. This is true with all service industries; to discover the issue and provide a viable solution the parties involved have to be able to communicate clearly with one another. Sometimes the results […]