Ready For Expert IT Services
Call: (317) 522-1362

Has Your Law Office Fallen Behind? C.D.'s IT Consulting LLC Helps You Leverage Cloud-Based Technologies to Improve Your Practice! Do you think your law firm can stay competitive without adopting innovative technologies? If so, think again! In the modern legal industry, law firms simply can’t afford to take the time to write and file information in a folder, then […]

While mobile devices, such as smartphones and tablets, are becoming more popular than ever before in the workplace; is it safe to have mobile devices connecting to the corporate network? As employees continue to utilize personally owned smartphones and tablets to access business resources, it’s fundamental to consider the potential security risks associated with mobile […]

Do you know how many users are tapped into your wireless network right now? How about when you’re not around? The fact is that many small business owners have no idea who is accessing what on their wireless network, and they’d be shocked to find out just how many people are leeching their bandwidth away. […]

Could Potentially Be More Dangerous Than the Infamous Heartbleed! A major vulnerability, CVE-2014-6271, has been spreading rapidly and impacting a wide range of businesses. CVE-2014-6271, also known as “shellshock,” impacts “bash” software, which is used in most business computers. According to some researchers, shellshock could potentially be more dangerous than heartbleed, the open/SSL bug that […]

A major high severity vulnerability, CVE-2014-6271, has been spreading quickly and impacting a wide range of businesses! The vulnerability, also known as “bash,” involves a UNIX type command shell that’s included in most distributions of Apple OS X and Linux. So how does the vulnerability work? An attacker is able to exploit the vulnerability, then […]

So you’ve heard of HIPAA, time and time again, but have you heard of the Medical Information Privacy and Security Act (MIPSA)? Since the enactment of MIPSA, the gaps in federal privacy law have been closed to protect personally identifiable health information; and although many healthcare organizations aren’t aware, it’s fundamental to ensure compliance. Now […]

In today’s increasingly mobile business environment, many employees use consumer grade file sync services to access and share files wherever they’re located; however, the adoption of consumer grade file sync services presents a huge security risk. Unfortunately, a mobile workforce inspired by the BYOD trend makes it difficult to protect sensitive data. While there’s significant […]

Yesterday, Apple did a complete 180 on their recent update to the iPhone and iPad Operating System. Just after a week of launching their iOS 8 update as part of their iPhone 6 release, Apple pulls the plug on 8.0.1 and promises 8.0.2 in the next few days. What do you do in the mean […]

It hasn’t even been one week since Apple rolled out their latest version of the iPhone and iPad operating system, iOS 8, and already we have its first update. Seems like Apple is pretty quick to respond to feedback and introduce some changes. But don’t rush out to download this latest version, because some people […]

We all have that one person on our friends-list. You know who I’m talking about – that person who posts everything including the kitchen sink to their Facebook page. Pictures of what they have for dinner and check-ins at the corner store. But they ARE your friend, and you don’t want to hurt their feelings. […]