1. FBI to pull plug on DNSChanger

    by
    Comment
    The Internet has become one of the most important tools in our personal and professional lives. It’s hard to imagine what life would be like without it. There’s a chance that may happen for users who’ve been infected by the DNSChanger Trojan. This nasty Trojan has infected many computers around...
  2. Business Intelligence Apps For SMBs

    by
    Comment
    As our devices and workflows become more and more technically advanced, the amount of data available to a company of any size has increased exponentially. For small businesses that have been using spreadsheets like Microsoft Excel, this data could quickly overwhelm your Business Intelligence (BI) efforts. To avoid this, many...
  3. Security threats come from inside

    by
    Comment
    It’s common to see companies showing confidence in their security systems. Their networks are protected from external threats, which can often lead to a false sense of being secure. With this attitude, they may stop thinking about security and fail to establish internal measures within their networks, and this is...
  4. Is your BCP ready for action?

    by
    Comment
    If the past 10 years has taught us anything, it’s that many managers are woefully underprepared for disasters of any kind. We’re resilient though, and will always find a way to survive. One of the keys to a business’s survival during times of hardship is the Business Continuity Plan (BCP)....
  5. Social Media = Friend Not Foe

    by
    There’s no doubt in the value of using social media to build your brand. But opinions differ in the use of social media by employees. It seems that companies are polarized in the issue, but are being slowly awakened to the fact that allowing employees to access social media at...
  6. Six Steps to Efficient Collaboration

    by
    With the explosion of technological devices in recent years, companies have been given a golden opportunity to foster a more collaborative environment. This has not been lost on business owners, who have adopted tools that work best with a joint effort en masse. There’s a drawback to this however, many...
  7. 650,000 Macs Infected by Trojan

    by
    Comment
    One selling point of the Mac is that the OS, OSX, is more secure than a computer running Windows. Many Mac users have been lulled into a sense of complacency and have been taking inadequate steps to protect their systems. A recent trojan has shocked these users into reality and...
  8. Big, Big, Big Data for Small Business

    by
    Data is all around us, it seems that wherever we go we’re leaving a data trail the size of a mountain. It’s estimated that in 2011 we generated 1.8 Zettabytes (10^21) of it. By 2015 that number is expected to be 7.8 Zettabytes per year. The amount of data out...
  9. Get Your Business Ready for VoIP

    by
    Comment
    Technology has advanced at a rapid pace over the past 30 years, with many devices moving from physical systems to digital versions, including one of the most useful: the telephone. While the use of landlines is still prevalent among some businesses, many have started to turn to the digital version,...
  10. BCP Roadblock: Software or Template?

    by
    Comment
    Business continuity planning – an important consideration companies have been looking into, and adopting in increasing numbers. It’s vital that businesses can operate in any condition and that they won’t be affected by disasters. One of the steps in implementing a successful protection strategy involves working out whether to use...

About Us

Originally a computer repair franchise organization, Expetec now provides a full range of IT services for small and medium businesses.

Today Expetec offers the technology services businesses need to be successful in today’s marketplace-including network administration, network security, business continuity and web services.

Contact us

244 West Harrison Avenue
New Orleans, LA 70124

(504) 324-1143 (phone)
(877) 296-8003 (toll free)
Contact us

Follow us

Follow us: Facebook
Copyright © 2012 Expetec Technology Services. All rights reserved.