Blog

BYOD or CYOD: Which policy is better?

Most of us now rely on our mobile devices to make work easier. To accommodate this, companies are adopting a bring your own device (BYOD) policy. For businesses that don’t want to adopt this policy, another popular option is choose your own device (CYOD). Below is a brief overview of BYOD and CYOD. BYOD This […]

How Office 365 connectors work

At work, we depend on apps for productivity. However, with so many tabs open in our web browsers, it can be a drag to constantly click in and out of them just to get the information we need. Fortunately, Office 365 Connectors for Groups allows you to stay on top of all the third-party services […]

Past Event—Join RoundTable at the Best Nonprofit Conference Presented by Nonprofit New York—December 10th

We invite you to join RoundTable Technology at Nonprofit New York’s Best Nonprofit Conference.
Joshua Peskay will be giving introductory remarks prior to the session on the Key Area of Excellence of Technology and Data Use and former RoundTabler Karim Beldjilali, now Senior IT Auditor for The New York Times, and RoundTable client Anita Romero, Deputy Director of the Weeksville Heritage Center, will be the presenters for the session on Technology and Data Use.

Past Event—Joshua Peskay to Present at the 2019 Nonprofit Financial Conference in Maine—December 4th

Joshua Peskay, Vice President of Technology Strategy at RoundTable Technology, will  present two workshop sessions, "10 Steps to Cybersecurity Maturity" and "Change Management for Nonprofits" at the 2019 Nonprofit Finance Conference, hosted by the Maine Association of Nonprofits on Wednesday, December 4, 2019, and held this year at the Cross Insurance Center in Bangor, Maine.

What companies get wrong about business continuity

Every business owner knows that having a business continuity plan is crucial to the success of their organization. However, when the unexpected does happen, companies tend to overlook how well employees can stick to the plan. To make sure your plan doesn’t go up in flames, here are five critical mistakes you must avoid. Mistake […]

Underutilized Windows 10 tips and tricks

Are you using all of Windows 10’s awesome productivity features? From adjusting system and battery performance to silencing notifications, you could be missing out on powerful features and productivity enhancements — check out our four favorites. Night Light This feature lets you reduce the amount of blue light emitted from your screen, which reduces eye […]

Difficulties when backing up a virtual server

Many small businesses have embraced data virtualization over the past few years. And as with any kind of business data, virtualized data needs to be protected from disaster, cybercrime, and human error and, therefore, needs backup. When backing up your virtualized data, there are some most common difficulties you need to prepare for. Data virtualization […]

Security tips for Macs and other Apple devices

Many Apple users believe that their Macs and iPhones are invulnerable to security threats, but this just puts them at risk of falling prey to hackers. Macs, iPhones, and other Apple devices are not unhackable, and the only way to truly protect all your devices is to observe safe practices. Keep abreast of current security […]

The laptop vs. desktop debate for small businesses

Running a small- to mid-sized business (SMB) requires you to make important decisions. One of the biggest you’ll need to make in the early stages of your business involves your SMB’s computer hardware. Should you invest in a desktop computer or a laptop? Here are some considerations to help you decide. Portability Modern desktop computers […]

Webinar—Defend & Protect—Your Path to Compliance with New Cybersecurity Laws—February 27thJoin Us