1. The Real Value of Your Network

    What is the real value of your network? How much will downtime or a network security issue cost your organization? Is your network as secure as it should be? Medicine Bow Technologies is committed to helping you answer these questions. We are a Wyoming-based company that understands the risks and challenges of matching technology with vision in Healthcare, Business, Education, and Government. That…Read More

  2. Understanding your Cyber Security Risk

    StaySafeOnline.org provides some great tips that can help small and medium businesses understand the cyber security risk small and medium businesses face. Smaller businesses are becoming bigger targets for cybercriminals because criminals understand that they have fewer defense resources than large enterprises. As Casper's leading provider of IT service for schools, businesses, healthcare faciliti…Read More

  3. Choosing An IT Backup Location

    Regardless of your business, the odds are that your computer system stores large amounts information that is either sensitive or vital to your daily operations. Now imagine that an unforeseen disaster destroys your hardware and wipes out all of your data. Would you be able to keep going? How much time and money would you have to put into rebuilding your business? Data is nothing new, and its loss …Read More

  4. Our IT Consulting Team Can Be Your On-Call Security Specialist

    Every modern business relies on the internet to get things done. No matter if you operate a small business out of your garage or a multinational corporation in a large facility, your business connects to the internet every day to carry out vital tasks. Unfortunately, your connection may leave you vulnerable to people who want access to your information through that same channel. That's why it…Read More

  5. Basic IT Security Tips

    While the landscape of cyber security is constantly evolving, many network security principles remain the same, focusing on the way business manage their online presence and store and transmit important business information. To help you build an IT solution that fits your needs, we are providing descriptions of some of the most basic requirements for IT security. Of course this doesn’t repla…Read More

  6. Managing Risks In Your eCommerce Business

    Nearly unlimited access to the internet has given rise to a generation of entirely new entrepreneurs. No longer is it necessary to secure a bank loan or office space to start a business; all you need is an internet connection and something to sell. Ecommerce businesses are the success story of the 21st century, allowing anyone with a good idea for goods and services to hang up their digital “shi…Read More

  7. 2015 Wyoming Data Security Laws Review

    As every year comes to an end many take it as a time for reflection, however, most don’t reflect on network security…. but perhaps they should. Did you know that 2015 brought fortified data security laws for Casper and the rest of Wyoming? As of July of 2015 WY Stat § 40-12-501 broadened the definition of Personal Information while WY Stat § 40-12-502 implemented new Breach notification req…Read More