Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

Tip of the Week: Docking your Laptop while Keeping it Closed

Tip of the Week: Docking your Laptop while Keeping it Closed

The laptop is an excellent piece of office equipment due to its portability and its power to meet the needs of most of today’s workforce. When in the office, however, many prefer the much larger screens that are more typical of the traditional desktop. Let’s talk about how you can get the best of both worlds by plugging your laptop into a set of peripherals and using it while it's closed—effectively turning it into a PC’s tower.

0 Comments
Continue reading

Expect to See More Folding Phones in the Future

Expect to See More Folding Phones in the Future

Foldable phones undeniably saw a very slow start when they were introduced a few years ago, high prices and horror stories about their fragility scaring away all but the earliest of early adopters. However, thanks to an enthusiastic fanbase, the concept has persisted and has become a legitimate option amongst flagship devices. 

Let’s consider some of the predictions that have been made surrounding the future of the foldable smartphone market, and why business users might be drawn to the flexible form factor. 

0 Comments
Continue reading

Implementing Bring Your Own Device, Without Bringing Your Own Risks

Implementing Bring Your Own Device, Without Bringing Your Own Risks

There’s no denying that running a successful business comes with its fair share of costs, and many would argue that some of these costs are anything but fair. As such, it makes sense to try and minimize your operating expenses by any sustainable means. Let’s go over one such cost-saving measure you can implement—Bring Your Own Device policies—and address how to do so without shortchanging your business’ security in the process.

0 Comments
Continue reading

What Can We Learn from T-Mobile’s Latest Data Breach?

What Can We Learn from T-Mobile’s Latest Data Breach?

It hasn’t been very long since T-Mobile experienced its latest major hack, but unfortunately, here we are again. Hackers have again accessed customer data, with 37 million customers being affected amongst both their prepaid and subscription-based accounts.

Let’s dive into the situation, and what can be learned from it.

0 Comments
Continue reading

Are Your Apps Broadcasting Your Exact Location?

Are Your Apps Broadcasting Your Exact Location?

Mobile devices have become a key part of our daily lives, to the point that many of us openly feel undressed without our phones. As a result, our phones go everywhere with us. However, it’s important to remember that some applications have requested access to our location information. Do all of these apps need to know precisely where we are?

0 Comments
Continue reading

Reviewing Smartphones - The Foldables

Reviewing Smartphones - The Foldables

With so many great smartphones on the market, there are bound to be a couple that stand out for being innovative and interesting in their designs. These devices—many of which fall into the foldable category—are pretty neat and worth looking into. Here are some of the better options on the market today.

0 Comments
Continue reading

Reviewing Smartphones - The Flagships

Reviewing Smartphones - The Flagships

When purchasing your next smartphone, you might want to consider the latest flagship devices. Today, we want to discuss what the latest and greatest smartphones can offer for your business.

0 Comments
Continue reading

Is This the End of the Desktop Computer?

Is This the End of the Desktop Computer?

Is the era of the desktop computer over? Is it time to rip the bandage off and ditch the traditional bulky tower, cables, and monitors for something sleeker, lighter, and more specialized?

Maybe!

0 Comments
Continue reading

Cybersecurity Tools Every Business Should Have

Cybersecurity Tools Every Business Should Have

We typically like to remind people as much as we can of the importance of staying up-to-date with your organization’s cybersecurity. There are plenty of things you can do to strengthen your grip on your network. This month we thought we’d go over some of the solutions we offer to help our clients secure their network and infrastructure. 

0 Comments
Continue reading

Tip of the Week: Using Your Android Device from Your Desktop

Tip of the Week: Using Your Android Device from Your Desktop

Windows 10 has long played nice with the Android platform, but did you know that there is a way that you can actually use the same apps you would find on your mobile device on your PC? For this week's tip, we'll go over how you can enable this capability.

0 Comments
Continue reading

VoIP is Probably Right for Your Business

VoIP is Probably Right for Your Business

VoIP (Voice over Internet Protocol) telephony is a common technology amongst modern businesses for their communication needs. Let’s go over how VoIP functions and how it can benefit your company.

0 Comments
Continue reading

Are Apple Devices Immune to Threats? Don’t Bet On It

Are Apple Devices Immune to Threats? Don’t Bet On It

For a very long time, Apple has been requested to share a workaround for their platform security with law enforcement, which the company has refused outright. Their argument has been that doing so would inherently undermine their lauded security. Well, the feds have given up asking, because they went ahead and developed a workaround themselves… and in doing so, have revealed that iOS isn’t quite as secure as it was purported to be.

0 Comments
Continue reading

The 2021 Guide for Stopping Annoying Robocalls

The 2021 Guide for Stopping Annoying Robocalls

“It was getting to the point where I wouldn’t answer my cell phone anymore.”

Does this sound familiar? If you get a lot of scam calls, you are probably ready to toss your phone off a pier. Not only are these calls annoying, they can be outright dangerous. I’m going to tell you right now—stopping them altogether isn’t easy, but there are ways to prevent them to a degree.

0 Comments
Continue reading

How Important Is It to Keep Devices Charged Up?

How Important Is It to Keep Devices Charged Up?

Owners of Nintendo’s Switch console should know that, as per an announcement from Nintendo, the battery life of their device could be negatively impacted if the device isn’t charged up at least every six months. While this may not be the kind of news you’d expect to find on a business technology blog, it does open the door to a bigger, more pertinent topic: should devices that aren’t used very often be kept charged up?

0 Comments
Continue reading

Considering Point of Sale Technology

Considering Point of Sale Technology

Point of sale software and solutions have long offered massive benefits to businesses, with these benefits growing as the technology has advanced. Let’s look at how the POS system has developed over the years to offer the business utilities and benefits that it does today.

0 Comments
Continue reading
Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...