Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

Do You Know How Much You Should Be Spending on Cybersecurity?

Do You Know How Much You Should Be Spending on Cybersecurity?

Nowadays, you can’t afford not to have some portion of your business’ budget set aside for cybersecurity. The question is, how much do you need, and what should you be spending it on first? Let’s take a few moments to dig a little deeper into this question and examine a few cybersecurity protections you should establish as your business’ baseline defenses.

0 Comments
Continue reading

Looking for Your Business to Go Green? The Right Tech Can Help!

Looking for Your Business to Go Green? The Right Tech Can Help!

It isn’t unusual for modern businesses to turn more and more often to “green” technologies, partially due to the reduced environmental impacts that come with their use, and partially due to the operational advantages that many of these technologies also bring. Let’s discuss some of the options that even smaller businesses can embrace that bring these kinds of mutual benefits.

0 Comments
Continue reading

Tip of the Week: Building Better Habits through Habit Stacking

Tip of the Week: Building Better Habits through Habit Stacking

Productivity is always a primary focus for a business today, which makes any effort to improve it a welcome one. We wanted to take a moment and introduce you to a simple concept to make it easier to develop productive habits: something called habit stacking.

0 Comments
Continue reading

Implementing Bring Your Own Device, Without Bringing Your Own Risks

Implementing Bring Your Own Device, Without Bringing Your Own Risks

There’s no denying that running a successful business comes with its fair share of costs, and many would argue that some of these costs are anything but fair. As such, it makes sense to try and minimize your operating expenses by any sustainable means. Let’s go over one such cost-saving measure you can implement—Bring Your Own Device policies—and address how to do so without shortchanging your business’ security in the process.

0 Comments
Continue reading

Tip of the Week: The Easiest Way to Add Up a Column in Excel

Tip of the Week: The Easiest Way to Add Up a Column in Excel

Microsoft Excel is an extremely capable spreadsheet creation and management tool, made all the more powerful through the inclusion of many handy shortcuts and features. We wanted to share one for a common enough function that you are effectively sure to find a use for it: quickly adding up the values in a single column.

0 Comments
Continue reading

Understanding the Five Levels of Delegation

Understanding the Five Levels of Delegation

As the boss, you’re in a position to offload many of your business’ responsibilities to your employees. That’s more or less why you have employees in the first place. However, there’s more than one way that you can delegate tasks, depending on your personal style of management and the work style of each of your employees.

0 Comments
Continue reading

Blank Emails are a Sign of Dangerous Spam

Blank Emails are a Sign of Dangerous Spam

We talk a lot about phishing. What it is, what it does, and perhaps most critically, what it looks like. However, have you ever expected a phishing email to look like… nothing? As in, a completely blank message?

If you answered, “no,” that’s exactly what today’s cybercriminals are counting on.

0 Comments
Continue reading

Does Managed IT Really Pay for Itself?

Does Managed IT Really Pay for Itself?

Businesses use all types of sayings to try to draw in customers. One of the core selling points of managed IT services is that “it pays for itself”. This is more than just marketing. The multiple services that make up managed IT services all help a business save time and money, but when added together, it can really help the bottom line of a business more than most services they can use. In this week’s blog we thought we would go through the core elements of a managed IT services agreement to show how it really does pay for itself. 

0 Comments
Continue reading

Tip of the Week: Putting Google Alerts to Work for You

Tip of the Week: Putting Google Alerts to Work for You

There are many ways that Google can be a hugely valuable resource for a business of any size. One way that you may not have thought of before: an automated insights collector.

Let’s talk about how you could be using Google Alerts to keep yourself up to speed on basically whatever you want.

0 Comments
Continue reading

Don’t Fall for These 3 Browser Myths

Don’t Fall for These 3 Browser Myths

There is a lot of misinformation and misperceptions out there related to network security, especially where small businesses are concerned. In particular, browser security is one aspect where many individuals’ knowledge simply falls flat, and they buy into myths that put their data at risk. Let’s clear up some of these misconceptions so you can go about your day in a more secure way.

0 Comments
Continue reading

Want Additional Windows Functions? Consider Microsoft PowerToys

Want Additional Windows Functions? Consider Microsoft PowerToys

Since the Windows 95 operating system, Microsoft has been separately publishing 15 free utilities to add significant capabilities intended to help a user make some small tweaks and adjustments in a relatively safe way, as compared to what would otherwise be necessary to make these changes. Microsoft PowerToys are still available today, so let’s discuss what some of them can do…and how you should go about getting these tools, if so you choose.

0 Comments
Continue reading

The Cloud Drives Your Business… and the Modern Cinema

The Cloud Drives Your Business… and the Modern Cinema

Television has come a long way since its inception, and entertainment is more accessible today than it has ever been before. Technology has played a large part in the dissemination of this entertainment, so we thought we’d take a look at how the cloud has contributed to making television the cornerstone of leisure that it is today.

0 Comments
Continue reading

Ask a Tech: How to Choose the Right Laptop to Buy

Ask a Tech: How to Choose the Right Laptop to Buy

We spend a lot of time working with the technology that businesses rely on, including the laptop workstations used by just about everyone in many organizations today. As such, we wanted to share some of our insights so that you know what qualities you should look for when you’re ready to acquire some additional devices for your business.

0 Comments
Continue reading

The Pitfalls of Procrastination: How to Beat It, in the Long Term

The Pitfalls of Procrastination: How to Beat It, in the Long Term

Over the past several weeks, we’ve been picking apart procrastination as a concept and how it tends to manifest. To wrap up our discussion, we wanted to share a few ways that you might be able to greatly reduce your and your team’s tendencies to procrastinate so that more can be accomplished.

0 Comments
Continue reading

What is It About the IoT that Makes It an Appealing Target for Cybercrime?

What is It About the IoT that Makes It an Appealing Target for Cybercrime?

The IoT—the Internet of Things—is a fascinating technology, as it exemplifies just how much can be accomplished when Internet connectivity is used to augment the capabilities of otherwise “dumb” devices. Unfortunately, as fascinating as it is, the IoT is also infamous for its security issues…a reputation that attackers have been perpetuating as these devices grow more common.

0 Comments
Continue reading

What are (Probably) Your Biggest Cybersecurity Threats?

What are (Probably) Your Biggest Cybersecurity Threats?

Of all the cybersecurity threats out there for your business to contend with, there are going to be a few of them that are just more likely to impact you than others. That’s just a statistical reality. Fortunately, these threats can be addressed, so let’s discuss how you can do so.

0 Comments
Continue reading

The Pitfalls of Procrastination: How to Beat It, in the Short-Term

The Pitfalls of Procrastination: How to Beat It, in the Short-Term

We’ve been examining the concept and phenomenon known as procrastination in recent weeks, touching on why we do it and how it often manifests itself in business processes. For our final few parts, we’ll be focusing on how you can stop procrastinating by utilizing both quicker, short-term tactics and long-term, sustained changes. Let’s start with some short-term tactics.

0 Comments
Continue reading

It’s Important to Be Selective With Your Business’ VPN…Here’s Why

It’s Important to Be Selective With Your Business’ VPN…Here’s Why

“I just wanted to take a second to thank the sponsor of this video, [insert VPN provider here], for supporting the channel!”

If you’ve been on YouTube in the past few years, this message likely sounds pretty familiar. Virtual private network providers have been taking advantage of the trend of influencer marketing to spread awareness of their largely obscure product—often, offering an enticing deal. While we have and will continue to promote the use of a VPN for business purposes, we wanted to clarify something here: these are not the VPNs we’re saying you should use.

0 Comments
Continue reading

Should AI Development Be Stopped? Experts Say So

Should AI Development Be Stopped? Experts Say So

It seems that you can’t turn your head nowadays without seeing artificial intelligence being incorporated into some software or platform. However, many leaders in the technology space have expressed their concerns about—as they put it—the “profound risks to society and humanity” that AI poses, outlined in an open letter. 

0 Comments
Continue reading

The Pitfalls of Procrastination: What Kind of Procrastinator are You?

The Pitfalls of Procrastination: What Kind of Procrastinator are You?

We recently started to pick apart the concept of procrastination as a means of understanding it better, and potentially, getting better at not doing it. Last time, we touched on a few ways that procrastination can potentially manifest, so it only made sense to us that we would continue pulling that thread and try to help you identify how you tend to procrastinate more specifically.

0 Comments
Continue reading
Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...