
CAREER TIPS: Breaking into the Computer Network Support/Cybersecurity Industry
Set up a home network with server and firerwall to gain an edge on other applicants trying to break into this rewarding career.

Dominant Systems Guide to Choosing the Right HP Zbook Model
How to select the right HP, Inc. mobile workstation for your needs.

How to Contact HP, Inc. for Commercial PC & Laptop Warranty Claims
Need to do a warranty claim for an HP, Inc product? Here is how to reach their warranty department by phone.

Best Practices for Managing Your Organization’s Data
Features 15 best practices for managing your organization’s data.

Ransomware Protection Using a Dual Vendor Approach
Overlap the security software and systems from multiple vendors to get a multi-layered approach to the ransomware scourge.



Why you should consider Fortinet firewalls for your small business
Fortinet firewalls are an excellent chopice for small businesses. Here is why.





Serious MS Outlook Vulnerability Found
A serious vulnerability in MS Outlook has been discovered which needs immediate patching.

Hacking + Financial Scam = Big Trouble
Lately we have seen an increase in the number of computer hacks that are combined with financial scams. They typically work like this:


Happy Holidays from Dominant Systems
Happy Holidays from Dominant Systems, one of Michigan’s oldest providers of IT products and services.


Protecting Your Network from Ransomware Using 2 Different Security Vendors
Use one vendor for firewalls and another for endpoint protection to achieve overlapping protection from ransomware .

Creating Strong Passwords
Here is how to create a password that will stop hackers who are using password-guessing (aka dictionary attack) software.