Colden Company is proud to have been in business supporting our customer base for over fifteen years. Our success and staying power are a reflection not only of our deep commitment to our customers but also a testament to the successful customers that we service....

Watch as Colden Company President, Jim Lapointe, talks about what to look out for when discussing "All You Can Eat" IT service contracts and why Colden Company delivers more bang for your buck! Tweet !function(d,s,id){var js,fjs=d.getElementsByTagName(s)[0];if(!d.getElementById(id)){js=d.createElement(s);js.id=id;js.src="//platform.twitter.com/widgets.js";fjs.parentNode.insertBefore(js,fjs);}}(document,"script","twitter-wjs"); (function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if...

Superheroes need it, police rely on it, and any business that uses computers (are there any that don't these days?) should use some form of it. It's called backup and it can mean the difference between a brief computer-related setback and restarting your business from...

Technology in a business for the sake of technology is not an effective strategy. Technology should be used for only two things: 1)      Improve efficiency and other revenue generating tasks 2)      Reduce risks and other expense lowering tasks Businesses can be more profitable only in these two manners...

Colden Company used to recommend Microsoft Security Essentials (MSE) to our smaller customers. It was a good product, was free for smaller business use, and was effective in protecting Windows PCs from viruses and other malware. Unfortunately, this former favorite doesn't seem to be as...

You've probably heard about businesses adopting "Bring Your Own Device" (BYOD) policies that allow employees to bring their own mobile devices (smartphones, tablets, etc.) to the workplace for use with business systems. Businesses benefit by saving money on purchasing devices and employees benefit by not...

In today’s digital age, securing your critical information – whether it be personal information or business information – is increasingly difficult. Threats are increasing both in number and in complexity and sophistication. Threats can come from individuals, groups, companies, or even governments.  In January, a...

The technology environment in today’s world puts us all at risk.  Threats are coming at us from so many different angles.  We have to protect ourselves and our businesses against viruses, malware, identity theft, phishing scams and more.  There is no single solution to fully...

Over the years various technologies have been hailed as “game changing” technologies.  Certainly the Internet was one.  Smart phones, cloud computing and virtual computing are also game changing technologies that have altered the way businesses operate.   Managed Services is also a technology buzzword that has...