the
BDK blog

Bad IT Habits to Fix to Stay on Track in Your Business
Technology is a critical component for running a business. From email use, file sharing, and data collection to remote-working capabilities, your IT infrastructure is imperative in ensuring day-to-day business operations are functioning. With this in mind, it is possible that you or your employees are committing some of IT’s greatest

Why pfSense?
With the push to zero trust networks over the last few years, the firewall is still one of the most important devices on your network to protect your company and customers. Selecting a firewall can be a daunting task with all of hardware features to pick from. Throw in all of the

How to Successfully Manage an ERP Upgrade or Implementation
Implementing or upgrading your ERP system is a big decision for any business and offers several important advantages: Improved organizational efficiency and streamlined processes Organized information readily available to inform business decisions Simplified data entry and automated processes Improved ability to scale your business But ERP implementation can be challenging.

Managing Data Services for EDI (Electronic Data Interchange)
EDI is tricky, even for experienced and talented IT teams. EDI requires a particular expertise. You have to understand exactly how EDI transmission works, how data is segmented, and how to disperse this data properly throughout your system. If anything goes wrong along the way, your customers’ orders will not

Case Study: Improving Inventory Visibility Through a Mobile ERP Interface
The manufacturer featured in this case study produces a variety of fiber-based supplements that aid in digestion, weight management, cardio health, and blood sugar health. The company has 60 employees at its Maryland production plant. For several years, BDK has provided managed IT services to this company. Managed services have given our

Ransomware 101: What You Need to Protect Your Business
Despite how widespread these attacks have been in recent years, the issue of ransomware remains rather mysterious to most people. Obviously, the criminals behind ransomware attacks don’t want to draw too much attention to themselves. But the victims of the attacks also want to stay out of the spotlight in