877.630.6640
  •     |     Blog     |  
  • Client Login

Blog Archives

Infographic: Guide to creating an effective BYOD policy

Posted on by Compudyne Admin

Link to original post at Studyweb.com: http://www.studyweb.com/byod-policy/ How to Establish a BYOD Policy By Studyweb.com Ever been frustrated by the ancient technology you’re forced to use at the office? Tech geeks have it especially tough. At home, you’ve always got the latest gadgets. Your smartphone has all the apps you need, you’ve got the latest gadget […]

Compudyne Opens New Office in Houghton, Michigan

Posted on

November 1, 2014, Houghton, MI Compudyne is excited to announce the opening of their newest office in Houghton, Michigan. This new office is located in the historic Houghton Power House at 101 W Lakeshore Drive. Located on the Houghton waterfront next to the Portage Lake Lift Bridge, the Powerhouse is a visible example of historical […]

Techfest 2014

Posted on

October 22, 2014 – Duluth Entertainment Convention Center Compudyne is pleased to have hosted its 11th successful Techfest. Over 300 people attended Compudyne’s premier customer appreciation event that is held every other year.  Guests were able to attend a variety of breakout sessions on various business and technology topics. These small classes allowed attendees to […]

Welcome to Compudyne’s Blog

Posted on by kvasko

You made it!  Thanks for stopping by.  Compudyne’s new blog is a destination for some great information.  The blog is setup based on two categories: Wired and unWired. Wired Our Wired section hosts some great posts geared toward the technical crowd.  Here we have posted written by the talented technical minds at Compudyne sharing the […]

IT Security And What It Means To Your Everyday Business

Posted on by Dan Settlemyre

Coordinating antivirus, firewalls, backups, secure email encryption and portals, and basic passwords are all beneficial security habits for good business in the ever changing world of technology we live in. We now rely on many of these features in ensuring our protection of our client’s personal information against hackers. The more educated we can become […]