Feed Back for Feedback

Help Us in Helping Our Local Community
Cima Solutions Group has partnered with United Way of Denton County to re-launch a “Feed Back for Feedback” campaign. For each submission of feedback that we receive on our support request tickets or for each review on our Facebook and/or Google pages, Cima will donate $5.00 to help provide meals for those who are in need in our local community.

Security Q&A #TechTip

Our VP of Security, Alex Morrow, and Marketing Leader, Madison Hardy, talk about the importance of Security Solutions for individuals, more specifically business owners. Check out this Q&A for Technical Support and additional tips, such as password management.

Which Widget Works Wonders?

Why Cima should be your first and last stop on the road to an Infrastructure Solution.
Having been fortunate enough to work for some of the largest, and most predominate tech companies operating in the US, one thing I know for certain - NONE of them are perfect for every need in your infrastructure.

Cima Solutions Group Announces Launch of New Alexa Skill “My Tech Support”

The New Skills Is Live and Available For All Alexa Devices Now Lewisville, Texas—March 15, 2018Cima Solutions Group, the industry leading Managed Services and IT Solutions Provider, is pleased to announce the launch of their new Alexa Skill dubbed “My Tech Support.” Designed specifically with small and medium-sized businesses in mind, the skill is already live […]

Cima now providing CimaCare Managed Services on DIR Contract DIR-TSO-3692

Lewisville, Texas—March 8, 2018Cima is proud to announce our partnership with KST to bring CimaCare Managed IT Services to State and Local organizations throughout Texas. Our CimaCare Managed IT Services provide various skills and resources to our clients ranging from Helpdesk to specialized support for infrastructure environments such as AIX, VMWare, Network, and many others.“We are […]

How Next-Generation Data Protection is Redefining Backup

(This article was written by Lynn Lucas for Cohesity and originally appeared on choesity.com )

IT decision makers know certain truths about secondary storage and data protection. Among them: Storage workloads are spread across fragmented silos in the data center – backups, archives, files, objects, test/dev, analytics.

Five fundamentals of cloud security

(This article was written by Douglas Paris-White and first appeared on the IBM Cloud Blog)

Here are summaries of the five kinds of security a cloud platform should offer.

1: Identity and access management (IAM)

Any interaction with a cloud platform should start with establishing who or what is doing the interacting—an administrator, a user, or even a service.

How The Spectre/Meltdown Vulnerabilities Work

(This post was written by Checkpoint and first appeared on the Checkpoint Blog.)

The Spectre and Meltdown vulnerabilities recently discovered in Intel, AMD and ARM processors, are fairly complex.

In this post we will try to simplify what the problem is, how it could affect your business and what actions can be taken to protect against it.

Splunk 2018 Predictions

(This article was written by Brian Goldfarb and was first posted on Splunk.com)

Predicting the future would be easy if we could get answers by reading palms or gazing into crystal balls. At Splunk, when we want to know what the future holds we ask our experts to weigh in.