Jackson Thornton Technologies News + Updates

Jackson Thornton Technologies has been serving the Southeast since 1999, providing IT consulting and managed services, technical helpdesk support, cybersecurity assessments, and business continuity and disaster recovery to small and medium-sized businesses.

How to Survive a Total Ransomware Lockout

How to Survive a Total Ransomware Lockout

Imagine the terror of arriving at the office only to find every screen glowing with the same cryptic message: "Your files are encrypted." If you’re like most business owners, this kind of situation could set you back weeks, and that’s not to mention the financial setback and permanent data loss that could occur as a result of such a ransomware attack. What your business needs is resilience, the kind that only immutable backups can offer.

0 Comments
Continue reading

Tip of the Week: Stop Deleting Stuff Like a Caveman and Save Some Time

Tip of the Week: Stop Deleting Stuff Like a Caveman and Save Some Time

What do you do when you realize you’ve written three sentences of absolute nonsense?

What do most of us do? We lean on the Backspace key. We sit there, staring at the screen, watching the cursor slowly eat away at the alphabet like Pac-Man. Waka-waka-waka-waka. The funny thing is that all that holding down the backspace key for five seconds is inefficient, and quite frankly, you’re better than that. It’s time to stop making a fool out of yourself and start tactically deleting your text. Let’s teach you how:

0 Comments
Continue reading

Cybersecurity Threats Every Business Owner Needs to Know

7cc06659-6690-4a80-ab0b-60e8cf1ba614

Running a business today means operating in a digital world full of opportunity — and risk. Cybercriminals are no longer targeting only large corporations. Businesses of every size, in every industry, are now firmly in the crosshairs of increasingly sophisticated attacks. Yet many business owners still believe they are too small or too obscure to be worth targeting. That belief is one of the most dangerous myths in modern business.

0 Comments
Continue reading

Sharing Your Business’ Wi-Fi Password is a Bad, Bad Idea

Sharing Your Business’ Wi-Fi Password is a Bad, Bad Idea

We’ve all been there. A client walks into the office, a contractor needs to check a manual, or a visitor is waiting in the lobby, and they ask that ubiquitous question: "What’s the Wi-Fi password?"

Sharing it feels like common courtesy, of course. If you are handing them the password to your primary office network, you are doing much more than sharing an internet connection. You are essentially handing a stranger the keys to your entire digital office.

0 Comments
Continue reading

The FTC Has New Cybersecurity Rules… Is Your Business Compliant?

The FTC Has New Cybersecurity Rules… Is Your Business Compliant?

The Federal Trade Commission has spent years providing businesses with guidance and advice concerning their security. Now, this guidance has converted into enforceable mandates.

In short, your business needs to have systems and protections in place—not plans—in order to abide by last month’s executive order that focuses on the prevention of cybercrime and fraud. Let’s touch on what needs to be accomplished in order for you to do so. 

0 Comments
Continue reading

From “Surviving” IT to Opening New Revenue Streams

From “Surviving” IT to Opening New Revenue Streams

Do you look at your technology as a cost center to be managed, or as a springboard for new revenue? If you’ve been following us for a while, you know we like to think of it as the latter. Small businesses spend much of their IT budget just to keep the lights on, stuck in an endless cycle of “surviving” rather than “thriving.” But with a virtual CIO, or vCIO, your business can reframe the conversation surrounding technology and look at it as an endless realm of opportunity rather than an endless loop of costs. 

0 Comments
Continue reading

The Manager’s Guide to Setting Schedules That Discourage Burnout

The Manager’s Guide to Setting Schedules That Discourage Burnout

I’d be willing to wager that one of any small or even medium-sized business’ biggest (or at least most frustrating) challenges is scheduling. Of course, you want your workforce to be running at full capacity as much as possible, but Jack requested a half day to see his daughter’s piano recital on Thursday, and Stef’s life would be a lot easier if she had Thursday mornings free.

Fortunately, today’s tech makes dealing with all of this much easier, especially when paired with the right strategy for your business.

0 Comments
Continue reading

The Longer the Better! Why to Ditch Your Short, Complex Passwords

The Longer the Better! Why to Ditch Your Short, Complex Passwords

You’ve probably heard a lot of password advice over the past decade, but how much of it is actually good advice that you should listen to? These days, with advanced automated threats able to crack incredibly complex passwords with ease, you can’t be too careful. You might even need to take a different approach entirely… which brings us to the OG password advice: just make it longer.

0 Comments
Continue reading

3 Ways to Turn Your Tech Stack Into a Growth Engine

3 Ways to Turn Your Tech Stack Into a Growth Engine

For years, the firewall was seen purely as a defensive tool—an all-in-one solution with antivirus, web filtering, and intrusion protection. Nowadays, they can potentially serve a much greater purpose beyond simple network security. When leveraged right, you can use the immense amount of data firewalls track to identify bottlenecks, optimize workflows, and make smarter infrastructure investments.

0 Comments
Continue reading

How to Run Meetings that Actually Accomplish Your Goals

How to Run Meetings that Actually Accomplish Your Goals

If your meetings feel like a lot is being said, but your goals are never really accomplished, you are in very good company. Approximately $37 billion USD is lost each and every year to unproductive meetings alone. When you consider how much of that $37 billion is potentially due to your business’ meetings, one could hardly blame you for being sick about it.

Let’s take a look at a few ways that you can make the most of the time you spend in meetings.

0 Comments
Continue reading

File-Based Backup is Not the Same as Data Recovery. Here’s Why

File-Based Backup is Not the Same as Data Recovery. Here’s Why

Are you under the impression that having a backup is the same thing as a successful recovery? These days, businesses think they are mutually exclusive, but the fact remains that having a backup synced to the cloud is not enough to keep your business running when the odds are against you. In fact, your files might be fine, but your business could be dead in the water due to ongoing downtime.

0 Comments
Continue reading

7 Network Warning Signs You Can't Ignore

7 Network Warning Signs You Can't Ignore

Forget the high-octane hacker montages you see in movies. Real cybercrime isn’t a smash-and-grab; it’s a slow-burn infiltration.

Most bad actors aren’t looking to make a scene—they’re looking to get comfortable. On average, an intruder spends six months lurking inside a network before they are ever detected. During this time, they are quietly harvesting data, mapping your systems, and waiting for the most profitable moment to strike.

0 Comments
Continue reading

AI, Satellite, and Wi-Fi 8 are Reshaping Mobile Strategy

AI, Satellite, and Wi-Fi 8 are Reshaping Mobile Strategy

As we move through 2026, smartphone production has shifted from being a place where app development has started to feature strong AI tools. For IT leaders and service providers, these aren't just flashy consumer upgrades, they represent a fundamental change in how businesses interact with data, security, and connectivity. Here is a look at the most modern innovations currently hitting the market. Let’s take a look at them today.

0 Comments
Continue reading

Data Recovery Strategies That Minimize Business Disruption

9034a2b4-c77e-4cf5-87e0-2d4dabf103ae

Every business relies on data to function effectively in today's digital landscape. When that data becomes inaccessible, whether through hardware failure, human error, or unexpected circumstances, the impact can ripple through every aspect of operations. The key to weathering these challenges lies not in avoiding them entirely, but in preparing thoughtful strategies that allow your business to recover quickly and continue serving customers without missing a beat.

Understanding how to approach data recovery with minimal disruption requires thinking beyond simply backing up files. It involves creating a comprehensive framework that considers your business operations, prioritizes critical systems, and establishes clear pathways for restoration when needed.

0 Comments
Continue reading

Role of IT Data Services in Compliance and Risk Management

cf493796-ce1d-4101-989e-3bf96c2a4d15

In today's digital landscape, businesses handle more data than ever before. From customer information to financial records, the way organizations manage and protect this data has become a critical concern. As regulatory requirements continue to evolve and cyber threats grow more sophisticated, companies are discovering that effective IT data services play an essential role in maintaining compliance and managing risk. Understanding this relationship can help businesses build stronger foundations for long-term success.

0 Comments
Continue reading

How to Choose Software That Grows With Your Small Business

d94de1a0-d641-47c7-abac-3f2a8dde16d2

Selecting the right software for your small business isn't just about meeting today's needs—it's about preparing for tomorrow's challenges. As your company expands, your technology should adapt seamlessly alongside your growth. Making the wrong choice can mean costly migrations, productivity losses, and frustrated teams down the road. This guide will help you identify software solutions that can scale with your business for years to come.

0 Comments
Continue reading

HIPAA Security Rule Changes Are Coming: What Healthcare Organizations Should Know Now

The U.S. Department of Health and Human Services (HHS) has formally signaled that significant changes to the HIPAA Security Rule are on the way with a final rule expected in May 2026. This isn’t speculation or industry rumor—this timeline and intent are documented in the federal government’s Spring 2026 Unified Agenda, published on RegInfo.gov, the official regulatory tracking site for federal rulemaking.

0 Comments
Continue reading

The Best of New Technology for Business Utility

The Best of New Technology for Business Utility

The current year has already delivered massive strides in innovation, particularly for tools that offer real utility. Today, we will go into five developments currently reshaping the landscape and how they might influence the way we work in the future.

0 Comments
Continue reading

Building Your Technological Power Stack in 2026

Building Your Technological Power Stack in 2026

Does your business purchase tools in isolation, or do you make a concerted effort to purchase and implement solutions based on synergy? It might sound like a load of business mumbo-jumbo, but tools that work well together make your operations more functional and streamlined. To illustrate this, we have three seemingly disparate solutions: Voice over Internet Protocol (VoIP), Endpoint Detection and Response (EDR), and Multi-Factor Authentication (MFA). While they might seem very different at first glance, the right combination of solutions can make a significant difference for your business.

Tags:
0 Comments
Continue reading

Yes, We Manage IT Proactively, and Yes, Things Will Still Break

Yes, We Manage IT Proactively, and Yes, Things Will Still Break

Let’s say you recently started working with us. We’ve signed a contract, payments have been exchanged, and your IT is now under our care. One day, after your payment has successfully transferred, one of your workstations suddenly freezes up. One could hardly blame you for wondering why you were paying money to us if these kinds of issues still happen.

The truth of the matter is that our proactive IT services aren’t about eliminating issues and errors; it’s about avoiding everything possible and having strategies in place to address what can’t be.

0 Comments
Continue reading

Mobile? Grab this Article

QR Code
Request a Consultation

Jackson Thornton Technologies strives to provide the best comprehensive IT, Computer, and Networking services to small businesses. We can handle all of your organization's technology challenges.

Contact Us
Contact Us

Learn more about what Jackson Thornton Technologies can do for your business.

200 Commerce Street ,
Montgomery, Alabama 36104

Call us: (877) 226-9091

Montgomery Managed Services
Auburn Managed Services
Dothan Managed Services

News & Updates
Jackson Thornton Technologies (JTT) is pleased to announce its expansion to a third office located in Auburn, Alabama. This new office will allow JTT to provide additional services in the East Alabama market including cybersecurity reviews, training ...