Blog

Argentum IT LLC Blog

Argentum IT LLC has been serving the Louisville area since 2010, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Dean Lause is a technologist to the highest degree. When he was in middle school, he learned and developed small programs using BASIC programming code on his Commodore 64. He was one of the first to post to bulletin boards on the newly emerging “Internet” and built a mini-network in his home. He competed in his senior year of high school, placing 1st regionally, 2nd in State and 17th Nationally in computer specialist competitions. Today, he enjoys technology as much as he did then. In fact, he has a “Smart Home,” with connected devices controlled by A.I., mobile apps, and voice commands. When he is ready to go to sleep, all he needs to say is “Good night,” and Voila! all of the lights in the entire house turn off, the doors lock, the TV/DVR turn off, the house alarm is set and the alarm clock for the morning is ready to go! After a 4-year stint in the Army as a computer specialist, Dean spent the next 20 years in Fortune 500 Enterprise IT environments. He quickly building his IT skill set, becoming an expert in VMWare and Citrix and various other technologies. Dean served as the Director of Network Infrastructure & Security of North American Operations in his last role before joining Argentum IT and completing his MBA with a specialty in Accounting in 2011. Dean understands not only the technical side of how devices work together and integrate within an environment, but also understands and designs the environment from a business point of view for productivity. He strives to provide cost-savings, efficiency and practicality to solve the real issues that are present for each individual client he works with. Leveraging his 20+ years’ of enterprise-level experience, for the past ten years, Dean has consulted with numerous Fortune 500 companies across the country on issues relating to network infrastructure and security, Citrix XenDesktop, VMWare implementation and capacity planning, Office 365/Exchange Email Migrations as well as Mobile Device Management and Disaster Recovery Planning. He has also been engaged to develop and improve technology processes as well as accomplish technology projects on time and budget. Today, Dean uses all of these skills and more to aid small to medium-sized businesses to utilize technology to run their companies more profitably and efficiently. As Chief Technical Officer of Argentum IT, LLC for the past ten years, Dean has supervised a proactive service desk who educates clients on technology best practices, designed multiple infrastructure environments for clients (both big and small), to fit their needs and built a sizeable hosted infrastructure environment – including VMWare and Citrix “products”. Dean’s breadth of experience affords him a unique view of IT and business challenges, which allows him to help customize and develop unique solutions to solving IT and Cyber Security challenges.

Virtualization Translates to More Savings, Efficiency, and Security

Virtualization Translates to More Savings, Efficiency, and Security

How often does your business find that it’s struggling with new technology implementation, either on the software side of the house or on the hardware side? Have you considered that the cloud provides powerful solutions to your business’ woes in the form of virtualization? With the right resources at your disposal, you can use virtualization to create incredible opportunities to improve operations for your business and make it more secure and flexible in the process.

0 Comments
Continue reading

All SMBs Need a Reliable VPN

All SMBs Need a Reliable VPN

Remote employees are in a conundrum when it comes to data security. While you might be able to protect data stored locally on your company’s in-house network, securing data in use by employees while out of the office is another matter entirely. How can you guarantee that your business is protecting its data and other sensitive resources from prying eyes?

0 Comments
Continue reading

Three Ways You Benefit from Encrypting Your Email

Three Ways You Benefit from Encrypting Your Email

Encryption stands as a formidable shield for businesses, fortifying their security architecture. While often discussed in VPN contexts, its significance in securing email solutions cannot be overstated. Why is email encryption indispensable for businesses of all sizes? Let's explore.

0 Comments
Continue reading

Cloud Waste and What You Can Do About It

Cloud Waste and What You Can Do About It

The cloud has become a go-to resource when businesses are trying to find and consistently depend on digital tools that otherwise would be out of their price range. One cloud issue that isn’t often mentioned in the course of choosing computing resources is cloud waste. Cloud waste refers to the inefficient or unnecessary consumption of cloud computing resources, leading to higher costs without delivering corresponding value. This month, we will look at some of the impacts of cloud waste and how to avoid it as much as possible. 

0 Comments
Continue reading

How to Effectively Measure and Use Data Backup and Disaster Recovery Metrics

How to Effectively Measure and Use Data Backup and Disaster Recovery Metrics

How often do you think about your data backup system? If you’re like most businesses, it’s something that you will likely set up, then quickly forget about, provided you haven’t had to use it. Still, having one is essential to any modern business, and building it with clear outcomes and metrics in mind will help you make your data backup system more effective for the moments when you’re glad you have it.

0 Comments
Continue reading

Apple Users Hit with Rare Cyberattack: What Can We Learn?

Apple Users Hit with Rare Cyberattack: What Can We Learn?

On Wednesday, April 10, 2024, Apple deemed it necessary to send a rare alert to certain users via email, spread out across 92 nations. As Apple’s website states, these threat notifications “are designed to inform and assist users who may have been individually targeted by mercenary spyware attacks.” Let’s review these attacks so we all understand this threat better.

0 Comments
Continue reading

Downloading and Installing APK Files Could Put Your Business at Risk

Downloading and Installing APK Files Could Put Your Business at Risk

Your Android smartphone is a computer in and of itself; as such, it runs with an operating system installed. You install programs on your smartphone the same way you install them on your computer, although the process is more complicated. Today, we want to explain the types of files that the Android operating system uses to install apps on your phone, as well as why it might be a good idea to let the Google Play Store do the hard work for you, in terms of locating and installing apps.

0 Comments
Continue reading

Tip of the Week: Three Steps to Policing Your IT Policies

Tip of the Week: Three Steps to Policing Your IT Policies

Small businesses are presented with the challenging prospect of monitoring and policing various IT-related policies that you might have for your network infrastructure and workplace technology use. The difficulty of this notion does little to lessen its importance, however. You need to take action to protect your assets, data, and reputation from the countless threats out there, and ensuring that your employees are properly using technology is paramount to this endeavor.

0 Comments
Continue reading

Automating Management Tasks Can Keep You Ahead of IT Problems

Automating Management Tasks Can Keep You Ahead of IT Problems

In business technology, automation reigns supreme, especially for tedious tasks that offer little to the individual performing them. Remote management epitomizes such tasks, and strategic automation can greatly enhance organizational productivity. Let’s examine how automation can help you stay proactive. 

0 Comments
Continue reading

How an MSP Can Aid in IT Project Management

How an MSP Can Aid in IT Project Management

It’s always an exciting time when you commit to a new IT project that promises to change your organization for the better. Of course, the exciting stuff is what comes after the implementation process—a process that can range from easy-as-pie to incredibly complex and stressful, depending on the expertise your organization employs.

0 Comments
Continue reading

Tip of the Week: 4 Ways to Save Money on Your IT Solutions

Tip of the Week: 4 Ways to Save Money on Your IT Solutions

Are you paying attention to where you spend your IT dollars and whether or not you are making the most of your budget? It’s important to assess your needs before making any major technological purchase, including the goals, challenges, and pain points you are trying to solve. With the right approach, you can increase the value you get out of your IT—particularly with the following strategies.

0 Comments
Continue reading

4 Essential Cybersecurity Mistakes You Can't Afford to Make

4 Essential Cybersecurity Mistakes You Can't Afford to Make

When considering your company’s cybersecurity, it is important not to lose sight of the forest for the trees… or, in other words, not to forget the basics around which the rest of your protections are built.

0 Comments
Continue reading

Network Drives: What All Those Letters Mean for Data Management

Network Drives: What All Those Letters Mean for Data Management

You often hear about “drives” when working with technology, but there are many different types that a computer might use in your business's day-to-day operations. Today, we want to explain what some of these drives do and why you should know where they are and what they stand for.

0 Comments
Continue reading

The Problem With Devaluing Employees

The Problem With Devaluing Employees

Running a business can be tough and result in a lot of frustration from staff, management, and customers. Sometimes that frustration can boil over and cause consternation among the core elements that need to function for a business to be successful. This week, let’s look at an issue that can really hurt your business.

0 Comments
Continue reading

Which Leadership Style Do You Tend to Use in Your Business?

Which Leadership Style Do You Tend to Use in Your Business?

Leadership can take many forms. As a leader in your own company, it can pay to understand what form of leadership you tend to express when working with your team. Let’s review some leadership styles to see if anything resonates.

0 Comments
Continue reading

What to Prioritize for a Secure Password Strategy

What to Prioritize for a Secure Password Strategy

Securing your accounts against unauthorized access begins with the implementation of a strong password. It's crucial to recognize that not all passwords offer the same level of protection. Here are five essential guidelines to ensure the security of your accounts.

0 Comments
Continue reading

3 Huge Benefits of Adding Help Desk Support to Your Staff

3 Huge Benefits of Adding Help Desk Support to Your Staff

Do you have employees who struggle with their technology? Chances are that there will always be individuals who are not as proficient with it as you might expect, and without a dedicated IT resource to ask for assistance, they might get frustrated and disengage with their work. You need to provide the right support to your employees, and you’re in luck; we have just the right solution to your problems: a help desk!

0 Comments
Continue reading

Top Tax Scams Every Business Owner Needs To Watch Out For In 2024

March_Blog_4

Tax season is around the corner, which means so are tax scams. Without fail, every year, individuals and business owners alike fall victim to tax scams, resulting in the loss of substantial amounts of money and sensitive personal data. According to the Better Business Bureau, taxpayers lost $5.7 billion due to tax scams and fraud in 2022 alone. In today’s article, you’ll discover the top scams you need to be on the lookout for to reduce your chances of becoming these scammers’ next victim.

0 Comments
Continue reading

What Makes Outsourcing IT So Valuable for SMBs?

What Makes Outsourcing IT So Valuable for SMBs?

Technology has ingrained itself into just about every facet of modern life, particularly in the business world where every competitive edge makes a difference. Many small and medium-sized businesses simply don’t have the staff on-hand to manage and maintain their technology solutions, instead opting to outsource this important responsibility to managed service providers (MSPs).

0 Comments
Continue reading

Three of the Biggest Security Solutions You Might Not Be Using

Three of the Biggest Security Solutions You Might Not Be Using

Your typical IT professional might suggest some common methods of network security like implementing better preventative measures, like firewalls and antivirus. However, there is more that goes into network security—far more. If you’re not careful, you could accidentally miss some of these three security solutions and expose your business to potential threats. But we’re not about to let that happen!

0 Comments
Continue reading

Customer Login

News & Updates

Back in the 1980’s, despite owning one of the first home computers, the Tandy TRS-80, society found technology more of a hindrance than a help. But Dean loved technology and from an early age understood it could help.

Contact us

Learn more about what Argentum IT can do for your business.

Argentum IT
1141 S. 2nd Street
Louisville, Kentucky 40203

Copyright Argentum IT. All Rights Reserved.