C2IT Blog

News, Resources & Links

Welcome to our blog. This is a place where we share our thoughts as well as links to great articles we hope you’ll find useful.
If you’d like to see us write about something specific, please feel free to fill out our contact form. Select Blog Suggestion from the dropdown menu.

C2IT’s Third Annual Pumpkin Painting Contest

C2IT’s Third Annual Pumpkin Painting Contest

C2IT held its annual internal pumpkin painting contest today. Improvement was once again shown across the board. We welcomed some new team members to their first pumpkin painting. To see the previous contest, check out this blog post. This year's contest categories...

Now Hiring – Business Development Specialist

Now Hiring – Business Development Specialist

Role Description C2IT Consulting provides clients a wide variety of valuable technical products and services. Some clients engage with us to build a new website that will dazzle potential customers. Others ask us to build and maintain complex mobile apps and web-based...

Who Owns My Software?

Who Owns My Software?

I’ll give you two chances to guess the program I’m using to write this article. If I’m right, you guessed Microsoft Word or Google Docs, and you’d be spot on. We’re all familiar with these tools of the trade, and while there are certainly other tools like Notepad and...

Who Owns My Tech?

Who Owns My Tech?

I’ve lived in the country for over 20 years now. It’s quite common for my commute on county roads to be delayed by a few minutes because I get behind a tractor hauling equipment that takes up the entire road. Rather than getting frustrated about being late to check my...

Now Hiring – Help Desk Technician

Now Hiring – Help Desk Technician

C2IT Consulting, Inc. (“C2IT”) is a central-Indiana based technology firm with over 20 years experience in helping organizations achieve more with tech. C2IT designs, builds, and supports data-driven mobile apps, websites, and technology solutions. We increase...

What Is Phishing?

What Is Phishing?

What Is Phishing? "Phishing is a cybercrime in which a target or targets are contacted by email, telephone, or text message by someone posing as a legitimate institution to lure individuals into providing sensitive data such as personally identifiable information,...

What is Co-Managed IT?

What is Co-Managed IT?

If your small business is the size of mine in that sweet spot of 5-20 employees, you’re likely a wearer-of-many-hats business leader. Today’s focus is on invoicing, tomorrow’s will be on administrative tasks, and you have to help the team out with an install next...