Photo of Jason Rodriguez

Jason Rodriguez helps businesses maximize productivity, cost-efficiency and security in every aspect of their digital and technology operations. He designs strategies covering a broad range of areas, including cloud and on-premise data management, cybersecurity, data privacy, networking infrastructure, telecommunications, software, hardware and much more. Clients also benefit from Jason’s alliances with a variety of skilled technology vendors capable of taking a new strategy from the drawing board to a seamless company-wide rollout.

Jason brings nearly 20 years of hands-on digital and technology experience at the Gray Reed law firm to his role as a strategic consultant. He has spent the last several years as the firm’s IT Director responsible for all aspects of its computer system, networking, telecommunications, help desk and various other issues across three offices and numerous practice areas with unique needs and challenges.

Jason graduated from Southern Methodist University with a Bachelor of Arts in management information systems.

Do you want to prevent network service disruptions? Do your employees like to collaborate from any location? Do you want to achieve economies of scale and save money?

If you answered yes, your network infrastructure should be up in the cloud.

Most companies are now opting out of the expense, risk and hassle of housing their own physical network architecture. Instead, they use cloud computing to reduce costs and increase performance, productivity, reliability and security.
Continue Reading Not in the Cloud? Here’s Why Your Network Should Be

123456…Qwerty…Password…

These routinely make the list of most commonly used passwords, and unsurprisingly, they are among the passwords most often uncovered in data breaches. For some organizations, these flimsy sequences of numbers, letters or easily guessable phrases are the only wall of defense between hackers and important company data. But they shouldn’t be.

That’s why more and more companies are implementing multi-factor authentication to add extra layers of security to sensitive and confidential information. Multi-factor authentication reduces risk by requiring users to enter two or more types of information during the login process, making it harder for criminals to get into company systems and less enticing for them to try.
Continue Reading It’s Time for Multi-Factor Authentication

Technology departments did serious heavy lifting in 2020 when the COVID pandemic shutdown sent millions of businesses scrambling to set people up with network access, security permissions and proper equipment for home offices.

They struggled to meet computer and peripheral equipment shortages, lack of lead time to procure equipment, and intense demands to educate and