Trendz3: The Free IT & Tech Newsletter Designed Just for Small Businesses of Northwest Arkansas
Note: This is a web version of our newsletter. You can subscribe here for free.
March 2026
Hi Friend,
March may be known for March Madness — but this month's newsletter is designed to minimize the madness you associate with your business's tech and IT. We'll explore how to save on your IT bill, the IT impact of the NCAA Tournament, and, finally, how to safely and smartly go about offloading your old devices.
Sincerely,
Rob Brothers
Founding Partner
TekTrendz
Trend1 — Technology prices may be on the rise, but here are 3 ways to save on your IT bill...
I don't have to tell you: the price of technology is becoming dearer. RAM shortages (thanks AI) are driving up computer costs — and with no end in sight. Leading to a serious question: How can businesses bring down their tech/IT bills?
We occasionally see IT bills higher than they need to be, with some common culprits at play. Here are three types of "sprawl" that contribute to bloated IT bills:
- Account sprawl: Every user account is another account that has to be managed and protected — and that costs money. Most businesses have a few accounts that do little more than, well, exist. (e.g., that temporary events@company.com account). In such cases, your business may be paying to manage/protect an account you don't need. Why not delete it? Alternatively, keep the account but remove it from your managed plan with us, with the understanding the account would be exposed to greater security risk.
- License sprawl: Not all accounts are created equal. Some users may need a premium Microsoft 365 license, while others may only need basic email and calendar access. Over-licensing is overkill that leads to overcharges.
- Tool sprawl: There's a tendency to adopt new software even when existing solutions could do the job. For example, businesses may have more than one productivity suite or video call platform when just one would do. At an enterprise price-level, especially, tool sprawl can get expensive fast.
In each case, thoughtful auditing can save the day (and dollar). Start by getting clear about the accounts, capabilities (i.e., licenses), and tools your organization needs to achieve its mission. Then, compare what is to what is necessary, and ruthlessly eliminate those edge cases that add costs without adding value.
Trend2 — NCAA Tourney: How to keep all the madness from slowing down your network
March Madness is once again bouncing our way. It's hard to imagine a domestic sporting event with more fanfare that airs partly during work hours.
Round One of the 2026 NCAA Tourney will take place on Thursday, March 19 and Friday, March 20, with the earliest games usually tipping off before noon CST. Which means your team will be in-office, but their attention might be elsewhere. Especially if the hometown Razorbacks are playing an early game. Am I right?
A few roundballin' IT implications to consider:
- Video streaming is a well-known "bandwidth hog." Lots of employees streaming games + lots of devices ÷ one WiFi network = slow connections and even, possibly, hobbled productivity.
- Tip: Have one designated viewing area — on one screen — for employees to watch games during work hours.
- Round One games will be aired on CBS, TBS, TNT, and TruTV. The NCAA’s March Madness Live website and app usually offer a limited free-preview window before requiring a TV provider login.
- Tip: Use a valid TV provider (cable, satellite, streaming) for games in your designated viewing area, and, if bandwidth is a concern, limit or discourage streaming March Madness Live on individual devices.
- Tip: When forced to pay to watch a game, sports fans sometimes turn to free but sketchy (and even illegal) streaming sites. Such sites are often riddled with pop-ups, fake download buttons, and malware. Block/discourage access to these pirated streaming sites.
With the right amount of creativity, energy, and — yes — a few IT guardrails, March Madness can be a memorable and morale-building event for your team.
Best of luck to your bracket this year!
Trend3 — Replacing those old work devices? Here's how to offload them safely...
Alas, computers, phones, and other tech don't last forever. In fact, many businesses replace computers every 4-5 years — to keep systems secure, reliable, and compatible with modern software. And while it's easy to focus on all that shiny new equipment, we should be careful not to overlook the gear we're replacing.
Here are a few tips when offloading old technology:
- Back up data, sign out of accounts, and deauthorize licenses (if applicable) before powering off the device the final time.
- Oh so important: wipe the memory. On your personal devices, too. It might surprise you how many people and businesses forget to do this — giving the device's next owner unrestricted access to emails, client info, etc.
- Perform a factory reset after wiping the memory.
- Remove the item from your device management system and asset inventory list; remove all branding and asset tags.
What next, though? Depending on the shape of the device you might...
- Donate the device to charity. Shout out to a Fayetteville-based nonprofit, Free Geek of Arkansas, that refurbishes donated computers before distributing them to members of our community who need them.
- Let employees buy the technology at steeply discounted prices.
- If devices are no longer usable, recycle them through certified e-waste recyclers such as eSCO Processing & Recycling in Rogers, MARRS in Fayetteville, or community programs like Free Geek Arkansas.
- If the device contained highly sensitive data, it's best to destroy it.
Along the way, keep good records for tax purposes. And, if it all sounds like too much to manage, just lean on us at TekTrendz.
Website: Has your email address been hacked?
To you and me, an email address is, well, an email address. To hackers, an email address is a master key for testing stolen passwords, resetting accounts, and mapping a person’s digital life. Have I Been Pwned? is a website that lets you enter work and personal email addresses to see if they've been hacked.
(I was today years old when I learned "pwned" is gaming lingo for owned. Hm.)
If your email address is breached, change your password immediately, especially if you — tisk, tisk — use the same password on other sites. Then enable two-factor authentication and use strong, unique passwords moving forward.
Check Your Email @ Have I Been Pwned?
Articles We're Reading...
Here's four articles we've read recently with important implications for small business — and their technology, productivity, and/or cybersecurity.
Whatcha' Waitin' For? Subscribe to Trendz3 Today
Trendz³ is a free, monthly email newsletter from TekTrendz, created exclusively for small businesses of Northwest Arkansas. Once a month, the Trendz³ newsletter will provide you with a quick rundown of the three most pressing trends in technology, cybersecurity, and IT — that you really need to know. We'll also share helpful resources and news along the way.
It's the IT newsletter designed for you. Click below to sign up today. It's free.