From Servers to Services: A great game of technology Jenga

Going from servers to services is a lot like playing a game of Jenga. You have to pull out all the various blocks (apps) without knocking over the tower (your business). You can go for the slow methodical method, or the "turn if off and see who complains" method.

How you keep your email account safe

Everyone uses email to send and receive sensitive information, making it an attractive target for cyberattacks. The importance of email security is vital to your company’s operations, so applying the following tips can dramatically reduce your exposure to hackers and malware. Use separate email accounts Most people use a single email account for all their […]

The threat of distributed spam distraction

You wouldn’t think that cybercriminals would carry out their nefarious schemes in plain sight — except that they do and you’ve probably already fallen victim to them. Learn all about a scheme called distributed spam distraction (DSD) and how malicious actors are using it to steal valuable information from their victims. What is DSD? DSD […]

It’s time to rethink your password strategy

In 2003, the National Institute of Standards and Technology (NIST) stated that strong passwords should consist of upper- and lowercase letters, numbers, and symbols. Recently, however, the institute reversed its stance. Find out why and learn what their new recommendations are for creating strong passwords. The problem The issue isn’t that the NIST advised people […]

Recalibrate your technology plan: Zero Trust Security

Get ready to hear a lot about the Zero Trust security model going forward. The #wfh movement has put this front and center in any technology planning discussion. This is not a fad or product to implement, it's a mindset shift that needs to occur in our technology planning.

A closer look at fileless malware

To avoid detection by anti-malware programs, cybercriminals are increasingly abusing legitimate software tools and programs installed on computers to initiate attacks. They use fileless malware to infiltrate trusted applications and issue executables that blend in with normal network traffic, IT processes, and system administration tasks while leaving fewer footprints. Ultimately, your business could be at […]

It is time to recalibrate your technology plan

No matter how good your technology plan was going into 2020, it is time to recalibrate it. The business environment has permanently changed and will not be going back to "how it was" with or without COVID-19. Thousands of workers shifted to #wfh for the first time, and guess what? They were MORE productive than they have ever been.

Activating Azure

Many companies will eventually need to decide whether they should keep customer and other highly confidential information on their on-premise servers or in the cloud. When the time comes to make this type of decision it can seem overwhelming. Fortunately, this is where Azure Active Directory (AD), an identity management tool comes in to play.

Monitoring your employees online: Is it a good idea?

The question of monitoring your employees’ computers is a tricky one. Some say such a practice is unethical. But it can also be a way to prevent data breaches. Find out the pros and cons of monitoring your employees’ online behavior by reading this blog. And should you decide your business needs employee monitoring, we […]

Diving into Data Backup

Data loss is something we all know happens but many don't like to talk about. We all assume it won't happen to us if we just look after our devices but the reality is that it could happen to anyone, at any time. Whether hacking takes place or we accidentally damage our devices there's a chance we're unable to recover the data we had stored in these devices.