BYOD security tips

The bring your own device (BYOD) phenomenon continues to rise in the workplace. There are a number of benefits and risks that BYOD brings. For it to be successful, you must balance employee freedom and data security. Here’s how you can do that. Whether your employees are using smartphones, tablets, or laptops, you need a […]

Increase the success of your Microsoft Teams implementation

Microsoft Teams is fast becoming the go-to application for managing communication and information flow within organizations.  We wrote HERE about how Teams will be supplanting email for internal communication in the near future.  Many organizations don't plan their technology deployments and this is a big mistake.

Shift to managing data, not devices

It is time to shift your focus from managing devices to managing your data.  The threat landscape changes quickly but the target remains the same, your data!  Data is everywhere, and attempting to secure all the places it can be does not scale.  Starting with a "data first" mindset will help secure you in a way that locking down devices does not.

5 Signs of weak enterprise security

As the number of cybersecurity threats increases, many business owners have no recourse but make cybersecurity a priority. But how does one know if your security measures are actually keeping your enterprise IT assets safe? Here are five ways you can tell if your security isn’t sufficient. Open wireless networks With one main internet line […]

5 Ways systems can be breached

When it comes to business IT security, many small- to medium-sized businesses (SMBs) often struggle to protect their systems from various cyberattacks. While there are many things you can do to secure your IT infrastructure, being aware of common security threats will really help. Here are five common ways your systems can be breached. #1. […]

Three cybersecurity standards most businesses are missing

Cybersecurity has finally been elevated to a "standard" in the business world.  A business of ANY size needs to have a cybersecurity as part of their basic business planning checklist.  This is especially important for businesses that are in the 50-500 employee size range, as these groups often are utilizing processes, and tools that have not been reviewed since they were much smaller.

MFA is like green beans, you just gotta eat them!

MFA is no longer optional in today's threat landscape.  Over three YEARS ago we started talking to our Clients about utilizing MFA, as passwords are no longer keeping your information safe.  The number of IT providers that STILL do not ENFORCE this critical security configuration is very surprising.

Juice jacking: What is it?

We’ve come to rely on our smartphones to help complete daily tasks, and this has resulted in the need to recharge our phones multiple times a day. But when you’re far from your charger, public charging kiosks can seem like a good substitute. However, this can lead to an incident of “juice jacking.” If this […]

Check the list of free ransomware decryptors

We’ve gotten so caught up discussing ransomware prevention with our clients that we’ve neglected to mention that several strains have already been defeated. In fact, there’s a decent chance you can actually decrypt all your data for free. Make sure to check these free resources before responding to a cyberattacker’s demands. The state of ransomware […]