In the time of Covid-19, many businesses have been forced to ask their employees to work from home. As a result, the work from home (WFH) model may become a permanent alternative for many workers who can effectively complete their required tasks…
Mobile Device Management with Office 365
Mobile Device Management is important when it comes to your overall technology security strategy. If you have a fleet of phones in use by your employees out in the field, then you basically have an added level of exposure for each…
Ransomware and Small Business
Held for Ransom Are you aware of the danger of ransomware? As defined on our blog, ransomware is malware (MALicious softWARE) that locks all of the data on your network with encryption. The perpetrators then demand a ransom to unlock your data….
Passwords aren’t enough-setup MFA and SSO now!!
You are unique in this world, with an identity that no other person has. But sometimes you are called upon to verify your identity in order to access certain services. An identification card may be required for you to cash a…
What is your backup policy? Do you even have one?
If you are practicing proper computer security measures, then you are running routine backups. Do you have a policy for your backups? Is it written down? If so, then add it to your official policy manual so anyone can easily understand and…
User Security Training – Book it Today
Arming Your Employees With Basic User Security Training Is Job One From desktop to mobile to cloud–technology changes quickly and so do the threats and security measures designed to mitigate them. The best way to arm your staff is thru comprehensive…
IT Terms: User Risks
Get IT We know that all the IT (Information Technology) lingo can be confusing. Occasionally we like to post the definitions to terms that we use often. This post is specific to risks that employees encounter often that can completely derail…
How to Maximize Your MS Office 365 Investment
Microsoft Office 365 offers an expansive selection of apps to add functionality that will increase your productivity and efficiency. Of course, you want to use the best suite of software you can after all your business runs on it! One of…
The Importance of Proactive IT Maintenance
“Be prepared” is a good motto to live by, especially when it comes to managing IT environments. Every element in your IT architecture is subject to failure. It would be foolhardy to think that everything will continue as is without problems….
10 IT Security Terms Everybody Should Know
If you want to become acquainted with a particular subject, you must first learn the basic terminology. IT security has its own special terms that are important to the understanding of cyber threats and how to deal with them. In this…