Getting Ready for Windows 11: What to Do When Windows 10 Support Expires
Microsoft Windows 10 has been a foundation of personal computing since its release in 2015. However, as with all software,...
Microsoft Windows 10 has been a foundation of personal computing since its release in 2015. However, as with all software,...
In our recent all hands meeting at BEI, we have discussed and dived into a pressing issue that needed our...
Businesses of all sizes rely heavily on their IT infrastructure to operate efficiently and securely. Regular IT audits is important...
Organizations are continuing to experience an array of cyber threats even to this day. From data breaches to ransomware attacks,...
Staying up-to-date with technology is more than just a luxury—it’s a necessity. Many of us unknowingly cling to outdated devices...
Imagine a world where you could wave a magic wand and watch your productivity soar through the roof! Well, that...
Planning to go on vacation but worry about your cybersecurity? Ensure a worry-free travel experience. In the excitement of planning...
Yup, we are still talking about Artificial Intelligence (AI) because we need to understand more about it. In the first...
Understanding Artificial Intelligence Artificial Intelligence (AI) is the capability of a machine to imitate intelligent human behavior. It is continuing...
As I was taking the cybersecurity micro training by Breach Secure Now, I have learned to prioritize cybersecurity as an...
When it comes to securing your online accounts, Multi-Factor Authentication (MFA) is needed. It can be multiple authentication options such...
Do you ever get annoyed whenever you sign in to your accounts, you get hit with a multi-factor authentication method?...
QR codes have become global. From restaurant menus to product packaging. These pixelated squares are seemingly everywhere, offering quick access...
The concept of obsolescence has become an aspect of innovation in today’s day and age. From smartphones to computers, and...
Cybersecurity threats are ever evolving, relying solely on a password to protect sensitive information is no longer sufficient. This is...
In the web of business operations, one variable remains constant: HUMANS. While technological advancements continue to revolutionize industries, the potential...
In cybersecurity, risks often stir up images of hackers breaching firewalls or malware infiltrating networks. However, one of the most...
In recent years, ransomware attacks have emerged as one of the most prevalent and disruptive cyber threats facing individuals, businesses,...
Nowadays, ransomware has emerged as a formidable threat, wreaking havoc on businesses and individuals alike. Understanding this malicious software is...
In this age where cybersecurity threats loom large and data breaches are a persistent concern, organizations and individuals alike are...
Happy Valentines Day! This day is a time when people express their love and affection for one another. However, it...
Introduction: The Importance of Disaster Recovery Planning in 2024 We’re going to dive into the importance of disaster recovery planning...
In the spirit of the festive season, finding the perfect gift can sometimes be a challenging task. However, when it...
It’s not just ghosts and ghouls that we need to worry about this Halloween. Even Halloween festivities are not exempt...
In light of Cybersecurity Awareness Month, it is crucial to prioritize the online safety of children. With the increasing prevalence...
As more organizations mature their cybersecurity posture, they are choosing BEI!
Incident Response Planning is a major part of any mature cybersecurity and/or compliance program.
BEI’s June newsletter focuses on Cybersecurity, Incident Response and considerations on a bring your own device to work policy.
BEI runs monthly lunchtime webinars that typically last 20-30 minutes. They cover topics of general interest and are not overly...
As more organizations mature their cybersecurity posture, they are choosing BEI!
BEI’s May newsletter focuses on Cyber Risk Assessment and Tips for better Compliance Training. Join the webinar for Managed Risk...
Cybersecurity best practices are all about proactivity and mastering the fundamentals!
Almost half of all cyberattacks target small to medium-sized businesses. Instead of laboring under the delusion that this will not...
BEI’s April newsletter focuses on Cybersecurity tips and best practices for business owners.
Many SMBs assume that hackers won’t attack them because they don’t have as much client data and money as multi-national...
Microsoft Teams channels are the foundation of great collaboration and organization for your company. Check out the basics of creating...
BEI’s March Newsletter focuses on Windows Virtual Desktop, Private Browsing and Building out a Microsoft Teams Channel
Windows Virtual Desktop (WVD) is a game changer. As a replacement for Citrix or Remote Desktop, WVD saves money and...
Check out our infographic on the Five Benefits of Windows Virtual Desktop. We think you’ll love it!
Microsoft Teams quickly became the gold standard for collaboration in 2020. We covered the basics of using Microsoft Teams previously...
There are many cloud file storage solutions out there. How do you choose the right one? Check out our breakdown!...
BEI’s February newsletter focuses on Getting Started with Sharepoint and Tips for using Datto workplace for your file storage and...
SharePoint Online does not have to be difficult! Checkout our resources to get started and maintain easy SharePoint Online sites.
Many of us spend lots of our day in Outlook, so any tips to make us more efficient are treasured....
BEI’s January newsletter focuses on Outlook Tips, Microsoft Tricks and Assessing your Microsoft Productivity Score.
BEI’s December newsletter focuses on our 2020 Holiday Tech Gifts Guide. Enjoy!
Here at BEI, we polled our staff and as you can imagine, a group of techies have a large and...
In this Webinar, Kristen McGarr of Adroit Insights shares with you the 3 most important things to know about selecting...
We have exciting news to share with you! John and Katherine Deming have acquired a majority ownership of BEI.
Online scams are everywhere these days. BEI offers tips to stay safe during the pandemic, holiday season, and the elections.
Jonathan Krasner, Director of Business Development, Breach Secure Now! gives an exciting presentation about human security and adopting a cybersecurity...
BEI’s November newsletter focuses on the steps to successful Project Management, Laptops in short supply, mulit-factor authentication, maximing your CRM...
According to Microsoft, Multi-factor Authentication (MFA) can block over 99.9% of cyber attacks that aim to compromise an account. These...
According to Microsoft, Multi-factor Authentication (MFA) can block over 99.9% of cyber attacks that aim to compromise an account. These...
BEI’s October newsletter focuses on Cybersecurity Month with a real-life example, the announcement of BEI’s BPtW award, choosing between Break-Fix...
As organizations work on preparing for eventual CMMC certification, one of the critical factors that must be addressed at the...
Andrew Beardall, Senior Partner/General Counsel, The Capital Group gives an overview of the risks and considerations involved with selecting a Cybersecurity...
BEI knows that deciding which type of IT Support firm to hire is a big decision. We review the pros...
There’s a lot going on with telecom right now. Between working from home and the dramatic shift to online meetings,...
Many of us have been working at home since March and are starting to evaluate next steps. For some that...
BEI’s September newsletter focuses on managing expenses, a Back-to-Work COVID checklist, an overview of remote working options, Teams Together Mode,...
Many of us have been working at home since March and are starting to evaluate next steps. For some that...
This Back-to-Work COVID Checklist is super helpful. It covers People, Workplace, Technology and Customers and may be a useful roadmap...
Learn about free digital summer camps, how to select the laptop of your dreams, the latest on CMMC and our...
What does it cost…?? Always a complicated question, but one we all get in any line of work. Many businesses...
How do you protect your professional work life from your family, ensure you have the bandwidth to do your job,...
Andrew Beardall, Senior Partner/General Counsel, The Capital Group will give an overview of the risks and considerations involved with selecting a...
BEI’s monthly newsletter includes help for parents trying to manage kids online during the summer, information about Risk Assessments, our...
Join BEI President and self-professed Excel junkie, Mike Jennings, as he discusses and demonstrates intermediate skills in Microsoft Excel.
Nearly 20% of small and mid-sized businesses will suffer a disaster in the next five years. Disaster recovery planning is...
All BEI Managed Services Clients have a security portal that can be used for online IT security training, IT policies...
Join BEI Partner Ken Kocher, President of Force Security, for this informative webinar on physically securing your workplace.
How can your organization mitigate cybersecurity risk? The answer lies in risk assessments. Learn more about what they are and...
BEI’s monthly newsletter includes Father’s Day Gifts, an offer for a free Microsoft 365 Licensing Audit, WFH Technology policies, Excel...
Microsoft offers many options for their subscription licensing – Microsoft Office 365. This table summarizes the options, features and pricing.
Most businesses have made the transition to Microsoft/Office 365 licensing for things like email and the Office suite of products....
Collaboration with Microsoft Teams is simple. Find out how to work in Teams accross your organization. Master meetings, phone calls,...
BEI’s monthly newsletter includes Mother’s Day gift tips, our lunchtime webinar series (Microsoft Teams Tips and Tricks is next), BEI...
BEI’s monthly newsletter includes Mother’s Day gift tips, our lunchtime webinar series (Microsoft Teams Tips and Tricks is next), BEI...
Join BEI Engineer, Ryan Diaz, as he discusses and demonstrates Datto Workplace, Worplace Online, Workplace Desktop, File Sharing and Selective...
CMMC Level 2 introduces processes (maturity) to CMMC. It is bridge to Level 3 but requires a rigor and discipline...
It’s one thing to stop touching your face. It’s another to stop touching the things that touch your face! Read...
We’re attending LOTS of online meetings these days and have put together our favorite tips for Microsoft Teams and Zoom.
96% of Federal DOD contracts would require only CMMC Level 1 certification – so let’s get going!
Businesses are transitioning from office work lifestyle to remote working solutions and for good reason. Find out here with this...
Do you want your staff to be able to work remotely? This is top of mind right now for many,...
A password manager is like a notebook with your passwords, but with a master key that only you have. This...
View our latest webinar on password management and a demo of LastPass.
CMMC (Cybersecurity Maturity Model Certification) is coming and will quickly impact government contractors’ ability to respond to government opportunities. This...
Did you know that phishing via text is growing rapidly? The short webinar provides tips and examples of phishing threats...
Here at BEI, We are happy to get you a quote from Dell or another leasing company. They are often...
Microsoft will stop issuing security updates/patches for Windows 7 and Server 2008. These security patches address vulnerabilities that Microsoft has...
CMMC is a certification that the government will require for every firm that does business with the Department of Defense (DoD)....
The Reston Business Advisory Council presents Cyber Threats to Your Business – a presentation and Q&A discussion for business owners....
CMMC (Cybersecurity Maturity Model Certification) is coming and will quickly impact government contractors’ ability to respond to government opportunities. Register...
The premier business-to-government event taking place outside of the beltway is returning on Thursday, May 7, 2020 at the INOVA...
Join the business community in celebrating the new office space at the Chamber – the same building just down one...
Before you make your resolutions for 2020 we thought we would help you take a minute to tie up essential...
Here at BEI, we polled our staff and as you can imagine, a group of techies have a large and...
We want you to join us for this special presentation about phising and the dangers to look out for in...
Whatever your holiday traditions, the experts advise us all to be a little wary online this time of year. Here...
Cybercriminals are always on the hunt for easy access to your organization. Many times the easiest way in isn’t traditional...
The Dark Web sounds frightening and it is. It is a place most of us will never visit – it...
It’s the 2nd annual Greater Reston Chamber golf tournament at Hidden Creek Country Club on Monday, October 21 from 11am...
We’re hosting this breakfast seminar on “HIPAA Compliance for the Business Associate” at our office on Wednesday, October 23 and...
Arthritis and Rheumatism Associates (ARA) is a large healthcare practice based in Maryland. With approximately 20 physicians and more than...
Many of our clients take payments from their customers using credit cards. Banks and the Payment Card Industry (PCI) require...
We’re all targets for phishing, and you can imagine how attractive the Senate staffers would be! Mike briefly covered the...
Approximately 1 out of every 5 IT projects is considered an utter failure. Even success has a lot of nuance,...
Let’s look at the 5 critical steps to creating a network that will remain reliable for both your staff and...
How do you backup your data and share information? if you’re overlooking other areas of your business IT infrastructure, you...
IT relocation may seem stressful and overwhelming at first, but with a little planning and forethought, the process can be...
Bring Your Own Device (BYOD) policies are changing the business world for the better. With fewer overheads and greater working...
It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re...
A network risk assessment is one of the best ways to keep your network secure. It can identify vulnerabilities and...
Phishing attacks are a huge threat to your business — they are on the rise and becoming more sophisticated at...
Phishing is a cybercrime that costs US businesses and individuals a combined half a billion dollars annually, and it’s hard...
Get ideas and advice from advisors who have successfully navigated every phase of a company’s life cycle, including successful exits....
Mitigating insider threats involves ongoing effort and some expense, but it pales in comparison to the possible damage an insider...
Many data breaches are, unfortunately, the result of your team — whether because of negligence or malice. We’ve put together...
BEI is happy to announce that we have been named a 2019 Best of Reston Honoree. This award is given...
Did you know the average worker only spends 39% of their time on role-specific tasks? The cloud offers better ways...
Our CEO, Ellen Jennings, was recently featured in a TechGen blog, Why Your Small Business Needs an IT Network Diagram...
What’s stopping you from switching over to the cloud? Hopefully, it’s not a reason founded in myths. Although cloud computing...
How do some of the brightest minds in today’s business world stay at the cutting edge in both their personal...
Just like accounting and legal services, technology has become an essential component of all businesses today. But just like those...
It’s amazing to consider how far business technologies have come in the past few decades. At one time, you or...
VR has practical commercial applications, and more and more companies are taking advantage of them. Indeed, businesses of all sizes...
It might be a bit cliché, but, when it comes to your business, time really is money. You need to...
Cryptocurrency. It’s buzzworthy and always trending. Your college roommate’s cousin’s friend’s barista invested in cryptocurrency and now he’s a millionaire....
Most people are guilty of using the same password for many accounts. This widespread password reuse makes your an easy...
Entering into a business partnership with someone is a lot like marriage. You are looking for the person who shares...
When it comes to healthcare, patients expect that their private information will be protected. HIPAA was created to help standardize...
Federal government agencies issue thousands of rules every year. If your business is required to follow these regulations it can...
Compliance is necessary for a lot of industries. Your employees are a key part of meeting compliance requirements so it’s...
Some industries face heavy government regulations. Staying compliant can be a job within itself. Violating these regulations can result in...
Every business needs a backup and disaster recovery plan. But having a recovery plan isn’t enough, you also need to...
You won’t know that your system has failed if you don’t test it regularly. Maintaining business continuity after a cyber...
Business disruptions can cost your company a lot of money and ruin the trust that clients have in your services....
Advances in technology have transformed the modern workplace. People are working faster and more efficiently than ever before. But all...
Too many healthcare organizations think of HIPAA as just another government regulation which limits their revenue and drives up their...
While the majority of those hit by ransomware attacks are healthcare and government organizations, many others have fallen victim to...
There is often confusion about whether an organization falls under HIPAA regulations or not. HIPAA regulates two types of organizations—Covered...
HIPAA is a series of federal laws and implementation regulations enacted beginning in 1996 to protect the privacy and security...
Complete protection from cyberattacks requires multiple layers of security. That’s because network security requirements are always changing. Are you looking...
Phishing attacks and spear phishing are two methods of cyberattack that have proven to be alarmingly effective in recent years....
Today’s expanding global economy drives the demand to keep both hard- and software updated and current. While in-house servers offer...
War is an intense laboratory for leadership lessons and the authors of Extreme Ownership (former Navy Seals Jocko Willink and...
Microsoft’s Office 365 is the go-to productivity suite for businesses of all sizes. But did you know there are plugins...
Smartphone apps allow employees to work remotely with the same functionality on their smaller devices as they would have access...
As a small business owner, you know that if if something goes wrong with your technology, you need a fix—quick....
Hiring and retaining great staff is probably one of the biggest challenges for any employer, but more so in an...
From business process automation to big data, there are a variety of strategies at your fingertips to achieve predictable IT...
In order to better serve your customers and beat your rivals, you need to make sure your business technologies are...
Mike Jennings and the Greater Reston Chamber of Commerce May 23, 2018 presentation on “Small Business IT on a Budget”....
Business technology allows SMBs to increase productivity, manage expenses and carve out a competitive edge. Creating an effective small business...
A new business partner gave me a copy of Creativity Inc., and I couldn’t resist a book with Buzz Lightyear...
Connecting your business IT solutions to return on investments is crucial for optimal growth and longevity. But how can you...
Your IT infrastructure has to seamlessly integrate with your company’s processes if you’re serious about fostering optimal growth, productivity and...
Workflow automation offers the potential to transform your organization like no other technology before it. By defining your business processes...
Here at BEI, we believe our services all hinge on a single idea: predictable IT makes your life easier. We...
We’re into IT. That’s what we do for a living. But at BEI, we know IT and network configuration probably...
As you know, a lot can change in a year, and it’s no different with technology. But is your tech...
While Halloween has passed, the scariest season for companies has started to send shivers down their spinal columns– tax season....
Downtime isn’t just frustrating, it’s expensive. According to a recent ITIC study, 98% of organizations say a single hour of...
The only way to ensure growth and longevity is to protect one of your business’ most valuable assets: information. You...
If you’re skating by with older PCs, you’re making yourself vulnerable to a myriad of potential problems. It’s time for...
Cloud continues to be a common buzzword. But, for many cloud is still a mystery. So, we’d like to help...
Technology is the leading force that helps companies streamline their process, improve productivity and keep a competitive edge. But, what...
Organizations of all sizes rely on technology to operate efficiently and effectively, and as the reliance on IT grows, so...
Today’s businesses face an IT environment where proprietary information and confidential client data must be secured against ever-escalating attacks and...
Check out the article by our CEO, Ellen Jennings, about the Reston Chamber of Commerce committee, Resourceful Women of Reston....
The global mobile workforce is expected to grow to 1.87 billion in 2020. Maybe you’ve already mobilized some of your...
Money—saving it and making it—drives almost every business decision regardless of your organization size. Cutting back on IT makes room...
The turn of a new year gives us an opportunity to reflect on the past and find opportunities for improvement....
While the benefits of cloud seem pretty obvious, many organizations still have their doubts about transitioning to cloud. We’re debunking...
Cutting costs is the primary goal for most business owners. They’ll scour their books looking for areas that offer a...
According to an IHS study, outages cost enterprises $700 billion a year. Though this statistic is alarming, it doesn’t quite...
As technology continues to evolve, so do your technology needs. But many businesses lack the internal resources they need to...
Six Ways Cloud Can Increase Your Risk Every day, more businesses are looking to the cloud because it delivers cost-effective...
How much of your day is consumed with worrying about the next IT outage? When your technology isn’t working, your...
Cloud computing is officially a common term. More and more small and medium-sized businesses are looking to cloud because it...
World Backup Day comes around every year on March 31. This day prompts us to be aware that our data...
Sometimes, there comes a point when it’s simply time to move on. Things are just not like they once were....
2015 has come to a close. You’re now tying up loose ends to launch into a successful 2016. Likely, you’re...
What do you give someone running their own business during the holiday season? The answer to that conundrum is as...