Posts
Managed IT Services
Multi-factor Authentication - A Must Do!
According to Microsoft, Multi-factor Authentication (MFA) can block over 99.9% of cyber attacks that aim to compromise an account. These accounts include email, banking, shopping, and others. Hacks can be devastating – fraudulent emails sent out, credit card and bank accounts compromised, identity theft, reputation damage, and more.
Blog
Remote Connections
Many of us have been working at home since March and are starting to evaluate next steps. For some that means continued working from home and for others it may mean a mix of returning to the office and from home. This post evaluates the WFH options and provides pros and cons.
Blog
Back-to-Work COVID Checklist
This Back-to-Work COVID Checklist is super helpful. It covers People, Workplace, Technology and Customers and may be a useful roadmap as you plan for reopening.
Blog
What is a risk assessment and why do you need one?
How can your organization mitigate cybersecurity risk? The answer lies in risk assessments. Learn more about what they are and how they can help you.
Blog
How to Pick a Password Manager?
A password manager is like a notebook with your passwords, but with a master key that only you have. This blog helps you compare password managers.
Blog
Windows 7 End-of-Life – what's next?
Microsoft will stop issuing security updates/patches for Windows 7 and Server 2008. These security patches address vulnerabilities that Microsoft has found or that hackers have discovered. If you are in a regulated industry (e.g. HIPAA or FISMA) you will be considered non-compliant. So what should you be doing now?
Blog
The Dark Web - A Scary Story
The Dark Web sounds frightening and it is. It is a place most of us will never visit – it can’t be reached via normal search engines such as Google or Bing.
Blog
Avoid Network Downtime - 5 Steps to Creating a “Neverdown” Network
Let’s look at the 5 critical steps to creating a network that will remain reliable for both your staff and your customer for years to come.
Managed IT Services
5 steps to a solid BYOD policy
It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re comfortable and familiar with. But BYOD policies can create some potentially dangerous situations for employers. Use these steps as you set up your BYOD policy.
Managed IT Services
6 things a good network risk assessment should include
A network risk assessment is one of the best ways to keep your network secure. It can identify vulnerabilities and allow you to fix them before cybercriminals exploit them or unwitting employees expose them. Here are 6 services a good assessment should include.