Posts

Multi-factor Authentication

Managed IT Services

Multi-factor Authentication - A Must Do!

According to Microsoft, Multi-factor Authentication (MFA) can block over 99.9% of cyber attacks that aim to compromise an account. These accounts include email, banking, shopping, and others. Hacks can be devastating – fraudulent emails sent out, credit card and bank accounts compromised, identity theft, reputation damage, and more.
Woman on Laptop with View

Blog

Remote Connections

Many of us have been working at home since March and are starting to evaluate next steps. For some that means continued working from home and for others it may mean a mix of returning to the office and from home. This post evaluates the WFH options and provides pros and cons.
COVID Checklist

Blog

Back-to-Work COVID Checklist

This Back-to-Work COVID Checklist is super helpful. It covers People, Workplace, Technology and Customers and may be a useful roadmap as you plan for reopening.
Risk assessments are important to every business

Blog

What is a risk assessment and why do you need one?

How can your organization mitigate cybersecurity risk? The answer lies in risk assessments. Learn more about what they are and how they can help you.

Blog

How to Pick a Password Manager?

A password manager is like a notebook with your passwords, but with a master key that only you have. This blog helps you compare password managers.

Blog

Windows 7 End-of-Life – what's next?

Microsoft will stop issuing security updates/patches for Windows 7 and Server 2008. These security patches address vulnerabilities that Microsoft has found or that hackers have discovered. If you are in a regulated industry (e.g. HIPAA or FISMA) you will be considered non-compliant. So what should you be doing now?

Blog

The Dark Web - A Scary Story

The Dark Web sounds frightening and it is. It is a place most of us will never visit – it can’t be reached via normal search engines such as Google or Bing.
City at nighttime with geometric graphics above it

Blog

Avoid Network Downtime - 5 Steps to Creating a “Neverdown” Network

Let’s look at the 5 critical steps to creating a network that will remain reliable for both your staff and your customer for years to come.
Businessman stacking blocks that spell out "BYOD"

Managed IT Services

5 steps to a solid BYOD policy

It’s increasingly common for employees to have their own devices – laptops, tablets, phones – at work; devices that they’re comfortable and familiar with. But BYOD policies can create some potentially dangerous situations for employers. Use these steps as you set up your BYOD policy.
risk assessment

Managed IT Services

6 things a good network risk assessment should include

A network risk assessment is one of the best ways to keep your network secure. It can identify vulnerabilities and allow you to fix them before cybercriminals exploit them or unwitting employees expose them. Here are 6 services a good assessment should include.