ARTICLES

#
Amidst the coronavirus pandemic, many governments are moving into the “delay” phase of their strategy to fight the virus. This includes social distancing techniques including closing schools and asking people to work from home. Elsewhere, people are having to or opting to work remotely to…
Read More >
#
Best practices and security checklist for working remotely – IT Checklist, Employee Checklist, Awareness
Read More >
#
Why are some companies avoiding 2FA (Two-Factor Authentication) and MFA (Multi-Factor Authentication) as if someone in authority over us is asking us to eat all of our vegetables or take out the trash?
Read More >
#
And so it begins, hackers are using the COVID-19 map to infect your systems and data. Please read and pass along - especially to those you may have working remotely who may get a link like this and download it.
Read More >
#
If you travel internationally for business, you should learn, and, more importantly, obey the laws of the country hosting you. This is important to remember, not only for civilian laws, but also for cyber-security laws, which can be drastically different than in the U.S. Although breaking…
Read More >
#
As the age of legacy hardware grows, companies are faced with many decisions regarding the future of their infrastructure. The angst of deciding is also heightened as end-of-life dates and equipment failures loom closer. For most, the largest decision is whether to keep services onsite, or…
Read More >
#
On November 12, 2019, Microsoft released the first “Build Update” for Windows 10 Operating Systems and is expected to continue to release subsequent Build Updates bi-annually. These Build Updates increase the features, security and functionality of the Operating System. As Build Updates are…
Read More >
#
There are many reasons to hire a Managed Service Provider (MSP) or in-house Managed IT department. Because technology is always evolving, MSP’s deliver a lot of advantages. Here are just a few of River Run’s benefits:
Read More >
#
A Virtual CIO (Chief Information Officer) is a consultant, a third-party, or business that offers a service to fulfill the role as a conventional CIO. Businesses are ever-changing due to technological advances with different computer network tools and platforms used in the workplace. While…
Read More >
#
Are you worried about a cyber-attack on your data and computer network? River Run’s network security services include vulnerability, penetration testing and user training.
Read More >