Toggle navigation
Services
Our Services
Managed IT
Onboarding
Monitoring with Maintenance
Network Security
Backup
Cloud
R-CIO
IT Projects
Applications
IT Help Desk
About
About Us
Our Team
News
Community
Careers
Case Studies
Articles
Contact
414-228-7474
Client Login
Backup
YOU EXPERIENCE A RANSOMWARE SECURITY EVENT... NOW WHAT??
Paul Riedl
March 4, 2021
As the old saying goes… It is not IF you and your company will experience a security event, it is WHEN will you experience a security event and how will you respond? This whitepaper has been created to create awareness of Ransomware Security Events that are growing exponentially. The secondary…
Read More >
9 CYBERSECURITY TIPS EVERY BUSINESS SHOULD FOLLOW
David Pede
February 25, 2021
A massive global shift to remote working environments has created an open season for cybercriminals. No business—big or small—is safe. Small and medium businesses (SMBs) seemingly have a target on their backs, so strengthening your company’s security posture is essential right now.
Read More >
WHEN IT COMES TO CYBERSECURITY, "COVER YOUR ASSETS!"
John Limbach
January 25, 2021
River Run’s R-Security strategy is “an umbrella” that includes a comprehensive Security Foundation Review of physical and virtual cyber threats and vulnerabilities in your office or via those working remotely, and the impact an incident or breach could have on you, your team, your clients, and…
Read More >
THE CHANGING CYBERSECURITY THREAT
John Limbach
January 18, 2021
Remote workforces and sophisticated hackers change the risks businesses are facing. The COVID-19 pandemic has changed the ways businesses operate. It has also changed the potential security risks that hackers leverage to gain access to corporate data. People working from home and the use of…
Read More >
IT CHECKLIST FOR EMPLOYEE AND EQUIPMENT RETURN TO EMPLOYER FACILITIES IN 2020
John Limbach
April 30, 2020
Key IT considerations to plan for when employees return to work from corona virus stay-at-home orders: 1) Returning Device Security; 2) Asset Inventory and Future Needs; 3) Software License Inventory; 4) Update Operating Systems and Software; 5) Unregistered Software; 6) Security Scanning,…
Read More >
IS PHYSICAL SECURITY PART OF YOUR COVID-19 PLAN? HERE ARE TIPS TO MITIGATE BURGLARIES AND LOOTING
John Limbach
April 9, 2020
We are living in unique times when people under economic stress do things they normally would not. We are doing what we can to help business owners protect what they have. And, we are not just talking cybersecurity.
Read More >
HACKERS USE THE COVID-19 MAP TO INFECT YOUR SYSTEMS AND DATA
John Limbach
March 17, 2020
And so it begins, hackers are using the COVID-19 map to infect your systems and data. Please read and pass along - especially to those you may have working remotely who may get a link like this and download it.
Read More >
CYBERSECURITY: DEFENSE STRATEGY FOR 2019 AND BEYOND
David Pede
June 19, 2019
Protecting business’ internet-connected systems from malicious outside activity is critical in today’s day and age of cybersecurity.
Read More >
MICROSOFT TEAMS TIP— BLUR YOUR BACKGROUND
Renee Kodner
January 7, 2019
If you have O365 and your company environment includes departments, or you collaborate in smaller groups for projects, you should be using Microsoft TEAMS and this cool trick!
Read More >
ONEDRIVE FOR BUSINESS - A PRIMER
Renee Kodner
January 7, 2019
Cloud storage – OneDrive Personal, OneDrive for Business, Google Docs, Box, Drop Box, SharePoint and Team Sites – the field continues to grow with our desire to access our information any time; anywhere.
Read More >
← Previous
1
2
3
(current)
4
Next →
Blog
Backup
CIO Consulting
Cloud
Email
Google
Maintenance
Microsoft
Phone Systems
Remote Management
River Run News
Security
Smartphone
Technology
Virus Alerts