Cloud

#
Amidst the coronavirus pandemic, many governments are moving into the “delay” phase of their strategy to fight the virus. This includes social distancing techniques including closing schools and asking people to work from home. Elsewhere, people are having to or opting to work remotely to…
Read More >
#
Best practices and security checklist for working remotely – IT Checklist, Employee Checklist, Awareness
Read More >
#
Why are some companies avoiding 2FA (Two-Factor Authentication) and MFA (Multi-Factor Authentication) as if someone in authority over us is asking us to eat all of our vegetables or take out the trash?
Read More >
#
And so it begins, hackers are using the COVID-19 map to infect your systems and data. Please read and pass along - especially to those you may have working remotely who may get a link like this and download it.
Read More >
#
If you travel internationally for business, you should learn, and, more importantly, obey the laws of the country hosting you. This is important to remember, not only for civilian laws, but also for cyber-security laws, which can be drastically different than in the U.S. Although breaking…
Read More >
#
As the age of legacy hardware grows, companies are faced with many decisions regarding the future of their infrastructure. The angst of deciding is also heightened as end-of-life dates and equipment failures loom closer. For most, the largest decision is whether to keep services onsite, or…
Read More >
#
Trust - It sounds cliché, but the best business partnerships are built on trust. With security assurance and expertise the highest currency in IT services, having a true partner that you trust is paramount. A MSP should have a proven track record of success. Their clients should speak glowingly…
Read More >
#
Historically, law firms have been reluctant to accept credit cards. But the times, they are a ‘changing.
Read More >
#
… we will all be using Microsoft Teams for IM, meetings and calls.
Read More >
#
Protecting business’ internet-connected systems from malicious outside activity is critical in today’s day and age of cybersecurity.
Read More >