Cloud

#
The end of the year is a great time to take inventory of your current technology stack and identify any gaps in your business processes that cause pain for your company.
Read More >
#
You are being diligent with your cybersecurity training, you are not opening suspicious e-mails, and then it happens... You get a regular, old message from a colleague inviting you join a group or open an important file through your SharePoint access.
Read More >
#
Microsoft 365 and Google Workspace are being adopted by businesses at an enormous rate. These Software-as-a-Service (SaaS) apps have fundamentally changed the way we do business, enabling companies to take advantage of economies of scale and reduce IT infrastructure costs. While these apps…
Read More >
#
Okay, I have your attention with a flashy title and blast from the past with hamburger icon, Clara Peller, but it is important to share that we need to “beef up” the rhetoric to stop the desensitization to cyber crime. Businesses are dying. Heck, people are dying. Yes, people are dying because…
Read More >
#
The general rule everyone should continue to follow and share is, "If you are not sure something is a scam, assume that it is." The FBI released their Internet Crime Complaint Center (IC3) logs for 2020, and the data on scams and cybercrime is staggering.
Read More >
#
 River Run received the following security update from ParkMobile this afternoon: "In March, ParkMobile, the developer of the MKE Park app, became aware of a cybersecurity incident linked to a vulnerability in a third-party software which we use. In response, we immediately launched an…
Read More >
#
We knew picking up after ourselves and being disciplined were keys to becoming a successful adult, even though a parent or older sibling may have had to bug us to get there. So why then are some companies avoiding MFA (Multi-Factor Authentication) as if someone in authority over us is asking us…
Read More >
#
Cybercrime is on the rise, and hackers are using any opportunity to take advantage of an unknowing victim to gain access to personal information for financial gain. The new 'work from anywhere world' makes everyone at risk to cyber attacks, especially because threats are even harder to track…
Read More >
#
As the old saying goes… It is not IF you and your company will experience a security event, it is WHEN will you experience a security event and how will you respond? This whitepaper has been created to create awareness of Ransomware Security Events that are growing exponentially. The secondary…
Read More >
#
While the experience of working at home during the pandemic may not have been ideal as whole families sheltered in place, it has given people a taste of what could be. The longer people are required to work at home, the greater the adoption we will see when the dust settles.
Read More >