Toggle navigation
Services
Managed IT
Discovery
Monitoring with Maintenance
Network Security
Backup
Cloud
R-CIO
IT Projects
Applications
IT Help Desk
About
Our Team
News
Community
Careers
Case Studies
R-Assessment
Articles
Contact
414-228-7474
Client Login
Microsoft
PASSWORD MANAGERS: HOW DO THEY WORK? ARE THEY SAFE?
Paul Riedl
March 24, 2023
There are a ton of passwords we all have to manage and if you are following these three best practices, you change your passwords quarterly, your password is 12 characters + in length, and you do not use the same password on multiple sites. Managing and remembering your passwords is daunting!!
Read More >
YOUR NEED-TO-KNOW GUIDE TO CLOUD SECURITY
John Limbach
March 20, 2023
The growth of cloud computing has completely changed how we work. Zoom, Microsoft 365 – the whole array of collaboration tools that have become part of daily life over the past couple of years – these are all cloud-based applications that many of us would not want to do without. But security in…
Read More >
FEBRUARY Q&A
John Limbach
February 22, 2023
Read more for quick answers on video meetings, employee productivity, IT spend, and more.
Read More >
MICROSOFT AUTHENTICATOR ENABLING NUMBER MATCHING SECURITY FEATURE BY DEFAULT ON MAY 8
John Limbach
February 16, 2023
Last fall, Microsoft introduced support for number matching to its Authenticator app. The company announced on the Microsoft 365 admin center that the new security feature would be enabled by default for all Microsoft Authenticator users worldwide in May 2023.
Read More >
DOES IT REALLY MATTER WHAT BROWSER YOU USE?
John Limbach
January 18, 2023
The web browser you choose can have a big impact on your online security. And as a business, it is important you do not take any unnecessary risks, even if you are someone who likes to steer clear of the IT megabrands.
Read More >
JANUARY Q&A
John Limbach
January 11, 2023
Get answers to some common questions about Windows, Microsoft Office, and more.
Read More >
2023 END OF LIFE / SUPPORT LIST FROM MICROSOFT
John Limbach
December 6, 2022
There are some significant dates in 2023 for hardware and software reaching end of life or end of support. Reviewing these before the year starts will not only help you plan for updates and replacements, but budget properly for next year.
Read More >
IN THE POKER GAME OF PHISHING SECURITY, "I'LL SEE YOUR 2FA AND RAISE YOU TO 3FA!"
John Limbach
October 13, 2022
Multifactor Authentication (MFA) is a must for an organization’s cybersecurity portfolio, but for many this simply means Two-Factor Authentication (2FA). As cybercriminals continue to advance their means of attack, they have developed sophisticated ways to circumvent 2FA.
Read More >
PHISHING ATTACKS AND BUSINESS E-MAIL COMPROMISE LOSSES CONTINUED TO SKYROCKET IN THE FIRST HALF OF 2022
John Limbach
August 15, 2022
E-mail attacks in the first half of 2022 increased by 48% over the previous six months per a report released by Abnormal Security. The report that explores the current threat landscape showed that of that of that increase, 68.5% of the attacks included a credential phishing link.
Read More >
THE RISE IN ZERO-DAY ATTACKS EXEMPLIFIED BY MICROSOFT FOLLINA EXPLOIT: IF YOU HAVE NOT ACTED, ACT NOW
John Limbach
June 9, 2022
The recent notification by Microsoft about the exploitation dubbed “Follina” shows how desperate cybercriminals are to take advantage of a zero-day flaw with an official patch that has not yet been released. However, cyber experts have suggested disabling the MSDT protocol and using unofficial…
Read More >
← Previous
1
(current)
2
3
4
Next →
Blog
Backup
CIO Consulting
Cloud
Email
Google
Maintenance
Microsoft
Phone Systems
Remote Management
River Run News
Security
Smartphone
Technology
Virus Alerts