Blog Categories
SQL 2008 End of life
Choosing the best path when migrating unsupported Microsoft SQL 2008 to AWS On July 9, 2019, support for SQL Server 2008 and 2008 R2 will end. After this date, Microsoft will no longer support...
Breaking Down Multi-factor Authentication
There are the three factors that you have to choose from when protecting your systems and data. Those factors are: Traditionally, we all have been using just the something you know factor with our...
Risks With “Going It Alone” When Addressing ERP in Your Business
You know your business better than anyone. You give everything you have in your facility day in and day out as your support your line, employees, and deliver an exceptional customer experience. You differentiate...
3 Reasons Why Backing Up Office 365 is Critical
Office 365 provides application availability and uptime to ensure your users never skip a beat, but an Office 365 backup (not included in your Office 365 subscription) can protect you against many other common...
Getting You on the Correct Path with Cybersecurity Policies and Procedures
By now, I imagine you’ve been facing pressure from either an auditor, regulatory body, or even a customer saying that you need to have a ‘Cybersecurity Policy’ in place. There is very little to...
Why You Need A Risk Assessment and Where You Should Start
A common question that I am always asked is “Why do I need to have a risk assessment?” The answer will forever and always be the same: Because you don’t know what you don’t...