Blog Categories
3 Reasons Why Backing Up Office 365 is Critical
Office 365 provides application availability and uptime to ensure your users never skip a beat, but an Office 365 backup (not included in your Office 365 subscription) can protect you against many other common...
Getting You on the Correct Path with Cybersecurity Policies and Procedures
By now, I imagine you’ve been facing pressure from either an auditor, regulatory body, or even a customer saying that you need to have a ‘Cybersecurity Policy’ in place. There is very little to...
Why You Need A Risk Assessment and Where You Should Start
A common question that I am always asked is “Why do I need to have a risk assessment?” The answer will forever and always be the same: Because you don’t know what you don’t...
Is email phishing just an I.T. Issue?
Look at any news source today and you are bound to see yet another article on how Phishing is affecting businesses of all sizes in the U.S. and overseas. With the amount of money...
The Death of the Billable Hour
We’re done. We’ve broken up. We’re no longer friends. In fact, it’s a harsh breakup, we never even want to see you again. Not on another customer invoice, not in a sales proposal, not...
Everything You Need To Know About The WannaCry Ransomware Attacks
On Friday, May 12, a ransomware variant titled “WannaCry” infiltrated several UK-based National Health Service locations. Since then, it has spread across 200 countries and infected more than 200,000 endpoints. Three WannaCry Facts You...