Our (48 Hour) Response to the Microsoft Exchange Flaw
Earlier last week, Microsoft released news that there was a flaw in their mail server software. By the time they had discovered this issue, hackers had already begun to take...
Earlier last week, Microsoft released news that there was a flaw in their mail server software. By the time they had discovered this issue, hackers had already begun to take...
Most businesses rely on specific software, and a lot of it. It’s used to manage, protect, and facilitate your business. Today’s software is more flexible than ever before, and while control over...
In a world that is flooded with free educational resources, you don't have time to filter through what is worth reading and what is not. We value your time, as...
For any business continuity strategy to be complete, a data backup strategy needs to be involved. This is often easier said than done: there are a lot of elements that need to be...
Passwords are effectively the cornerstone of your business’ data security—if they aren’t strong enough, your protections could crumble. Unfortunately, many users shortchange their passwords to try to make them more...
During the COVID-19 pandemic there have been quite a few different types of scams. At first, most of the scams centered around economic relief money that was doled out to people to...
While nobody wants their company to suffer a data breach, the nature of today’s workplace makes these occurrences harder and harder to avoid. In fact, chances are that you’ll eventually encounter one,...
When your business is in the position to add new technology, the process can be pretty confusing. You try to make good business decisions every time, but with technology, there...
Our core values are especially important to us: they communicate standards we hope to uphold as a team, as well as what you can expect from us as your IT...
While last year saw a significant decrease in its number of data breaches, the number of records that were leaked doubled… and then some. Part of this can likely be attributed to...