Protect your customers with SPF
A well-designed email validation framework using DKIM, SPF, and DMARC goes a long way in protecting your customers as well as yourself....
Read MoreA well-designed email validation framework using DKIM, SPF, and DMARC goes a long way in protecting your customers as well as yourself....
Read MoreThere are several ways in which DNS (Domain Name System) can be leveraged to increase security in an IT environment: Domain Name System Security Extensions (DNSSEC): DNSSEC is a security...
Read MoreConfiguring Firefox for Maximum Privacy Firefox is a popular web browser that is known for its strong privacy features and customizable settings. If you want to configure Firefox for maximum privacy,...
Read MoreA managed detection and response (MDR) tool is a security solution that helps organizations to detect and respond to cyber threats in real time. These tools are typically used to...
Read MoreTraditional antivirus (AV) is a type of security software that is designed to detect and remove malware from a computer or network. AV software works by analyzing files and other...
Read MoreXDR, or Extended Detection and Response, is a type of security service that combines multiple security technologies and approaches to provide a comprehensive view of an organization's security posture. The...
Read MoreIf you find that the gerber usb to parallel driver won't load the supplied driver to save your life, no worries - the computer probably was exposed to this or...
Read MoreThree reasons to dump your PBXA final thing to consider is how you will support the extended IT infrastructure as you roll out WFH activities. Traditionally, your IT infrastructure would...
Read MoreRansomware and disaster recovery plansDisaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business–that...
Read MoreVoIP: Three productivity advantagesSo what do you get with VoIP technology that you can’t get from a PBX? Quite a bit, but we will just focus on the productivity aspect...
Read MoreHow to avoid falling victim to ransomwareWe hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of...
Read MoreVoIP facilitates working from home. So What is VoIP?What is VoIP? Voice over Internet Protocol takes us away from the traditional office PBX, the on-location physical equipment that provides voice...
Read MoreRansomware attacks just keep increasing: Vet practices aren’t immuneThis cyberattack scheme isn't new, but it has become increasingly common over the past several years. Many of the viruses lurking out...
Read MoreBYOD and Federal Wage laws: Look out!As most everyone knows, Bring Your Own Device (BYOD) is an approach wherein organizations allow their employees to use their own smartphones and other...
Read MoreThe inevitable increase in Working from Home and the move to VoIPAs you are surely aware, working from home (WFH) has been the primary way that white collar, office-based jobs...
Read MoreThree responses after a Ransomware attackIf you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a...
Read MoreBYOD goes far beyond IT questions.Most often we view BYOD policies as something initiated and overseen by IT. But that misses the broad-ranging impact of BYOD across several other functions...
Read MoreBYOD and Reimbursement PoliciesThere is a great deal of discussion about the advantages and disadvantages of the policy of allowing employees to use their own mobile devices, primarily smartphones, instead...
Read MoreBYOD: The fine print mattersBYOD is the acronym for Bring Your Own Device to Work where “device” can refer to a laptop, tablet, or smartphone. Most frequently, however, the...
Read MoreThere is more to it than installing some antivirus and buying a firewall. Ready to get into the weeds? IT and network security is often focused on keeping intruders out in...
Read MoreIt’s not enough to have a business continuity plan down on paper. Real life testing is necessary to validate assumptions. Get more tips here: http://datto-content.amp.vg/web/b7lkdwopzyop9 ...
Read MoreModern workplaces are proving to be more complex data environments than they were several years ago. The demand for enterprise data storage is rapidly growing as these workplaces advance their...
Read MoreBackup isn’t enough. To avoid downtime, your applications need to run on-demand from virtual machines backed up in the cloud. #cloudbackup...
Read MoreAll disasters have technology, people and process implications. Check out this Disaster Survival Guide to ensure that your business is prepared for all three. #dataprotection http://datto-content.amp.vg/web/dbok3c3ls5cmu ...
Read MoreEvery business has to prepare for the worst. Those that don’t, may never fully recover from a disaster. Is your business protected from disaster related downtime? ...
Read MoreThere is a lot of collateral damage from a cyber attack. Are you prepared? http://datto-content.amp.vg/web/h7286jsg0ybg ...
Read MoreAs mere mortals, some things are out of our control - e.g. other humans and the weather. Data loss is unpredictable, but how your business reacts to it doesn’t have...
Read MoreWhat legal obligations has cybercrime created for your business? http://datto-content.amp.vg/web/c7ht3a9kl3qin ...
Read MoreMother Nature is an unstoppable force. Fires, floods, hurricanes, or blizzards, natural disasters happen and so does downtime. The good news? Protecting your business is easy. http://datto-content.amp.vg/web/cz6y78ckqi6s2 ...
Read MoreWhy does successful cyber security require top down organizational change? http://datto-content.amp.vg/web/ckdrxy8oyd8jp ...
Read MoreDo you know that the #1 cause of data loss is human error? We can’t put all the blame on Patrick in Accounting. We’re only human after all. #infosec...
Read MoreKnow the 5 areas in an organization that can be damaged by cybercriminals http://datto-content.amp.vg/web/ct823emouisdx ...
Read MoreClassic Patrick, he spilled coffee on the breaker panel after blowing a fuse. Goodbye office power! Accidents happen, so often in fact that power outages are a leading cause of...
Read MoreCyber security needs to start in C-level offices, not IT http://datto-content.amp.vg/web/bewjdd431kky0 ...
Read MoreWorking with robots? Then your data might be safe. If you work with humans, then you should give me a call about protecting your data from the guy sitting next...
Read MoreWeb browsers such as Chrome, Firefox, Edge, and a multitude of other would-be competitors are the primary means of your employees interacting with the outside world. In their default state,...
Read MoreIn the last few years, American small businesses have seen a sharp increase in cybersecurity threats. It used to be that their relative anonymity, unknown brand and limited financial resources...
Read MoreDisaster recovery is a basic element of good continuity planning. Business continuity planning–in the case of schools, the better term might be organisational continuity planning– refers to the broad range...
Read MoreWe hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of personal data accessed. In these cases...
Read MoreWhat is ransomware and why is it so bad?This cyberattack scheme isn't new, but it has become increasingly common over the past several years. Many of the viruses lurking out...
Read MoreRansomware and disaster recovery plansDisaster recovery is a basic element of good business continuity planning. Business continuity planning refers to the broad range of plans created so that a business–that...
Read MoreThree responses after a Ransomware attackIf you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a...
Read MoreHow to avoid falling victim to ransomware We hear routinely in the news that a major corporation or government agency has had its data integrity compromised, with millions of pieces of...
Read MoreRansomware attacks just keep increasing: Vet practices aren’t immuneThis cyberattack scheme isn't new, but it has become increasingly common over the past several years. Many of the viruses lurking out...
Read MoreThree responses after a Ransomware attackIf you are unfortunate enough to be the victim of a ransomware attack, there are basically only three options open to you. Ransomware is a...
Read MoreCloud services help law firms meet client demands for convenience while keeping information safe and following regulations. More and more law firms are moving into cloud computing to take advantage of...
Read MoreWhat do MSP's bring to the table? Expertise Value added resellers (VARs) and managed service providers (MSPs) bring both product and industry expertise to bear for legal firms in their digital transformations,...
Read MoreTrying to define business continuity isn't always easy. Everyone seems to have a unique definition these days. Depending on how your business operates, you may think about it a lot differently...
Read MoreSigns you're in need of computer repair that you could be missing Often, we will receive computers in for repair with multiple problems. During our intake, we'll run the owner through...
Read MorePhishing attempts after sensitive information such as usernames and passwords aren't going anywhere. Social engineering techniques and fake websites are compromising more businesses these days than technical flaws, exposing bank...
Read More