May 3, 2020 | Articles, Security Awareness Training
One of the best ways to protect your business against these types of attacks is by educating your employees on the methods these criminals exploit to gain access to your employees and your sensitive information. But beyond that, there are some methods you can...
May 3, 2020 | Articles, Security Awareness Training
Outside of attempting to download free software from torrent sites, one of the most common ways ransomware gains access to your network is through Phishing and Spearphishing. Techrepublic has recently released a free whitepaper, Phishing and Spearphising: An IT...
Apr 15, 2020 | Articles, Microsoft 365, Need to Know
Microsoft has announced it is changing the names of their Office 365 small and medium business (SMB) SKUs on April 21, 2020. No changes are being made to pricing or features, it is just the names. There are also no price, feature, or business model changes...
Jan 30, 2020 | Articles, Backup, Security
I was discussing backup solutions the other day with a smaller client, and the topic came up about why a cloud backup subscription is needed when they have been able to use their USB drive backups so for with no issue. While I have used USB drives and even DVDs...
Jun 14, 2019 | Consulting, Services, Software
An Effective License Position (ELP) is a Microsoft creation to help businesses examine their software usage in regard to licensing. Because software is licensed to businesses, you can receive it at much more affordable rates. However, you need to show that...
Oct 9, 2018 | Backup, Services
He’s Mal the Maleficent, the perennial purveyor of disease, the one among the Six Data Loss Gremlins who enjoys mischief for the sheer pleasure of harming others. A trickster and a thief, Mal is unrelenting in his attempts to steal or destroy data. He employs all...