Most of us are back in the office, and 2020 is in full swing! Back in December we took a look at what we should expect to see this year, but now we want to take a look back at 2019 for a bit, the[…]
I feel like it was just yesterday that I was writing our 2019 outlook post, and now here we are gearing up for 2020 and a whole new decade. A lot has happened over the last year, and 2020 is[…]
The holidays are upon us! While many are spending this week prepping for Thanksgiving, we are looking ahead to help with all your holiday shopping needs. Our annual tech focused gift guide is here to[…]
The first steps in creating a solid cybersecurity plan are to identify and define what cybersecurity means for your business, what you need to protect, and where everything is located, but once you[…]
"The growing number and sophistication of cyber threats poses a critical risk to US businesses, and the impact of a successful attack can be devastating to small businesses in particular."Howard S.[…]
In part one of this blog series we talked all about the basics of Multi-Factor Authentication, but just so you're up to speed, here's a quick summary.
MFA refers to an approach to securing accounts[…]
Multi-Factor Authentication. Two-Factor Authentication. One-Time Password. 3 Names. 1 Security necessity.
Multi-Factor Authentication (MFA) refers to an approach to securing accounts by requiring[…]
Technology issues can arise at any time of the day or night, and unless your internal tech support is on call 24/7 and never takes a vacation, this could be a real problem for your employees,[…]
Moving can be great. New offices, new location - who doesn't love new things?While it is a great thing, we also know it can be an immense amount of work, and an extremely long[…]