The Blog

Office 365 Tips: How to Password Protect an Excel Workbook

Password protection at the file level is an important step to protecting confidential and proprietary data. Password protecting an Excel workbook at the file level controls access in two ways: It lets a user in, and it lets a user save changes. To get started, open...

Blueprints for Building a Robust Incident Response Plan

While a lot of energy is put it into avoiding security breaches, they still happen. A solid incident response plan can limit damage, reduce recovery time and contain the associated costs. Most IT Departments are firmly focused on prevention. We build systems and adopt...

21 Tops Tips for Securing Your Business in 2021

Securing your IT environment and bringing in the right tools to ensure that it’s being protected safeguards your business, not just technology. Start 2021 with these top tips. 1 Enable MultiFactor Authentication on your accounts. 2 Start a user security awareness...

Hacking Around the Holidays

The holidays increase your organization’s exposure to cyber risk: Reduced staff — December is the month of cookies, hot chocolate, and half your workforce going on vacation. Interim employees, remote workers, and reduced staff across the board. Email avalanche — The...

Vishing: Identify, Detect, and Stop Phone Scams

Phone scams, where a person or a computer calls you up and tries to trick you into saying, buying or doing something, are increasingly prevalent cybercrime. We’ve certainly had our fair share of them recently, receiving several fake calls a day. What we have noticed...

Holiday Phishes

Fraud is on the rise. You can help prevent it. The safety and security of your organization’s data and networks remains our highest priority. We work 24/7 to protect your business and inform you of security changes. As part of our commitment, it’s important to know...

RDP and VPN Cyber Risk Management

Enterprise Virtual Private Network (VPN) and Remote Desktop Protocol (RDP) use have grown exponentially this year as quick solutions to pandemic challenges. While these tools have been critical to business continuity, the increased usage of these services comes with...

Getting Through the Rough Patch

 IT departments have been consumed with keeping Work from Home up and running this year, and patching performance has declined even at organizations that had strong SLAs pre-pandemic. Millions of computers and servers connected to the internet remain unpatched,...

The IT Managed Service Provider Advantage

While our clients love our reliable Managed Service Provider (MSP) operations for the high quality of service, the benefits go far beyond managing information systems effectively and efficiently. Help desk costs are lowered, while in-person service is guaranteed....

CyberAttacks: Response & Resilience

Some businesses might think they are too small to be attacked, or that there is less value in their sensitive information. This is false. In fact, small businesses are more likely to be targeted by ransomware attacks. The following reports illustrate how small...

Website design by Sun & Soil Design | Privacy Policy