The Blog

Upgrade your Office 365 tools with Microsoft Teams

Thanks to digital transformation, workplaces are evolving. Finding the right tools for the job isn’t easy. For teams that spend a sizeable portion of their time working remotely, such tools effectively become their workspace. These digital workspaces –like their...

What is Ransomware?

Ransomware is a type of malicious software (also known as malware) that is designed to hold your data or device hostage, demanding payment for you to regain access. Ransomware has become very common because it is so profitable for criminals. Like most malware,...

Your #WorkingFromHome Pic Reveals More Than You Think!

Using video calls and virtual meetings to connect with colleagues, friends, family, and industry peers has inspired a new trend of posting online photos of home offices and remote work settings. Hashtags like #WorkingFromHome are inspiring oversharing online, and it’s...

BPI Earns CompTIA Security Trustmark+™

Validation that BPI uses industry accepted security best practices  Farmington Hills, MI – BPI Information Systems, Inc. announced today it has received the CompTIA Security Trustmark+ from CompTIA, the non-profit association for world’s information technology (IT)...

Vulnerability Management for Small and Midsize Enterprises

Vulnerability management for small and midsize enterprises is becoming increasingly important due to the rising threat of cybersecurity attacks, emerging risks, and evolving regulations. Vulnerability management requires a comprehensive process to continuously...

On-Premises Servers Require Special Protection

The CISA has issued Emergency Directive 21-02, Mitigate Microsoft Exchange On-Premises Product Vulnerabilities, requiring emergency action. Neither the vulnerabilities nor the identified exploit activity is currently known to affect Microsoft 365. While migrating from...

How to Update Your Remote Access Policy – And Why You Should Now

Working from home is having an impact on network shape and traffic. Organizations are recognizing the severe security implications from a sudden reliance on the cloud, mobile devices and unfamiliar Wi-Fi network connections. Access to corporate resources is occurring...

Have I Been Hacked?

No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and if so, what to do. Your Online Accounts Family or friends say they are receiving unusual messages or invites from you that you know...

COVID-19 and the Local Government IT Response

Information technology professionals serving local governments of all sizes have been called upon to help maintain the delivery of essential programs by enabling remote work, sometimes for staff who had never worked from home, and managing all the logistical and...

Website design by Sun & Soil Design | Privacy Policy