The Blog

Vulnerability Management for Small and Midsize Enterprises

Vulnerability management for small and midsize enterprises is becoming increasingly important due to the rising threat of cybersecurity attacks, emerging risks, and evolving regulations. Vulnerability management requires a comprehensive process to continuously...

On-Premises Servers Require Special Protection

The CISA has issued Emergency Directive 21-02, Mitigate Microsoft Exchange On-Premises Product Vulnerabilities, requiring emergency action. Neither the vulnerabilities nor the identified exploit activity is currently known to affect Microsoft 365. While migrating from...

How to Update Your Remote Access Policy – And Why You Should Now

Working from home is having an impact on network shape and traffic. Organizations are recognizing the severe security implications from a sudden reliance on the cloud, mobile devices and unfamiliar Wi-Fi network connections. Access to corporate resources is occurring...

Have I Been Hacked?

No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and if so, what to do. Your Online Accounts Family or friends say they are receiving unusual messages or invites from you that you know...

COVID-19 and the Local Government IT Response

Information technology professionals serving local governments of all sizes have been called upon to help maintain the delivery of essential programs by enabling remote work, sometimes for staff who had never worked from home, and managing all the logistical and...

BPI Earns Respected Technology Industry Credential

BPI Earns Respected Technology Industry Credential CompTIA Managed Services Trustmark™ signifies commitment to industry best practices.   BPI Information Systems has received the CompTIA Managed Services Trustmark™, a respected industry credential that signifies...

Office 365 Tips: How to Password Protect an Excel Workbook

Password protection at the file level is an important step to protecting confidential and proprietary data. Password protecting an Excel workbook at the file level controls access in two ways: It lets a user in, and it lets a user save changes. To get started, open...

Blueprints for Building a Robust Incident Response Plan

While a lot of energy is put it into avoiding security breaches, they still happen. A solid incident response plan can limit damage, reduce recovery time and contain the associated costs. Most IT Departments are firmly focused on prevention. We build systems and adopt...

21 Tops Tips for Securing Your Business in 2021

Securing your IT environment and bringing in the right tools to ensure that it’s being protected safeguards your business, not just technology. Start 2021 with these top tips. 1 Enable MultiFactor Authentication on your accounts. 2 Start a user security awareness...

Website design by Sun & Soil Design | Privacy Policy