Blog

An Introduction To Threat Modeling

Introduction In the world of Cybersecurity today, there are obviously many tools and technologies today that only will help you thwart off any kind of incoming threats, but even predict what future ones could possibly look like.  But technology can only go so far at times, and thus, it is necessary to go back to the ...

Read More

Stay Compliant By Upping Your Cyber Security Practices

If you own or operate a business, there are plenty of things you must do to ensure success. You have to make the right hiring decisions; develop a product or service that you can sell; build relationships with clients, employees and partners; and much more. One of the biggest responsibilities that comes with owning or ...

Read More

How To Use Microsoft Email Encryption

Introduction Cybersecurity is now at the front and center of everybody’s mind.  This is especially true when it comes to all of forms of digital communications, including email.  We want to be sure that the messages that are sent back and forth remain safe and intact.  The best way to do this is via encryption and ...

Read More

Work Smarter, Not Harder — Tech Tips That Will Take You To The Next Level

Most business owners want nothing more than for their businesses to be successful. This is much easier said than done since there are so many variables involved. One of the most frequent that can be difficult to control is employee productivity. With so many businesses operating remotely, productivity has become more of a concern than ...

Read More

Zero Click Security Alert

There is a vulnerability (potentially zero-click) that can be exploited on Chromium based browsers (Chrome, Microsoft Edge, etc.). Because of the rush from Google and Microsoft to get a patch out and the lack of protection available if it is indeed zero-click necessary, we recommend ensuring all browsers are up to date as of 03/29/22 or ...

Read More

HIPAA/HITECH COMPLIANCE

Introduction Most of us have at least heard of the GDPR (General Data Protection Regulation) and the  CCPA (California Consumer Privacy Regulation). These are the key data privacy laws that ensure the appropriate controls are put into place to in order help safeguard the PII (Personally Identifiable Information) datasets that businesses store. But there is also ...

Read More

Managing Azure Spend

Azure is an exciting opportunity for businesses of all sizes to move resource hosting out of the datacenter and into the cloud. Hosting in Azure removes the need for businesses to purchase, host, and maintain physical resources. Comparing physical systems to Azure pricing in a Total Cost of Ownership (TCO) context helps evaluate the cost ...

Read More

Syncing Microsoft OneDrive

Today, many Cloud Providers offer their own brand of online storage.  Microsoft is no stranger to this arena and offers a suite of powerful tools that any end user or business can use “out of the box”.  Their brand is called “OneDrive”, and with it, you can get free storage space of up to 1Tb. But ...

Read More

Microsoft 365: Why You Should Disable Legacy Mail Protocols

It is a very well-known that the Cyberattacker will use any means that they can in order to break through your walls of defenses.  One such method is by ascertaining if you are using old network protocols in your IT Infrastructure.  Many of them are now outdated, and because of that the latest software patches, ...

Read More

The IT Services Model Where Everyone Wins – And The One Where You Lose Big

If you’re a business owner, there’s probably a good chance you spent time figuring out the IT needs of your business. It’s not as easy as searching online and picking the cheapest option or the company with the best reviews. The cheap option may not provide the services you need to keep your business at ...

Read More