Blog

How To Use Microsoft Email Encryption

Introduction Cybersecurity is now at the front and center of everybody’s mind.  This is especially true when it comes to all of forms of digital communications, including email.  We want to be sure that the messages that are sent back and forth remain safe and intact.  The best way to do this is via encryption and ...

Read More

HIPAA/HITECH COMPLIANCE

Introduction Most of us have at least heard of the GDPR (General Data Protection Regulation) and the  CCPA (California Consumer Privacy Regulation). These are the key data privacy laws that ensure the appropriate controls are put into place to in order help safeguard the PII (Personally Identifiable Information) datasets that businesses store. But there is also ...

Read More

Zero Click Security Alert

There is a vulnerability (potentially zero-click) that can be exploited on Chromium based browsers (Chrome, Microsoft Edge, etc.). Because of the rush from Google and Microsoft to get a patch out and the lack of protection available if it is indeed zero-click necessary, we recommend ensuring all browsers are up to date as of 03/29/22 or ...

Read More

Work Smarter, Not Harder — Tech Tips That Will Take You To The Next Level

Most business owners want nothing more than for their businesses to be successful. This is much easier said than done since there are so many variables involved. One of the most frequent that can be difficult to control is employee productivity. With so many businesses operating remotely, productivity has become more of a concern than ...

Read More

Syncing Microsoft OneDrive

Today, many Cloud Providers offer their own brand of online storage.  Microsoft is no stranger to this arena and offers a suite of powerful tools that any end user or business can use “out of the box”.  Their brand is called “OneDrive”, and with it, you can get free storage space of up to 1Tb. But ...

Read More

Microsoft 365: Why You Should Disable Legacy Mail Protocols

It is a very well-known that the Cyberattacker will use any means that they can in order to break through your walls of defenses.  One such method is by ascertaining if you are using old network protocols in your IT Infrastructure.  Many of them are now outdated, and because of that the latest software patches, ...

Read More

The IT Services Model Where Everyone Wins – And The One Where You Lose Big

If you’re a business owner, there’s probably a good chance you spent time figuring out the IT needs of your business. It’s not as easy as searching online and picking the cheapest option or the company with the best reviews. The cheap option may not provide the services you need to keep your business at ...

Read More

Microsoft Systems Center Versus Intune

Over the years, and especially when Azure first came out, Microsoft has developed many ways in terms of configuring and managing both your IT/Network Infrastructure, and even your devices as well.  But now the battle had been drawn between two main ones:  System Center Configuration Manager and Intune. We take a closer at both of them, and ...

Read More

Microsoft DNS Filtering

In the world that we live in today, just about anything can be considered as prey for the Cyber-attacker.  As we have seen with this pandemic, one of the favorite targets has been that of the heisting of domain names in order to create spoofed ones, in which the unsuspecting victim is lured into. One method ...

Read More

Microsoft’s New Pricing – Which Plan Is Best For You?

The M365 suite of Office applications primarily those of Excel, PowerPoint, and Word, has been around for quite some time. Consumers, especially those of businesses, have found it to be far most cost effective to use these productivity tools straight from the Cloud rather than buying them separately, at the retail level. There are a ...

Read More