Blog

The Permission Creep Index

One of the greatest risks to businesses today is the over-assignment of rights, permissions, and privileges to employees.  Therefore, CISOs, managers, etc. are all taught to adopt the concept of “Least “Privilege”.  This is where you give your employees just enough of what they need to conduct their daily job tasks, no more and no ...

Read More

Cybersecurity Awareness Month

In today’s Cybersecurity world, awareness is a hot topic.  Whether it is being aware of your physical surroundings, or when you are online, one has to be proactive to help insure that they do not become the next victim of a Cyberattack.  In order to promote the sheer importance of this, October has been designated ...

Read More

Saving a Future Day

USM Technology Assists Heritage Health Solutions With A Backup Recovery Center Project (And More!) To Mitigate Future Technology Risks Heritage Health Solutions specializes in creating customized healthcare solutions for government entities, private companies, and even correctional facilities. The team at Heritage Health removes the complexity involved in providing pharmacy and medical solutions. They offer pharmacy benefit management ...

Read More

5 Signs of a Tech Support Scam

Unable to display PDF file. Download instead.

Read More

How To Create An EMOTIONAL CONNECTION In A Digital World

Record-setting 10.1 million jobs opened in the United States last year. About 11.5 million workers quit just in the second quarter of 2021. Forty-one percent of the global workforce would consider leaving their current employer within the next year. Fifty-four percent of Gen Z are considering quitting. When is the best time to invest in your ...

Read More

3 Ways For A Business To Avoid Taking Itself Hostage

As a former hostage negotiator for the FBI, I have been writing about ways negotiators take themselves hostage and what you can do to avoid making these same missteps. I’ve recently identified three new negotiation tactics that end up putting you in a terrible position at the table. Read on to learn more about each of them ...

Read More

Influencing A Movement

Discovery Channel’s Mike Rowe On The Power Of Authenticity In Communication To Influence Your Audience Mike Rowe’s mother, Peggy Rowe, always finds a way to outdo her son — and she does so in a way only mothers can. “I am so brutally and relentlessly upstaged at every turn by my mother,” Mike said. Peggy Rowe is a ...

Read More

Microsoft Quick Assist

Whenever we use an application, or something goes wrong with our wireless device, the first thought that comes to mind is that help is needed.  Heavy amounts of frustration can lie in whenever we have to call a tech support number, and have to wait for a long period of time in order to get ...

Read More

Document Sensitivity In M365

Document sensitivity refers to the classification of documents based on their level of confidentiality. It is a way of ensuring that sensitive information is protected from unauthorized access and disclosure. Sensitivity labels can be applied to files and emails to keep them compliant with your organization’s information protection policies. The labels can be applied manually ...

Read More

Proposed Changes To The CMMC 2.1

The CMMC is an acronym that stands for the “Cybersecurity Maturity Model Certification”.  As our past article and whitepapers have covered  extensively, it is essentially where the Defense Industrial Base and their subcontractors have to achieve a certain level of certification before they are allowed to bid for work-related contracts.  We are now in the ...

Read More