Search Results

Searching for: ""

Defense In Depth – Next-Generation Firewalls

In our previous Defense In Depth blog, we talked about the first layer in our Layered Security Strategy: The importance of endpoint protection and security. In this blog, we’ll cover all things …

Read More

The Reality of Cybersecurity Vulnerabilities, Threats, & Risks

If we’ve heard it once, we’ve heard it dozens of times. There are countless aspects to consider in cybersecurity, and as technology continues to advance at a rapid pace, so …

Read More

Nonprofit Azure Credits Update

Many nonprofit organizations struggle with antiquated servers running out-of-date legacy software that’s too complex to easily transfer to the cloud. Hosting your own physical servers or paying for space in …

Read More

Technical Debt – What It Is and How It Impacts Your Budget

It’s summer break up here in the United States, and most of us are taking some time off to hang with our kids or go on a trip. Well, enjoy …

Read More

Thinking Outside the Box – Security Considerations with Office 365

Strong authentication is the primary concern when organizations are looking to secure their Office 365 tenants, and Microsoft gives us many ways to implement MFA, set conditional access policies, and block suspicious …

Read More

Cloud Migrations – Moving To The Cloud

In today’s world, we hear a lot about companies trying to move everything to the cloud – hoping to magically fix all their problems and gain a competitive advantage in …

Read More

Industrial Networks – Challenges and Solutions

Factories are beehives of activity – hundreds of skilled tradespeople scurrying back and forth, all contributing in their own unique ways to the fabrication of new products. Mechanics, welders, assemblers, …

Read More

Migrations and You: BitTitan with Microsoft 365 Modern Authentication

Bye-Bye Basic Authentication In response to persistent bad actors and increasingly sophisticated threats, the field of IT cybersecurity is developing. Unfortunately, hackers are able to take advantage of Basic Authentication and steal …

Read More

Veeam Backup for Microsoft 365 v6a

The way Veeam secures Microsoft Teams chat data will significantly alter in the upcoming Veeam Backup for Microsoft 365 version. Veeam will facilitate backing up Teams chats – starting with …

Read More

Microsoft New Customer Experience (NCE) Change

The more things change, the more they stay the same. Microsoft’s cloud licensing program is changing.  The licensing agreement program CSP (Cloud Solutions Provider) – is not going away, but …

Read More

fITness Challenge: Security Awareness Training

We’re in week four of our fITness challenge! If you missed last week’s challenge, you can catch up here. Week 4: Security Awareness Training As we continue through your IT …

Read More

Protecting Against Log4J – Not All Endpoint Security is Equal

Thanks to Log4J, AKA the vulnerability that has much of the IT world in panic mode, 2022 is set to start towards an unfortunate bang.   Just when we think everything …

Read More

Press enter to search