In our previous Defense In Depth blog, we talked about the first layer in our Layered Security Strategy: The importance of endpoint protection and security. In this blog, we’ll cover all things …
If we’ve heard it once, we’ve heard it dozens of times. There are countless aspects to consider in cybersecurity, and as technology continues to advance at a rapid pace, so …
Many nonprofit organizations struggle with antiquated servers running out-of-date legacy software that’s too complex to easily transfer to the cloud. Hosting your own physical servers or paying for space in …
It’s summer break up here in the United States, and most of us are taking some time off to hang with our kids or go on a trip. Well, enjoy …
Strong authentication is the primary concern when organizations are looking to secure their Office 365 tenants, and Microsoft gives us many ways to implement MFA, set conditional access policies, and block suspicious …
In today’s world, we hear a lot about companies trying to move everything to the cloud – hoping to magically fix all their problems and gain a competitive advantage in …
Factories are beehives of activity – hundreds of skilled tradespeople scurrying back and forth, all contributing in their own unique ways to the fabrication of new products. Mechanics, welders, assemblers, …
Bye-Bye Basic Authentication In response to persistent bad actors and increasingly sophisticated threats, the field of IT cybersecurity is developing. Unfortunately, hackers are able to take advantage of Basic Authentication and steal …
The way Veeam secures Microsoft Teams chat data will significantly alter in the upcoming Veeam Backup for Microsoft 365 version. Veeam will facilitate backing up Teams chats – starting with …
The more things change, the more they stay the same. Microsoft’s cloud licensing program is changing. The licensing agreement program CSP (Cloud Solutions Provider) – is not going away, but …
We’re in week four of our fITness challenge! If you missed last week’s challenge, you can catch up here. Week 4: Security Awareness Training As we continue through your IT …
Thanks to Log4J, AKA the vulnerability that has much of the IT world in panic mode, 2022 is set to start towards an unfortunate bang. Just when we think everything …