WELCOME TO OUR BLOG
Not sure what backup & disaster recovery resources are necessary to keep your organization protected? This blog outlines 3 ways to determine the tools and services best suited to your business.
How to Get the Most out of Microsoft 365
- April 7, 2022
- Ben Schmerler
Want to make sure you're getting the most out of your Microsoft 365 subscription? Here are a few tips and tricks to improve your experience with Microsoft 365 including SharePoint, Teams and OneDrive.
CyberSecurity Best Practices
- April 4, 2022
- DP Solutions
There is no better time to make sure you and your staff are prepared to deal with cybersecurity threats. Here are 7 security best practices to make sure your organization has the basics of cyber-hygiene covered:
*As featured on Tripwire.com - March 1, 2022
APIs: What they are, the benefits & why security is a worry (Guest Blog)
- February 3, 2022
- Ross Moore
What in the world is an API?
If you use a travel app (e.g., Expedia) to find what different airlines are flying to your destination, or if you’ve seen Google Maps embedded on a site, then you’ve interacted with an API.
An Application Programming Interface (API) is a set of operations that allows applications to access data and interact with external software components.
An API delivers the user’s action to a system, then sends the system’s reply to that user. When someone clicks “Add to Cart,” the API tells the site that a product was added, the site puts the product in the cart, and the cart gets updated.
We use APIs all the time but most of us never think about them at all. They greatly expand the services that a site or app can render. This service expansion is made possible by developers of both the APIs and the sites that use them. Many site developers don’t need to create APIs – they just need to use the APIs that are made available by whatever product or service is being used.
5 Popular Cyber-Attacks, How to Spot Them & What You Can Do
- January 27, 2022
- Ben Schmerler
Learn the surefire signs of the five most common types of cyber-attacks and how you can fight back to protect yourself and your business.
Understanding the Different Types of Data Backups
- December 20, 2021
- Ben Schmerler
In this blog, we'll review some general types of data backups so that as you continue to change the way you work with data, you can be comfortable that your data is protected from loss. We’ll also discuss some other considerations about each of these types of backups.
How to Build Your Human Firewall for Rock Solid Cybersecurity
- November 30, 2021
- Ben Schmerler
The concept of the “Human Firewall” is essentially the people aspect of cybersecurity. While spam filters can block many of the threatening emails you receive, and strong endpoint detection solutions can help stop malware attacks in progress, at the end of the day your security’s greatest strength or biggest vulnerability is the people behind it.
Spotlight on Cybersecurity Awareness Month – Cyber First!
- October 28, 2021
- Ben Schmerler
The last week of Cybersecurity Awareness Month, focuses on putting Cybersecurity First. That means embedding it into your business plan and making it a part of your operation… not an afterthought.
Many people get excited about the benefits of things like replacing old computers or enabling staff to work from home while ignoring the potential security concerns of making these changes. We want to try to shift that mindset to incorporating security into your business so that it’s ingrained in your operation.
Spotlight on Cybersecurity Awareness Month – Cybersecurity Career Awareness
- October 21, 2021
- Ben Schmerler
One of the biggest challenges in the U.S. is the limited amount of talent available to protect our technology systems. However, careers in cybersecurity can be extremely rewarding both personally and financially.
Week 3 of Cybersecurity Awareness Month focuses on career opportunities in the Cybersecurity space.
The topic of careers in Cybersecurity is an important one. One of the biggest challenges the United States faces is the limited amount of talent available to protect our technology systems and infrastructure.
Why is the lack of talent such a challenge? With all of the innovation in the technology space, devices and apps changing our lives, and our undivided attention towards them, you would think that we would have a generation of people ready to protect our data…and there are. However, while many people are discovering cybersecurity to be financially and personally rewarding as a career, we are still short of where we need to be.
SUBSCRIBE
CATEGORIES
- IT Security (79)
- Compliance (67)
- IT (32)
- cybersecurity (22)
- IT Services (19)
- Managed IT Services (17)
- Cloud Computing (13)
- Remote Workforce (13)
- IT Support Services (12)
- Disaster Recovery (11)
- Cloud Business Services (10)
- coronavirus (10)
- social engineering (10)
- telework (10)
- Professional IT Services (9)
- cyber security (9)
- phishing (9)
- Business Technology (7)
- security (7)
- Managed Services (6)
- Telecommute (6)
- ransomware (6)
- Best Practices (5)
- Mobile (5)
- Technology (5)
- Cybersecurity Awareness Month (4)
- Information Technology (4)
- covid-19 (4)
- HIPAA (3)
- Healthcare (3)
- Microsoft Teams (3)
- Risk Management (3)
- Technology Services Provider (3)
- Data Backup (2)
- HR (2)
- Human Resources (2)
- IT Policies (2)
- Pandemic (2)
- Sensitive Data (2)
- teams (2)
- 5G (1)
- API (1)
- Acceptable Use (1)
- Careers (1)
- Cloud IT Business Services Healthcare (1)
- Cybersecurity Careers (1)
- Data Protection (1)
- Disaster Response (1)
- Email (1)
- Emergency Preparedness (1)
- Incident Response (1)
- Law firm (1)
- Legal Services (1)
- Managed Hosting (1)
- Maryland (1)
- Mobile Computing (1)
- Mobility (1)
- Policies (1)
- Remote Access (1)
- SIEM (1)
- SOC (1)
- Tech Trends (1)
- Tripwire (1)
- VDI (1)
- Virtual Law Office (1)
- Virtualization (1)
- back to school (1)
- business planning (1)
- cmmc (1)
- collaboration (1)
- distance learning (1)
- human firewall (1)
- mobile device management (1)
- regulation (1)
- remote tools (1)
- social media (1)
- technology strategy (1)
- virtual classroom (1)
ARCHIVE
- February 2019 (7)
- May 2018 (6)
- November 2018 (6)
- December 2018 (6)
- March 2020 (6)
- April 2020 (6)
- September 2016 (5)
- July 2018 (5)
- August 2018 (5)
- July 2020 (5)
- April 2018 (4)
- June 2018 (4)
- September 2018 (4)
- January 2019 (4)
- March 2019 (4)
- February 2021 (4)
- October 2021 (4)
- January 2016 (3)
- October 2016 (3)
- November 2016 (3)
- October 2018 (3)
- January 2020 (3)
- October 2020 (3)
- October 2013 (2)
- February 2016 (2)
- August 2019 (2)
- May 2020 (2)
- June 2020 (2)
- August 2020 (2)
- November 2020 (2)
- December 2020 (2)
- July 2021 (2)
- April 2022 (2)
- May 2012 (1)
- May 2013 (1)
- September 2013 (1)
- February 2014 (1)
- May 2014 (1)
- September 2014 (1)
- December 2014 (1)
- June 2015 (1)
- November 2015 (1)
- April 2016 (1)
- May 2016 (1)
- June 2016 (1)
- July 2016 (1)
- August 2016 (1)
- January 2017 (1)
- March 2017 (1)
- April 2017 (1)
- May 2017 (1)
- June 2017 (1)
- July 2017 (1)
- September 2017 (1)
- October 2017 (1)
- November 2017 (1)
- December 2017 (1)
- July 2019 (1)
- October 2019 (1)
- September 2020 (1)
- March 2021 (1)
- April 2021 (1)
- June 2021 (1)
- November 2021 (1)
- December 2021 (1)
- January 2022 (1)
- February 2022 (1)
- March 2022 (1)
- May 2022 (1)