Month: August 2022
Latest Posts from Our Blog
With all the data breaches we see on the news these days, it can sometimes be scary to trust companies with your sensitive information. However, in many cases, sensitive data is gained by an attacker taking advantage of users implementing weak passwords. Today, we will look at some examples of weak/strong passwords and what you…
Read MoreAs we’ve spoken with current customers and new prospects about Managed IT Services for their computers, servers, and networks, occasionally, someone will ask, “Can I just put my server and a couple of the most important PCs on a Managed IT Services plan. Our response is always (politely and diplomatically), “No, all of your computers,…
Read MoreYou probably can recall the recent story of when Mark Zuckerberg had to testify before Congress regarding the Cambridge Analytica Data Leak. In comparison to a data breach, such as the Marriott International incident, there are some slight differences to be aware of. We’ll briefly cover these differences, how you should treat each of the…
Read MoreOne of the most crucial things to business, from small to large, is IT (information technology) security. As more companies than ever open up to remote offices, keeping all of your employees and information safe is paramount. In this blog post, we’ll discuss some of the best practices for IT Security Risk Management. Analyze and…
Read More