Business IT Support Resources

Video Trainings & Webinars

Crash Course & Tech Tips: IT Resources

Featured Blogs

Ransomware as a Service easy as pushing a button

Ransomware as a Service (RaaS): Cybercrime, No Hacking Skills Needed

We’ve said it before: Cybercriminals are smart — so smart they’ve now branched out to Godfather villainy much the same as a cartel. They’ll make you an offer you can’t refuse, a ransom threat, but they don’t necessarily need the wherewithal to do it themselves. They hire “hit men” – companies, groups, nefarious entities  –…

Cyber Security Company vs IT Company?

Cyber Security Company or IT Services Company: Which Best Protects Your Business?

Cyber security can be confusing and it’s difficult to know where to turn for help. There are many companies, software and tools available that claim to have the answer. As a business owner, you need expert help. Cyber security businesses tend to fall into two main categories: cyber security companies and IT services companies including…

Business Resilience

The Key To Business Resilience: Get Your DBR In Shape

Business resilience means making sure your business can survive anything that comes at it, from supply chain issues to a ransomware attack (and everything in between). As a managed service provider, we have a great deal of experience helping companies improve their business resilience through Data Backup Recovery (DBR) planning. If you are working to…

Cyber Security Measures

Cyber Security Measures vs. Productivity: Who Wins?

If you feel like you are in a battle with your cyber security team to get access to the files and systems you need to get work done, you’re not alone. It unfortunately happens far too often that security comes at the cost of productivity. But it IS possible to create and maintain your cyber…

Multifactor Authentication

Multifactor Authentication: There’s No Cyber Security (Insurance) Without It

If you are in the market for cyber insurance, be prepared to document your multifactor authentication (MFA) policies and procedures. That’s because insurance companies are starting to require MFA to issue cyber insurance policies. In a recent flyer to its customers, Travelers Insurance, noted, “99.9 percent of account compromise attacks can be blocked by MFA.…

Google Workplace vs Microsoft 365, Google vs Microsoft 365

Which Is Better: Google Workplace or Microsoft 365?

As a managed service provider, we get asked this question a lot. Why Microsoft 365? Why not Google Workplace?  You might think: six of one, half dozen of the other, but there are some significant differences. Before you decide, here are some questions to ask yourself: Are you used to Access and Publisher? You like…

Request a SCAP Compliant Vulnerability Assessment

Our advanced, non-invasive internal and external scans can identify security, performance and stability issues in your network. Get a preliminary scan followed by in-depth consultation with our technical and compliance specialists. After some time to consider the findings, we'll run another round of scans and consultations before providing the final report.