IT Security

dispose of old computer equipment

How to Dispose of Old Computer Equipment

You’re moving to the cloud so your servers are obsolete and your IT support team is installing new desktops.  How do you dispose of your old computer equipment?
Read More
cybercriminals email address

How Cybercriminals Get Your Email Address

A client recently called us out of frustration with a phishing email. He demanded to know why we couldn’t stop cybercriminals from emailing him.  He’s tired of worrying about clicking on links and attachments.  He wanted to know how he could keep his email address out of the wrong hands.  Here's how cybercriminals get your email address.
Read More
workstation backups

Why Workstation Backups are Essential

When you’re reviewing data backup plans, think beyond servers.  Individual workstation backups are important, too.  There’s essential data on every individual desktop and laptop that can take hours to re-create.  Without a workstation backup, some of that data could be lost for good after a compromise.
Read More
Two Factor Autentication Security Illustration. Login Confirmati

Why You Should Enable Microsoft 365 Email MFA

Multi-factor authentication (MFA) is one of the most-effective and least-expensive tools you can use to protect your email and organization data.  Still, many small businesses are reluctant to use it.  Here’s why you should enable Microsoft 365 email MFA.
Read More