You’re moving to the cloud so your servers are obsolete and your IT support team is installing new desktops. How do you dispose of your old computer equipment?
Read More
How Cybercriminals Get Your Email Address
A client recently called us out of frustration with a phishing email. He demanded to know why we couldn’t stop cybercriminals from emailing him. He’s tired of worrying about clicking on links and attachments. He wanted to know how he could keep his email address out of the wrong hands. Here's how cybercriminals get your email address.
Read More
Why Workstation Backups are Essential
When you’re reviewing data backup plans, think beyond servers. Individual workstation backups are important, too. There’s essential data on every individual desktop and laptop that can take hours to re-create. Without a workstation backup, some of that data could be lost for good after a compromise.
Read More
Why You Should Enable Microsoft 365 Email MFA
Multi-factor authentication (MFA) is one of the most-effective and least-expensive tools you can use to protect your email and organization data. Still, many small businesses are reluctant to use it. Here’s why you should enable Microsoft 365 email MFA.
Read More
Clean Out Your Inbox to Reduce Your Risk from Cybercrime
When was the last time you cleaned out your Inbox? Do you know how many emails you have? In Outlook, a quick glance in the lower left-hand corner will tell you.
Read More