Blog
Articles, Tips & Tricks
Our blog posts to share our thoughts, ideas, tips and tricks with everyone
Must See Cybersecurity Myths Busted! Part 1
Want to know what the top 5 cybersecurity myths are that could help you stay safe out there in cyberspace?…Read more
How to Use Office 365 Secure Score to Improve Your IT Security
Any firm working with a cloud-based platform wants to know that their data is secure and protected. Microsoft…Read more
CASB Firms Explained: How Do They Help Secure Cloud Platforms?
Cloud adoption is happening at a rapid pace. The benefits of flexibility, cost savings, and business continuity features make it…Read more
How Secure are Your Mobile Devices? The Importance of Mobile Device Management Applications
Mobile device use for work is pretty much a standard practice now days at companies around the world in every…Read more
The End of Life for Windows 7 & Windows Server 2008 is Coming Soon! How to Prepare Your Financial Firm
There’s one date in the technology world that is particularly vital to cybersecurity, it’s the end of life (EOL) date…Read more
What is the New York Data Security Act (aka: SHIELD Bill) and What Will it Mean for My Business?
Data security and online privacy are shaping up to be major regulatory topics this decade and beyond. Major data breaches…Read more
Best Practices of File Sharing to Ensure Your Data Is Secure
Do you remember the days of sending files by fax? You had to stand there as each page made its…Read more
Why is Everyone Talking about Virtual Desktops? How They Can Optimize Your Office for Less
Have you ever struggled with how to get to an important on your main desktop computer while you…Read more
Things You Need to Know About Data Security When Traveling or Working Remotely
Office mobility has skyrocketed over the last decade, with many office systems now being accessed remotely while someone…Read more
What Does it Mean to Have a Managed Network? Why It’s Crucial for Data Security
Your network is the superhighway of communications in an office. It consists of the digital communications between computers and devices,…Read more
Deep Learning and How It’s Transforming Cybersecurity as We Know It
One of the sciences that’s going to dramatically transform our world over the next decade is artificial intelligence (AI). It’s…Read more
What’s Required for Your Financial Services Firm Under the NYDFS Cybersecurity Regulation? (Important Info!)
If you’re a business that provides financial services in the state of New York, you’re required to be in compliance…Read more
Top 7 Features of Microsoft Teams that Will Streamline Your Office
Few software makers do office productivity tools like Microsoft. Their Word, Excel, and PowerPoint programs have been mainstays in businesses…Read more
5 Practical Ways to Use the NIST Cybersecurity Framework to Strengthen Your IT Security
Putting together a comprehensive and reliable corporate cybersecurity plan can be complicated. There are multiple moving parts, such as end-point…Read more
8 Ways to Harness the Productive Power of Microsoft’s Office 365 at Your Company
Microsoft’s power tools – World, Excel, PowerPoint, Outlook – have been dominating offices since the 1990’s, and in this century,…Read more
Hackers are Lurking in Your Inbox! How to Keep Your Business Email & Network from Being Compromised
In the early days of email phishing scams, it was easier to spot a fake. They would be long, drawn-out…Read more
Browse Like a Champ with 12 Time-Saving Tips & Tricks for Chrome
Often some of the biggest productivity assists are little-known secrets in applications we use all the time, like our website…Read more
FINRA Basics | How to Keep Your IT in Compliance & Avoid Costly Penalties
Companies that work in the financial industry are subject to a number of different regulatory guidelines they have to adhere…Read more
6 Tips for Ensuring Your Business Continuity and Resilience this Year and Beyond
Any number of scenarios could bring your business to a screeching halt. Weather destruction, data breaches, and man-made disasters can…Read more
Login Best Practices: Why You Should Be Using Strong Password Management & Multifactor Authentication
As network security software gets stronger and more able to adapt to the tactics used by hackers to breach your…Read more
The 4 Best Ways to Protect Your Business from Dangerous Phishing Attacks
One of the most basic forms of network infiltration comes via an email disguised to be legitimate, aka a phishing…Read more
Are You a Target?
The Quick answer is YES! When discussing security issues with clients, family, or people we meet while networking, the common…Read more
Top 4 Tips for Working at Coffee Shops or Other Public Places
Most of us have used public WiFi in a coffee shop, hotel, or airport. I still haven't met anyone who…Read more
How Microsoft Helps Combat Today’s Security Challenges
Your team is more mobile than ever, which means they can work from nearly anywhere, at any time, as long…Read more
LinkedIn for Business – An unofficial guide
Social Media has only been around for a little more than a dozen years. There are a lot of social…Read more
Billions of Computer Devices Won’t Get Intel’s Spectre Fix
17 Product Groups Named-Their Production Halted and Update Support Ended After Irrefutable Evidence Uncovered Flaw in Intel Chips. The information…Read more
Top 12 New Apps on the Market
ccording to Pew Research, 77 percent of all Americans now carry a smartphone. There has even been a dramatic increase…Read more
Your Top 5 Easy Technology and Office Moving Tips
Your company is busting at the seams. Staff is piled on top of each other. You’re growing, but the building…Read more
The Latest Expansions To Microsoft Office 365 Will WOW You!
The wildly popular subscription-based Microsoft Office 365 offers an ever-expanding application gallery. The latest additions to the line-up are sure…Read more
3 Google Search Tips You Probably Didn’t Know Existed
There is more to "Google-ing it" than meets the eye… Google is a super powerful tool to look for information,…Read more
Are You Still Using Ransomware Friendly Anti-Virus?
Mid-market and Large Firms Have Already Moved Away From Legacy Anti-Virus and Switched To Next-Generation Endpoint Protection To Escape Ransomware Infection,…Read more
How Fraud can Ruin your Investment Firm
Most CEOs of Investment firms are aware of the prevalence of fraud in the digital market today. According to Experian's…Read more
Meltdown and Spectre – what a mess
What’s going on… Security experts from Google’s Project Zero team, have discovered flaws in processor chips that are used in…Read more
What does the Equifax breach mean?
There has been a lot of talk and confusion around the massive data breach of one of the three large…Read more
When and How to Report Cybersecurity Incidents to the Authorites
So you were just deceived by a carefully crafted phishing scheme that you provided some information to an attacker and…Read more
New Petya Variant Ransomware Spreading Globally
We’re getting reports of a new ransomware variant of the Petya ransomware spreading very quickly worldwide in the UK, Ukraine,…Read more
