Reliving November 2019, August 2021 and April 2022, opps we did it again and again. We got hacked. We feel the best of intentions, but wonder when T-mobile can stop the breaches. The newest breach saw a “bad actor” obtaining “limited types of information” from user accounts. T-Mobile shut down this bad actor’s access to the… Read More »T-Mobile, Travis Tritt said it when he sang “Best of Intentions”
Software licenses can be a major expense for businesses, particularly for those that rely on multiple software programs to run their operations. While these licenses are often necessary for productivity and efficiency, they can also take up a significant portion of a company’s budget. As a business owner, it’s important to budget effectively for software licenses… Read More »Keep you software budget under control with this advice.
Number 1 TwitterTwitter is facing accusations of a cover-up in regards to a massive data breach that has affected millions of users in the US and EU. Cybersecurity expert Chad Loder alerted the public to the breach on November 23, 2022, stating that it occurred no earlier than 2021 and had not been previously reported. This… Read More »Top cyber security breaches of 2022
As we’ve already highlighted, many businesses are now planning for possible power outages and blackouts. The one question we’ve been hearing from many of our clients is what needs to be turned off and when? From an IT and facilities perspective, it’s worth writing up a checklist for your office on what exactly needs to be… Read More »What’s your power down sequence?
When the year is coming to a close, it’s the perfect time to plan for the future. Most businesses begin the year with the hope of growing and improving operations. Much of how a business operates depends on technology. So, it makes sense to look to your IT for areas of optimization. A year-end technology review… Read More »What to Include in a Year-end Technology Infrastructure Review
It seems that nearly as long as passwords have been around, they’ve been a major source of security concern. Eighty-one percent of security incidents happen due to stolen or weak passwords. Additionally, employees continue to neglect the basics of good cyber hygiene. For example, 61% of workers use the same password for multiple platforms. And 43%… Read More »What Are the Advantages of Implementing Conditional Access?
With the recent news of possible power outages due to increased demand for energy, many business owners are wondering what they should do if such a scenario plays out. In this article, we will dive deep into the primary factors your current IT provider should be implementing on your behalf to reduce the risk of… Read More »How to protect your business servers in a power outage.
Bring your own device (BYOD) is a concept that took hold after the invention of the smartphone. When phones got smarter, software developers began creating apps for those phones. Over time, mobile device use has overtaken desktop use at work. According to Microsoft, mobile devices make up about 60% of the endpoints in a company network.… Read More »Tips for Overcoming Barriers to a Smooth BYOD Program
Microsoft Teams is a lot of things. It’s a video conferencing tool, a team messaging channel, and a tool for in-app co-authoring, just to name a few. During the pandemic, the popularity of Teams skyrocketed. User numbers for MS Teams jumped from 20 million in November 2019 to 75 million in April 2020. As of this… Read More »Simple Setup Checklist for Microsoft Teams
Have you ever bought a new computer and then had buyer’s remorse a few months later? Maybe you didn’t pay attention to the storage capacity and ran out of space. Or you may have glossed over memory and experienced constant freeze-ups. An investment in a new PC isn’t something you want to do lightly. Doing your… Read More »7 Things to Consider When Getting a New Computer to Avoid Buyer’s Remorse