Blog

Zero Day Vulnerabilities Found in Microsoft Exchange Server

Zero day vulnerability found in mircosoft exchange server

In the last 24 hours there have been reports online of 2 zero day vulnerabilities that have been detected in Microsoft Exchange Server.  These vulnerabilities only apply to On Premise Exchange versions 2013, 2016, and 2019.  They do not apply to Microsoft Exchange Online which is part of the Office 365 Suite. What We Know […]

On Premise Exchange Is Dead

Grave stone with RIP written on it for Premise exchange

Shocking news rocked the IT world today when it was revealed that Microsoft has successfully quashed on premise Exchange email for small businesses.  They haven’t stopped making or selling Exchange.  You can still buy a current version and it’s even still supported.  Microsoft has just made it prohibitively expensive vs the simpler, cheaper, easier to […]

How Eagle Mountain City Could Have Prevented a 1.13 Million Dollar Security Breach

Man confused that hacker has infiltrated his computer

News spread fast about a recent security breach at Eagle Mountain City that may end up costing taxpayers $1.13 Million Dollars.  Limited information about the attack is available.  There are a lot of things that could have been done to prevent it. What We Know KSL News reported on the breach. EAGLE MOUNTAIN, Utah– Officials […]

Cyber Security Insurance

Cyber insurance hologram with locks surrounding it

We’ve had a lot of conversations with clients recently that were trying to get covered with Cyber Security Insurance for the first time or going through a renewal.  Claims paid out by cyber insurance companies have gone up significantly in the last few years because of ransomware, phishing, and other threats.  Insurance companies are getting […]

The Moving Target of Network Security

Man with bow and arrow shooting at ballon with target

Technology is supposed to make things simpler.  Changing IT solutions and a terrifying threat landscape have created a rush of new products and services.  The complexity of Network security has increased 10-fold over the past few years.  IT professionals are hurrying to keep up, understand what’s relevant and implement needed solutions with the moving target […]

i.t.NOW Use Cases

i.t.NOW Use Cases

Over the last few weeks, we’ve been talking to a lot of businesses that are looking for help.  One thing that struck us is that they all seemed to have different reasons for reaching out.  We can solve a lot of different business problems.  These have been interesting and fruitful discussions, and we’ve boiled them […]

Top Security Technologies To Help You Future-Proof Your Onboarding Of New Hires

Man holding holographic lock and holographic circle symbol

A robust onboarding process ensures that 69% of employees remain with the firm for 3 years. Why not consider using security technologies if you’re looking for ways to improve your onboarding process? How can security technologies improve the onboarding process? Keep reading to discover why security technologies are valuable to the onboarding process. Learn about […]

Calculating the Cost of Downtime

Male IT technician looking at server rack with hands behind head

We met with some business owners this week where the current IT provider has neglected their technology for some time.  There were a few contributing reasons for this.  The client is in manufacturing and is hesitant to invest money in technology that they didn’t see improving their production process or output.  The current solution was […]

Recovering Your Business Hardware from WFH Employees

Recovering Your Business Hardware from WFH Employees

There have been a lot of changes over the last few years to how we work.  The rise of work from home has brought with it several new challenges like recovering your business hardware from terminated WFH employees.  We have seen a few different businesses’ takes on that and have been involved on the IT […]