Blog

Secure File Uploads with OneDrive for Business

Recent discussions with a couple of different businesses identified a need for secure file sharing with their clients.  Traditionally clients sent sensitive documents over email.  This isn’t ideal.  Plain text email can put your client’s data at risk.  There are a lot of different ways to securely transfer the needed files.  The key is to […]

Microsoft One Drive vs. SharePoint vs. Azure Files

Microsoft One Drive vs. SharePoint vs. Azure Files

As remote work has become more prevalent over the last couple of years, having a web-based file sharing platform has become more important than ever.  Ensuring your team has access to the files they need from anywhere is important to their productivity.  Microsoft has 3 different solutions.  This may seem confusing, but they all serve […]

How to Detect Phishing Attacks

Hook in credit card

Phishing attacks are becoming more and more sophisticated as technologies advance. Cyber criminals are finding new ways to trick people into giving up their credentials, banking information, or other sensitive data.  Attackers use many different techniques to break into systems including building fake websites that look authentic, sending emails disguised as being from companies you […]

How to Tell If You’ve Outgrown Your IT Provider

Man hunched over inside of a box

I met with a company this week that is thriving.  They have been growing by leaps and bounds over the last couple of years, and its run by smart, talented people.  The one area where they are struggling is with managing their technology.  That’s why they called me.  They were essentially asking how to tell […]

Guide on How to Partner With the Right IT Company

IT specialist working on a project

Not every managed services provider (MSP) is the same. Your business has unique needs, all of which need to be handled by your MSP. Your MSP should understand how to improve regulatory compliance, protect your IT infrastructure, and improve business efficiencies. Some IT providers are better equipped than others to handle these needs. Your managed […]

A Guide to Cybersecurity Resilience

businessman showing laptop, tablet and smartphone

Cybersecurity resilience is the ability of an organization to maintain its operations in the face of cyberattacks. It’s important because it helps protect your data and systems from damage or theft and allows you to recover quickly if an attack occurs. There are many things you can do to improve your cybersecurity resilience, including: Govern […]

Endpoint Detection and Response

Endpoint Detection and Response

Antivirus solutions have been continually evolving over the years along with threats and attack patterns.  Endpoint detection and response (EDR) is the latest evolution and offers some significant advantages over its predecessors.  It’s been a long journey.  Here is a brief timeline of AV evolution and some practical advice about the very real advantages of […]