BLOG
Your Complete Phishing Guide: How to Recognize and Protect Your Business from Email Phishing Attacks
One of the most common ways to breach business systems is phishing. All it takes is one employee, one email, one click and your business is at risk and your data vulnerable. Email phishing is a type of cyber-attack that has been around for many years and continues to...
Choosing an MSP: No. 2. Strategic Alignment and POV on IT
Does the MSP share our vision for IT and its purpose? Financial viability is critical for an MSP. Prudent financial management ensures that the proper investments are being made in the business and that the MSP can survive the booms and busts of technology trends....
A Cyber-risk Self-Assessment that Makes a Difference
Dealing with cybersecurity is on nobody’s fun list. While there are a ton of moving parts that affect nearly all aspects of your business in a thorough cybersecurity plan, it is much easier than you may think to protect your business. I know this as a business owner,...
Digging deeper into Veeam Backup & Replication version 12: Security & Backup and Recovery features
On February 14, the long-anticipated Veeam Backup & Replication V12 was released! We have been trusting Veeam with our backups for more than 10 years and are one of Veeam’s top partners with more than 1,000,000 back-ups. This release is exciting to us techies...
Choosing the Right MSP for Your Business
There are probably as many “How to Choose a Managed Service Provider” guides online as there are MSPs. Do you really desire to consume another piece of self-promotional “content”? I’m going to assume that the answer is “No.” Well, my goal is to NOT add to all that...
Using LastPass? Run for the Hills!
I’ve been a big proponent of using a password manager for years. Managers allow users to develop a litany of complex, effective passwords without having to remember or write down tens if not hundreds of passwords. I’ve touted the password manager called LastPass as...
Curious Tech – January
COOL TECH – January 2023 I know you have all been waiting for it, January cool list is already here! This one is prepared by one of our amazing techs – Natalie. Here we go: Gaming Keyboard This beautiful device will make gaming not only fun but refreshing. Up...
Myth-busting: Safe Cloud Storage
John Ahlberg and John Quinn talk about the benefits of cloud backups, common misconceptions regarding cloud data storage, and cybersecurity 101 for business. One of the most common misconceptions is that data is "protected" when it is stored in the cloud. It is a...
The Thinking Behind Our Tagline, “We Suck Less.”
In this episode of "Ask the Johns," we dig deeper into Waident's thinking about delivering IT. Meet John Ahlberg, the CEO and founder of Waident Technology Solutions. John worked as a CIO in the corporate world and now he makes sure Waident keeps people productive,...
Waident on YouTube!
We are excited to announce that Waident launched a series of short talks on YouTube!
Ask an Agent: Cyber Insurance Prerequisites
Getting cyber insurance can be intimidating and time-consuming but it doesn't have to be either of those. Jonathan Mayotte, Commercial Insurance Advisor offers some insights into common questions companies have on cyber insurance. What are the current...
How Do You KNOW That You Have Not Been Hacked?
We had a client recently ask a good security question. I am paraphrasing, but it went something like: How do I know that someone is not hacked into my network right now and able to get to my data? Sadly the answer was: You do not know. The reality is that with all of...
Subscribe
Get our latest tools and thinking.