by John Ahlberg | Featured, Security, Services
Most of us would probably agree that the cloud has turned out to be a boon for business computing. But, have we grown too confident in “the cloud” and now putting too much faith in the cloud systems we are using? Do you assume that your data is secure and that data...
by John Ahlberg | Featured, Security, Support
I hear all too often from business leaders who think their IT Support team and their Security team are synonymous. They just assume that Support addresses all of their security needs by default. After all, the IT Support gang has been managing the anti-virus software...
by John Ahlberg | Featured, Security
One of the most common ways to breach business systems is phishing. All it takes is one employee, one email, one click and your business is at risk and your data vulnerable. Email phishing is a type of cyber-attack that has been around for many years and continues to...
by John Ahlberg | Featured, Security
On February 14, the long-anticipated Veeam Backup & Replication V12 was released! We have been trusting Veeam with our backups for more than 10 years and are one of Veeam’s top partners with more than 1,000,000 back-ups. This release is exciting to us techies...
by Patrick Giantomasso | Featured, Security, Strategy
After SMBs Identify risks in the first step of the NIST Framework, the second step defines the process to Protect your assets. We like to refer to this NIST step as making the “security sandwich.” We like this metaphor because we incorporate layers of...