By: Paul Facey, Managed Services/Advanced IT Technician
It’s that time of year where many of us are working on building new habits, getting organized, and starting the New Year off on the right foot. If you are looking to clear out…
Read more
By: Jerry Horton, IT Director
“You can’t defend. You can’t prevent. The only thing you can do is detect and respond.” -Bruce Schneier
By: Eric Torres, Datto expert
Business downtime is much more common than you may think. Every business faces the risk of business interruption every day, from an employee clicking on something that they…
By: Jerry Horton, Technology Director
Earlier this month, an estimated 2,000 people who use the popular Robinhood stock-trading app had their accounts hacked and looted. Hackers infiltrated trading information,…
Part One of a three-part series on Best Practices for Keeping Company Data Secure “One of the main cyber-risks is to think they don’t exist. The other is to try to treat…
So you clicked on a malicious link, now what? Find out in this replay from our September 2020 webinar featuring Todd Sizer, a world-famous security solution strategist. …
By: Paul Facey, Advanced IT Technician
Remote work became a necessity for many businesses this year due to the COVID-19 pandemic. With much of the workforce using their own devices to do their work, many employers have…
By: Jake Schulte, Networks Plus IT Manager
Because Information Technology (IT) is always evolving, hardware manufacturers and software developers are always coming out with something new to replace what exists today.…
By: Nathan Brown, Managed Services Lead/Advanced IT Technician
Web browsers are the gateway to the internet. You are likely familiar with the most popular browsers, but you may not know their differences. Let’s take a look at the pros and…
By: Adam Boyle, Business Account Consultant
Data is both the lifeblood of 99% of businesses today, and a valuable commodity for cyber security attackers. Phishing and password attacks aren’t the only way hackers try to get…