Tach-WP_T

Employee Spotlight: Tach Martinez

Behind the Screens- Meet Tach Meet Tach! Tach has been a Rapid Response Technician on team CIO for about a year and a half. As an RRT member, he answers the call for help when our clients hit a snag in their work day. This typically means taking phone calls to resolve issues, but in… Read more »

Data Recovery Service Isolated Stickers, Backup and Protection, Hardware Repair. Characters in Worker Uniform Fix Broken Pc, File Folder, Crane and Litter Bin. Cartoon People Vector Illustration

SaaS Backups- Whose Job Is It Anyway?

  SaaS Backups: Whose Job Is It Anyway? The importance of backups for Microsoft 365  By Sean Gill, Director of Client Strategy IN THIS ARTICLE:  The Business Benefits of SaaS Solutions Understanding Microsoft’s Shared Responsibility Model Effectively Protecting Your Data More and more, companies are relying on Software as a Service (SaaS) applications to run… Read more »

CIO Solutions Receives SOC 2 Type II Attestation

FOR IMMEDIATE RELEASE CIO Solutions Receives SOC 2 Type II Attestation Independent Audit Verifies CIO Solutions’ Internal Controls and Processes Santa Barbara, CA – January 2023 – CIO Solutions, a leading local IT Management and Cloud solution provider, announced that it has again completed its SOC 2 Type II audit. Performed by KirkpatrickPrice, this attestation… Read more »

3d render of laptop with email notification icon for your mockup

Why Blacklisting Spam May Not Work

Why Blacklisting Spam May Not Work  From CIO Support IN THIS ARTICLE:  What does it mean to “blacklist spam”? Blacklisting spam: a losing battle Alternatives to Blacklisting Imagine this scenario: you’re sitting at your desk and an email pings. It’s an invite to a business conference from a name that looks familiar. Glancing over it,… Read more »

Print

Understanding Office 365

Understanding Office 365  By Josh Farlow, Director of Cloud Services You’ve likely heard of Microsoft 365* in some form. However, what it is and what people think it is, are often two different things. Many people still think of it in limited terms. Without understanding the full value and extent of productivity benefits this tool… Read more »

Maniver_EMPLOYEE SPOTLIGHT- WP Post- Thumbnail

Employee Spotlight: Maniver Sandhu

Behind the Screens- Meet Maniver Meet Maniver! She is one of CIO Solutions’ awesome client success managers (CSMs). She moved to the United States from India in 2008. A member of the CIO Solutions team for the past 4 years, her home base is our Fresno office. She guides her clients to success by developing… Read more »

Ignacio-EMPLOYEE SPOTLIGHT

Employee Spotlight: Ignacio Monge

Behind the Screens- Meet Ignacio Ignacio is a skilled member of our backups team. They handle the managed backup services for our clients. Ignacio says, “we’re in charge of all backup services provided to our clients. This means keeping all machines’ backups done and working fine, also detecting issues or possible problems with the client… Read more »

An old vintage obsolete computer.

Upgrade Your Tech BEFORE the End (of Life)

  Upgrade tech BEFORE the End (of Life)  By Sean Gill, vCIO  “All good things must come to an end”, wrote Chaucer in his poem, Troilus and Criseyde. Alas, who knew that this would be particularly true in the realm of technology today? Many of us have fond memories of long-lost operating systems (Windows XP… Read more »

Cahil_EMPLOYEE SPOTLIGHT- Thumbnail

Employee Spotlight: Cahil Mignault

Behind the Screens- Meet Cahil Mignault Cahil has been a part of Team CIO for just over 3 years now. Raised in the Carpinteria area, he has been living in Santa Barbara for 15 years. He is based out of our Santa Barbara office where he works as a member of CIO’s Rapid Response Team… Read more »

AdobeStock_285881213-resized

Email Safety | 5 Ways to Spot a “Phishy” Email

Email Safety | 5 Ways to Spot a “Phishy” Email Quick Tips & Best Practices We rely on email for many functions of business today. This makes it an excellent tool for bad actors to exploit. Email is one of the quickest and easiest opportunities threat actors have at their disposal. Threat actors have gotten… Read more »