Illustration of cloud computing. Devices connected to the cloud.

Business Email: M365’s Exchange Online vs. Exchange

Business Email: M365’s Exchange Online vs. Exchange Microsoft is a dominant player in the business email market. For most businesses, the question isn’t whether to use Microsoft email solutions, but rather “which one?” While Microsoft’s Exchange server solution has been the go-to option for years, the rise of cloud-based solutions has given businesses a more flexible… Read more »

Business people having teleconference meeting

Turning your Conference Rooms into Teams Rooms

Turning your Conference Rooms into Teams Rooms By Josh Farlow, Director of Cloud Services At the height of WFH, we all got used to virtual meetings. Most everyone has used Microsoft Teams video conferencing to some degree. But now that people are returning to the office more and more, there’s a disconnect between virtual meetings… Read more »

Hacker looking forward at words describing corporate data

Neglecting MFA: The Scary Reality of Your Business Risk

Neglecting MFA: The Scary Reality of Your Business Risk IT security is more important than ever. Cyber-attacks and data breaches are a daily occurrence, they just don’t all make headlines. Businesses that fail to take proactive security measures put not only themselves at risk, but their customers too. One of today’s foundational security measures is… Read more »

Data Recovery Service Isolated Stickers, Backup and Protection, Hardware Repair. Characters in Worker Uniform Fix Broken Pc, File Folder, Crane and Litter Bin. Cartoon People Vector Illustration

SaaS Backups- Whose Job Is It Anyway?

  SaaS Backups: Whose Job Is It Anyway? The importance of backups for Microsoft 365  By Sean Gill, Director of Client Strategy IN THIS ARTICLE:  The Business Benefits of SaaS Solutions Understanding Microsoft’s Shared Responsibility Model Effectively Protecting Your Data More and more, companies are relying on Software as a Service (SaaS) applications to run… Read more »

3d render of laptop with email notification icon for your mockup

Why Blacklisting Spam May Not Work

Why Blacklisting Spam May Not Work  From CIO Support IN THIS ARTICLE:  What does it mean to “blacklist spam”? Blacklisting spam: a losing battle Alternatives to Blacklisting Imagine this scenario: you’re sitting at your desk and an email pings. It’s an invite to a business conference from a name that looks familiar. Glancing over it,… Read more »

Print

Understanding Office 365

Understanding Office 365  By Josh Farlow, Director of Cloud Services You’ve likely heard of Microsoft 365* in some form. However, what it is and what people think it is, are often two different things. Many people still think of it in limited terms. Without understanding the full value and extent of productivity benefits this tool… Read more »

An old vintage obsolete computer.

Upgrade Your Tech BEFORE the End (of Life)

  Upgrade tech BEFORE the End (of Life)  By Sean Gill, vCIO  “All good things must come to an end”, wrote Chaucer in his poem, Troilus and Criseyde. Alas, who knew that this would be particularly true in the realm of technology today? Many of us have fond memories of long-lost operating systems (Windows XP… Read more »

paperclip-brain

Reframing Your Approach to IT Security Decisions

Reframing Your Approach to IT Security Decisions By Sean Gill, vCIO  The IT security landscape has continued to shift rapidly over the past couple of years. Threat actors leverage creative social engineering techniques, phishing and spoofing threats are continuously rising, zero-day vulnerabilities are exploited, and ransomware is at large. Businesses are more reliant on technology… Read more »

Business flexibility

How to ride a wave of ravenous demand for products and services

  How to ride a wave of ravenous demand for products and services By Russ Levanway, President Last year, so many of us had to cope with things we never even considered would happen. I don’t have to go into detail, of course — we all lived it. From working remotely, to COVID protocols, to… Read more »

Cybercrime Concept

Understanding The Enemy + Why Your Antivirus Isn’t Enough

  Understanding The Enemy + Why Your Antivirus Isn’t Enough By Russ Levanway You probably saw a dominant story in the news a couple of months ago about a major fuel shortage across the eastern seaboard. The pipeline that provides almost half the oil to the northeast and south came under a cyber-attack. Gas pumps… Read more »