Microsoft 365 Backup with Datto SaaS Protection

By |2023-01-11T09:55:02-06:00January 11th, 2023|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , |

Microsoft 365 is one of today’s leading email and collaboration platforms for small and midsize businesses. Outlook, Teams, SharePoint, OneDrive [...]

Comments Off on Microsoft 365 Backup with Datto SaaS Protection

Multifactor Authentication for Remote Connections

By |2022-12-06T10:55:04-06:00November 29th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , |

Last month we discussed cyber insurance and how valuable it can be for small and midsize businesses. One of the [...]

Comments Off on Multifactor Authentication for Remote Connections

Cyber Insurance: Benefits and Obstacles

By |2022-10-28T12:52:34-05:00October 28th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

Small and midsize businesses are often targets of cyber-attacks – hacking, phishing, viruses and more. While there are safeguards businesses [...]

Comments Off on Cyber Insurance: Benefits and Obstacles

What is Endpoint Detection and Response (EDR)?

By |2022-08-18T09:35:42-05:00August 18th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , |

The cybersecurity world is constantly changing, having to adapt to the latest threats. Everyone is familiar with antivirus, but did [...]

Comments Off on What is Endpoint Detection and Response (EDR)?

Phish Testing and Security Training

By |2022-08-18T09:36:19-05:00July 25th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

In 2021, cybercriminals stole $2.4 billion through business email compromise attacks, often referred to as phishing. Phishing emails can sometimes [...]

Comments Off on Phish Testing and Security Training

Multi-Factor Authentication: A Second Layer of Protection

By |2021-12-16T13:43:26-06:00December 16th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

In today’s online world, we are seeing more and more attempts to compromise business email accounts and devices. One of [...]

Comments Off on Multi-Factor Authentication: A Second Layer of Protection

Smishing – How to Deal with Text Message Scams

By |2021-12-07T15:11:36-06:00December 7th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , |

Cell phones are becoming increasingly popular targets for hackers. As we do more business and financial transactions from our phones, [...]

Comments Off on Smishing – How to Deal with Text Message Scams

Windows 11 Is Here. What’s New?

By |2021-11-24T15:42:55-06:00November 24th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , |

Microsoft recently debuted their new operating system, Windows 11, just over six years after the release of Windows 10. Built [...]

Comments Off on Windows 11 Is Here. What’s New?
Go to Top