Multi-Factor Authentication: A Second Layer of Protection

By |2021-12-16T13:43:26-06:00December 16th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

In today’s online world, we are seeing more and more attempts to compromise business email accounts and devices. One of [...]

Comments Off on Multi-Factor Authentication: A Second Layer of Protection

Smishing – How to Deal with Text Message Scams

By |2021-12-07T15:11:36-06:00December 7th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , |

Cell phones are becoming increasingly popular targets for hackers. As we do more business and financial transactions from our phones, [...]

Comments Off on Smishing – How to Deal with Text Message Scams

Ransomware – A Threat to Every Business

By |2021-06-16T15:48:05-05:00June 16th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , , , |

Ransomware has been in the news a lot these last few weeks. Victims of ransomware have their systems hacked and [...]

Comments Off on Ransomware – A Threat to Every Business

On-Premises Microsoft Exchange Vulnerability – Another Reason to Switch to Office 365

By |2021-03-09T17:51:01-06:00March 9th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

On March 3, 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) issued an Emergency Directive regarding vulnerabilities in on-premises [...]

Comments Off on On-Premises Microsoft Exchange Vulnerability – Another Reason to Switch to Office 365