Microsoft Copilot: AI Assistance in Office

By |2024-01-31T15:52:19-06:00January 31st, 2024|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , |

In 2023, Microsoft introduced Copilot, an AI assistant for Microsoft Office and other Microsoft products. Originally, this was only available [...]

Comments Off on Microsoft Copilot: AI Assistance in Office

Detecting Phishing: The SLAM Method

By |2023-12-29T15:32:24-06:00December 29th, 2023|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , |

Business email compromise scams, commonly called “phishing,” are one of the biggest threats to businesses today. Over 90% of data [...]

Comments Off on Detecting Phishing: The SLAM Method

Cloud vs On-Premises: What’s Better?

By |2023-06-30T15:34:30-05:00June 30th, 2023|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , , |

In the world of software, there are two options for hosting an application: in the cloud or on-premises (on-prem). Cloud [...]

Comments Off on Cloud vs On-Premises: What’s Better?

Windows 8 and Server 2012 End of Life

By |2023-05-30T11:51:29-05:00May 30th, 2023|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , |

Windows operating systems have a lifecycle of planned updates and eventual obsolescence – the final step of this lifecycle is [...]

Comments Off on Windows 8 and Server 2012 End of Life

Multifactor Authentication for Remote Connections

By |2022-12-06T10:55:04-06:00November 29th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , |

Last month we discussed cyber insurance and how valuable it can be for small and midsize businesses. One of the [...]

Comments Off on Multifactor Authentication for Remote Connections

Cyber Insurance: Benefits and Obstacles

By |2022-10-28T12:52:34-05:00October 28th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

Small and midsize businesses are often targets of cyber-attacks – hacking, phishing, viruses and more. While there are safeguards businesses [...]

Comments Off on Cyber Insurance: Benefits and Obstacles

What is Endpoint Detection and Response (EDR)?

By |2022-08-18T09:35:42-05:00August 18th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , |

The cybersecurity world is constantly changing, having to adapt to the latest threats. Everyone is familiar with antivirus, but did [...]

Comments Off on What is Endpoint Detection and Response (EDR)?

Phish Testing and Security Training

By |2022-08-18T09:36:19-05:00July 25th, 2022|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

In 2021, cybercriminals stole $2.4 billion through business email compromise attacks, often referred to as phishing. Phishing emails can sometimes [...]

Comments Off on Phish Testing and Security Training
Go to Top