Are You Prepared? Your 9 Step Local Business Disaster Recovery Plan

Are You Prepared? Your 9 Step Local Business Disaster Recovery Plan

Are you prepared for disaster to strike your business, whether natural or manmade? Many businesses aren’t. They either have no business disaster recovery plan, or the one they have is wholly insufficient. Is this really a big deal for your local business? Yes, it is. Forbes reports FEMA statistics that over 40% of businesses affected by a…

LabCorp Data Breach: What We Know

LabCorp Data Breach: What We Know

Are You One Of Many Affected By The LabCorp Data Breach? Financial & Personal Information of 7.7 Million Exposed Just yesterday we wrote about the Quest Diagnostics’ breach affecting nearly 12 million. Today we’re writing to tell you about a LabCorp breach affecting 7.7 million people. Both of these breaches were caused by a third-party;…

Quest Diagnostics Breach: Latest News

Quest Diagnostics Breach: Latest News

Are You One Of Many Affected By The Quest Diagnostics Breach? Financial & Medical Information of 12 Million Exposed Quest Diagnostics reports that almost 12 million people could have been affected by a data breach. On Monday, June 3, 2019, Quest Diagnostics said that American Medical Collection Agency (AMCA), a billing collections provider they work with,…

How Multi-Factor Authentication Removes Bad Actors

How Multi-Factor Authentication Removes Bad Actors

Multi-factor authentication is a polarizing topic in business and technical channels. While business users are often quite fussy when asked to establish a secondary method of accessing their secure accounts and data, technology professionals realize that this bare-minimum authentication may be all that stands between business systems and some very bad actors. Reconciling the technical…

5 Ways Managed IT Services Is the Right Choice for Your Business

5 Ways Managed IT Services Is the Right Choice for Your Business

Choosing a managed IT services firm to handle your business’s IT is the right choice for many businesses. Here are our top 5 reasons why. 1. Focus on Your Business’s Core Competencies Here’s the bottom line: unless you are a managed IT services firm, your core competency isn’t IT services. It’s something else. Every resource you devote…

Pick the Perfect Meeting Location Using Outlook Mobile

Pick the Perfect Meeting Location Using Outlook Mobile

  Microsoft’s Office suite makes it easy to schedule meetings, reserving the right room and inviting all the right people. Many people think they can only use these powerful features from their office computer, because Exchange calendar integration in iOS doesn’t support these features. In reality, mobile users can still access these powerful scheduling features…

5 Crucial Elements to Training Your Employees in Optimal Cyber Security

5 Crucial Elements to Training Your Employees in Optimal Cyber Security

Cyber attackers are highly motivated to obtain or corrupt your company’s data. But whether their motivation is to steal your funds outright, hold your data for ransom, practice espionage, or simply disrupt your business, most hackers cannot access your network without an “in.” In other words, they require a login, personal access codes, or network…

Small Business Guide to Protecting Critical Data

Small Business Guide to Protecting Critical Data

Small businesses technology and business leaders may feel as though their data is safe, but nothing could be further from the truth. According to SmallBizTrends.com, nearly 43% of phishing campaigns are targeted specifically at small businesses, a dramatic increase from 18% in 2011. Unfortunately, a 2017 report from Keeper Security also shows that the greatest cybersecurity threat…