14 10, 2023

Adding a business email account to your mobile device

2023-10-14T10:39:22-07:00

Set up email on an iPhone or Android phone using Microsoft Outlook Mobile App NOTE: If you are currently using Microsoft Outlook App on your mobile phone, you must delete the existing work email account before re-adding it to outlook. [...]

Adding a business email account to your mobile device2023-10-14T10:39:22-07:00
19 02, 2023

Preparing for SOC 2 Type 2 Compliance Certification

2023-02-19T11:03:50-08:00

SOC2 Type 2 compliance is a set of security standards for service providers that handle sensitive data such as financial information, personal identification, or protected health information. The goal of SOC2 Type 2 compliance is to ensure that service providers [...]

Preparing for SOC 2 Type 2 Compliance Certification2023-02-19T11:03:50-08:00
22 08, 2021

Components of an Incident Response Plan

2021-08-22T12:33:24-07:00

Generally speaking, while organizations will focus on how to prevent a cyber incident, they may not have a plan for what to do in the event that one occurs, or understand the high cost of recovery from a breach. Reacting properly [...]

Components of an Incident Response Plan2021-08-22T12:33:24-07:00
3 07, 2019

Office 365 Security Best Practices

2019-08-14T13:42:39-07:00

Office 365 Security Best Practices As the increasing number of organizations decide to migrate their infrastructure to the public cloud services, they overwhelmingly rely on the help of the outside vendors. The focus of most of these vendors is to [...]

Office 365 Security Best Practices2019-08-14T13:42:39-07:00
11 05, 2019

How to Prepare for Windows 7 End of Life

2019-05-16T11:41:55-07:00

Support for Windows 7 is Ending Soon Like many Windows Operating Systems before it, Windows 7 is reaching the end of its life.  After January 14, 2020 Microsoft will no longer be providing extended support for one of the best Operating Systems [...]

How to Prepare for Windows 7 End of Life2019-05-16T11:41:55-07:00
1 04, 2019

Password Strength is Key in Business and Personal Information Security

2019-04-18T12:07:33-07:00

In today's technologically driven business marketplace one of most often overlooked points of vulnerability to your business and personal information security is the strength or weakness of the passwords that you define for usage when logging into: your computer network, [...]

Password Strength is Key in Business and Personal Information Security2019-04-18T12:07:33-07:00
26 03, 2019

The High Cost of Recovery from a Security Breach

2019-04-18T12:07:17-07:00

Small to medium size businesses are what keep this country moving. Unfortunately, for many of these business owners, budgetary needs force them to make cuts that the mammoth corporations do not have to consider. These budget cuts can often result [...]

The High Cost of Recovery from a Security Breach2019-04-18T12:07:17-07:00
26 02, 2019

Be Realistic About Cross-Referrals And Your CRM

2019-02-26T14:38:22-08:00

As you build your business, you naturally explore different avenues of networking for new opportunities. One such source is the cross-referral. A powerful formula for success in lead generation outcomes and accelerating sales velocity is the proper use of cross-referrals [...]

Be Realistic About Cross-Referrals And Your CRM2019-02-26T14:38:22-08:00
26 01, 2019

The Importance Of Communication, Messaging and Collaboration In The Workplace

2019-04-18T11:33:31-07:00

With so much technology and messaging and collaboration solutions at our fingertips, it is difficult to believe that there are any communication problems in any business today. In the course of a busy workday, the importance of good communication can [...]

The Importance Of Communication, Messaging and Collaboration In The Workplace2019-04-18T11:33:31-07:00
Go to Top