Are cloud services secure?

By John Merrey

Cloud services can be a great solution. You can get storage and software without worrying about constant upgrading and replacing local software and even hardware. But with any cloud services, security is always a concern.

Read More

NAS vs cloud

By Brandon Jackson

In years past, data storage for many organizations was done through local servers. In the last couple of decades, a couple different options have become widespread: Network Attached Storage—NAS— and the cloud.

Read More

Login without password

By Brandon Jackson

When it comes to cybersecurity, passwords are inherently part of the problem. Whether yours are complex and easy to forget, short and easy for hackers to guess, or you write them down on a piece of paper that you end up losing, they cause a lot of issues.

Read More

More tips to avoid phishing attacks

By John Merrey

Phishing attacks have been on the rise for many years now. Just as technology adapts to the attacks, the attackers continue to adapt to the technology, trying newer and more effective phishing methods on a regular basis.

Read More
Woman questioning security

Are password managers really secure?

By Brandon Jackson

For years now we’ve advised clients to use a password manager. It’s a much better option than scribbling your passwords down on tiny pieces of paper or even storing them in your web browser. Simply put, a password manager makes it easy to remember your secure passwords. You can even share passwords with other people on your team. But are password managers really secure? Only if you pick the right option.

Read More

What Office 365 includes

By John Merrey

If you’ve thought about moving to Office 365, you may have found yourself asking what exactly was included with your investment. There are different levels of Office 365, depending on which version you purchase. Let’s take a look at the different versions.

Read More

Should I use a password or fingerprint?

By John Merrey

With all the data today’s computers and phones have on them, they need to be properly secured. After all, you’re walking around with a device that can access your social media, email, and even bank accounts. Do you really want to risk someone stealing your identity because your phone wasn’t properly secured? So which one should you use, a password or your fingerprint?

Read More

Ransomware: Pay or not?

By Brandon Jackson

We’ve talked about how ransomware works previously. It should be a concern for all small and medium-sized business owners. But what if you’ve already been infected? Should you just pay the ransomware demands or not?

Read More

Cloud vs on premise

By John Merrey

Traditionally, businesses kept data on premise where the work was actually being done. It sat on a data server somewhere, even if the server was simply a repurposed desktop computer. But with the cloud as an option, how do you determine whether you should move your data there or keep it local?

Read More

How cybersecurity has changed

By Brandon Jackson

Over the course of my career, technology has changed drastically. As a result, the measures we have to take to keep things secure has changed as well.

Read More