top of page
Search
![](https://static.wixstatic.com/media/6ad151_74452d44c4ca4cec98d0e80be806c326~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_74452d44c4ca4cec98d0e80be806c326~mv2.webp)
![Challenges in Securing the Human Operating System](https://static.wixstatic.com/media/6ad151_74452d44c4ca4cec98d0e80be806c326~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_74452d44c4ca4cec98d0e80be806c326~mv2.webp)
Oct 15, 20203 min read
Challenges in Securing the Human Operating System
No matter how much focus and attention your organization puts into security solutions including anti virus, firewalls, and email filters,...
![](https://i.ytimg.com/vi/hHMxA9ZZ_gQ/sddefault.jpg)
![Is a Hardware as a Service (HAAS) Model the Right Choice for my Organization?](https://i.ytimg.com/vi/hHMxA9ZZ_gQ/sddefault.jpg)
Sep 11, 20202 min read
Is a Hardware as a Service (HAAS) Model the Right Choice for my Organization?
The idea of a Hardware as a Service (HAAS) model has been gaining traction with organizations in recent years. As Software as a Service...
![How Technology Debt Leads to Larger Expenses Down the Road?](https://static.wixstatic.com/media/6ad151_a657cef78a3b447da95eb60530864541~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/6ad151_a657cef78a3b447da95eb60530864541~mv2.webp)
Sep 3, 20203 min read
How Technology Debt Leads to Larger Expenses Down the Road?
During times of economic uncertainty, organization's naturally have to take a look at expenses and make choices on where to make...
![](https://static.wixstatic.com/media/6ad151_a03e8cab0e584fcea97f62d6aa6c2c93~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_a03e8cab0e584fcea97f62d6aa6c2c93~mv2.webp)
![Is Detection the Future of Cybersecurity Planning](https://static.wixstatic.com/media/6ad151_a03e8cab0e584fcea97f62d6aa6c2c93~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_a03e8cab0e584fcea97f62d6aa6c2c93~mv2.webp)
Apr 26, 20203 min read
Is Detection the Future of Cybersecurity Planning
Cybersecurity is top of mind for many organizations of all sizes and industries. Given the current risk climate, organizations are...
![](https://static.wixstatic.com/media/6ad151_a54454ceb2914c70b9e2ef5bdb2c0a8a~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_a54454ceb2914c70b9e2ef5bdb2c0a8a~mv2.webp)
![Is a Distributed Workforce Here to Stay?](https://static.wixstatic.com/media/6ad151_a54454ceb2914c70b9e2ef5bdb2c0a8a~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_a54454ceb2914c70b9e2ef5bdb2c0a8a~mv2.webp)
Apr 15, 20203 min read
Is a Distributed Workforce Here to Stay?
Covid-19 has caused swift changes in the way organizations get work done. It leads us to question what adaptations will be here to stay....
![Securing Our House: How Phishing Testing is Decreasing our Chances of Being a Victim of Cyber Crime](https://static.wixstatic.com/media/6ad151_c390387beaf14120ade48761c95b3692~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/6ad151_c390387beaf14120ade48761c95b3692~mv2.webp)
Apr 15, 20202 min read
Securing Our House: How Phishing Testing is Decreasing our Chances of Being a Victim of Cyber Crime
Phishing Testing for 3 Months Has Taken Our Phishing Prone Percentage from 14.3% to 4.5% Due to the ever-growing cybersecurity concerns...
![Teams vs. Zoom? Which collaboration tool is right for my Organization?](https://static.wixstatic.com/media/6ad151_9bb983162a5d4e6786306757cd3f6e48~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/6ad151_9bb983162a5d4e6786306757cd3f6e48~mv2.webp)
Apr 15, 20203 min read
Teams vs. Zoom? Which collaboration tool is right for my Organization?
We have compiled some of the strengths and weaknesses of both platforms to help inform your decision in which choice is the right choice for
![](https://static.wixstatic.com/media/6ad151_8644783c9a014db995c5d6bb2ad8861d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_8644783c9a014db995c5d6bb2ad8861d~mv2.webp)
![Tips for Securely Using Videoconferencing Tools](https://static.wixstatic.com/media/6ad151_8644783c9a014db995c5d6bb2ad8861d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_8644783c9a014db995c5d6bb2ad8861d~mv2.webp)
Apr 15, 20203 min read
Tips for Securely Using Videoconferencing Tools
When videoconferencing it is important to make sure you are set up in a secure manner to be sure that you are not sharing out any confident
![](https://static.wixstatic.com/media/6ad151_cb6470d6ce4c41939722f1dceff33255~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_cb6470d6ce4c41939722f1dceff33255~mv2.webp)
![Adapting to a Remote Workforce](https://static.wixstatic.com/media/6ad151_cb6470d6ce4c41939722f1dceff33255~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_cb6470d6ce4c41939722f1dceff33255~mv2.webp)
Apr 15, 20202 min read
Adapting to a Remote Workforce
Due to ever changing regulations throughout the country in response to the pandemic Covid-19, many businesses are having to quickly adapt to
![](https://static.wixstatic.com/media/6ad151_d385bb656f6844c291520be1acf10564~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_d385bb656f6844c291520be1acf10564~mv2.webp)
![Workforce Going Remote?](https://static.wixstatic.com/media/6ad151_d385bb656f6844c291520be1acf10564~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_d385bb656f6844c291520be1acf10564~mv2.webp)
Apr 15, 20201 min read
Workforce Going Remote?
Use a single, easy-to-use platform and stay connected with persistent chats, conversations and virtual meetings. Keep your colleagues...
![](https://static.wixstatic.com/media/6ad151_3d47fefe372540f2b69381ef040b2e75~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_3d47fefe372540f2b69381ef040b2e75~mv2.webp)
![Not using MFA results in 99.9% of hacked Office 365 accounts](https://static.wixstatic.com/media/6ad151_3d47fefe372540f2b69381ef040b2e75~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_3d47fefe372540f2b69381ef040b2e75~mv2.webp)
Apr 15, 20201 min read
Not using MFA results in 99.9% of hacked Office 365 accounts
In late February 2020, Alex Weinert, Microsoft's Director of Identity Security, delivered a presentation a the RSA 2020 security...
![Office 365 Tip - Sending an Email to an Entire Channel in Teams](https://static.wixstatic.com/media/6ad151_c6af583f9cf74738b9561639487c34c3~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/6ad151_c6af583f9cf74738b9561639487c34c3~mv2.webp)
Apr 15, 20201 min read
Office 365 Tip - Sending an Email to an Entire Channel in Teams
Today's Office 365 tip shows how to use Teams channels to get in contact with a specific group via email. If you want to send an email to...
![](https://static.wixstatic.com/media/6ad151_e92b1ace0ad74d209e8b082e717dc06f~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_e92b1ace0ad74d209e8b082e717dc06f~mv2.webp)
![Small Businesses are an Ideal Target for Hackers](https://static.wixstatic.com/media/6ad151_e92b1ace0ad74d209e8b082e717dc06f~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_e92b1ace0ad74d209e8b082e717dc06f~mv2.webp)
Apr 15, 20202 min read
Small Businesses are an Ideal Target for Hackers
Cybercrime has quickly become today's fastest-growing form of criminal activity. In fact, it is projected to cost businesses $5.2...
![](https://static.wixstatic.com/media/6ad151_c80d9a6a3ac94004affd2ea1606a2022~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_c80d9a6a3ac94004affd2ea1606a2022~mv2.webp)
![You Should Be Phishing Your Users](https://static.wixstatic.com/media/6ad151_c80d9a6a3ac94004affd2ea1606a2022~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_c80d9a6a3ac94004affd2ea1606a2022~mv2.webp)
Apr 15, 20202 min read
You Should Be Phishing Your Users
As phishing continues to be a top threat to your business' cybersecurity, it is important to employ creative strategies to prepare &...
![](https://static.wixstatic.com/media/6ad151_7e3103de86204561b61fae06ad89f214~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_7e3103de86204561b61fae06ad89f214~mv2.webp)
![2 Factor Authentication: What is it and Why Does My Business Need It?](https://static.wixstatic.com/media/6ad151_7e3103de86204561b61fae06ad89f214~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_7e3103de86204561b61fae06ad89f214~mv2.webp)
Apr 15, 20202 min read
2 Factor Authentication: What is it and Why Does My Business Need It?
Security breaches are becoming a growing issue for businesses of all sizes. It is a good time to consider how you secure your online...
![](https://static.wixstatic.com/media/6ad151_472d6fb00e2144c2bf5aeb722fd9cc68~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_472d6fb00e2144c2bf5aeb722fd9cc68~mv2.webp)
![5 Indicators that an Email Might be a Phishing Attempt](https://static.wixstatic.com/media/6ad151_472d6fb00e2144c2bf5aeb722fd9cc68~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_472d6fb00e2144c2bf5aeb722fd9cc68~mv2.webp)
Apr 15, 20203 min read
5 Indicators that an Email Might be a Phishing Attempt
As Phishing continues to be a large concern for businesses both large and small. We have compiled a list of 5 indicators that an email...
![](https://static.wixstatic.com/media/6ad151_5ad15b33342148859ee23bf9798aae75~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_5ad15b33342148859ee23bf9798aae75~mv2.webp)
![Phishing - What is It and Why is it a Potential Threat to Your Business?](https://static.wixstatic.com/media/6ad151_5ad15b33342148859ee23bf9798aae75~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_5ad15b33342148859ee23bf9798aae75~mv2.webp)
Apr 15, 20202 min read
Phishing - What is It and Why is it a Potential Threat to Your Business?
What is Phishing? Phishing is an attempt, by criminals who pose as a legitimate source, to lure individuals into providing sensitive...
![December 2019 - What's New in Microsoft 365](https://static.wixstatic.com/media/6ad151_1618938a65734bfd878fe1b01bfd615e~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/6ad151_1618938a65734bfd878fe1b01bfd615e~mv2.webp)
Apr 15, 20201 min read
December 2019 - What's New in Microsoft 365
This month's recap of Microsoft 365 updates focuses on collaboration and design. To begin there is a breakdown of Microsoft's Fluid...
![](https://static.wixstatic.com/media/6ad151_a707cadc49fd4a8fb3c8b92a8324fa0b~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/6ad151_a707cadc49fd4a8fb3c8b92a8324fa0b~mv2.webp)
![Phishing by Industry - 2019 Benchmarking Report from our Partners at KnowBe4](https://static.wixstatic.com/media/6ad151_a707cadc49fd4a8fb3c8b92a8324fa0b~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/6ad151_a707cadc49fd4a8fb3c8b92a8324fa0b~mv2.webp)
Apr 15, 20204 min read
Phishing by Industry - 2019 Benchmarking Report from our Partners at KnowBe4
ACCORDING TO VERIZON'S 2019 DATA BREACH INVESTIGATION REPORT, PHISHING WAS THE #1 THREAT ACTION USED IN SUCCESSFUL BREACHES LINKED TO...
![Office 365 Tip: Create an Any Year Calendar in Excel](https://static.wixstatic.com/media/6ad151_7134f014e5ad4573bf03d5ddeae04ed5~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/6ad151_7134f014e5ad4573bf03d5ddeae04ed5~mv2.webp)
Apr 15, 20201 min read
Office 365 Tip: Create an Any Year Calendar in Excel
Looking to create a custom calendar? You can use templates in Microsoft Word to create a calendar for any year you desire. The video...
bottom of page