Blog

MOST POPULAR

Warning: Your Employees Have Your Sensitive Data in Their Cloud

Our last blog post alerted you to the dangers of combining employees who take technology for granted with a weak (or non-existent) BYOD policy. However, that’s not the only risk a tech-savvy workforce can pose to your data. A survey by cybersecurity vendor CipherCloud found that a jaw dropping 86 percent of cloud applications being used in the enterprise, from…

How to Harness the Power of Cloud Services for Cybersecurity Conscious Organizations

According to a recent study by Verizon, from survey to survey, the trend is clear – the cloud is now mainstream. Verizon research found that 65% of enterprises surveyed are using cloud services, and they are increasingly trusting more complex and mission-critical workloads to it. They also found that 72% expect to put more than half their workloads in the…

2 Digital Trends to Keep in Mind in 2021

Read time: 90 seconds
By keeping abreast of current trends, business professionals can find out about threats and opportunities that might lie ahead. This information can help them chart the best course forward for their companies.  Here are two digital trends business professionals should keep in mind when they establish their digital strategies and business plans for 2021:  1. The Coronavirus Pandemic Is Changing Customers’…

Cybersecurity for the New Normal

Read time: 30 seconds
It seems likely that some of the changes COVID-19 forced on us have been popular enough to become business as usual – especially a shift toward long-term and even permanent work-from-home policies. But if your organization doesn’t plan to return to the office for many months to come (or at all), you’ve got cybersecurity challenges you didn’t have in pre-pandemic times. And that means…

Seven Steps to Building a Cybersecurity Strategy

If it seems like we’re spending a lot of time talking about cybersecurity lately, you’re not imagining things. Between the need to secure systems so employees can work effectively from home and a massive uptick in cyberattacks, security is at the top of everyone’s agenda, including our own. This step-by-step checklist for building an effective cybersecurity strategy is written for CIOs, but we think it’s useful…

Today is Data Privacy Day

Read time: 20 seconds
Data Privacy Day is Jan. 28, just like it is every year. But as with everything else, COVID-19 has forced us to reconsider a new normal for enforcing data privacy in the work-from-home (WFH) environment. Sponsored by the National Cyber Security Alliance (NCSA), Data Privacy Day is designed to “inspire dialogue and empower individuals and companies to take action” on…

​Share with Care: Manage Privacy Settings

Share with care, what you post can last a lifetime. Update the privacy settings on at least one of your online accounts this Data Privacy Day, January 28.  Want to view your privacy/security settings, but don’t know where to find them? Click here for direct links to update your privacy settings on popular devices and online services.  

Six Steps to Protecting Sensitive Data in the Cloud

Read time: 45 seconds
You understand the importance of protecting sensitive and proprietary data. You’re careful to choose cloud vendors with strong security controls. But is your own use of cloud services giving bad actors an opening to breach your protections?   It sure is. At least according to Gartner, which projects that through 2025, 90% of the organizations that neglect to control their use of public cloud will share sensitive…

Health Care Warning: Beware of Pandemic Phishing Attempts

Read time: 30 seconds
Hospitals and other health care organizations need to tighten up their email security protocols and boost their anti-phishing training to fend off growing cyberattacks that use requests for COVID-19 data to try to penetrate IT systems.  CEOs at several Massachusetts hospitals recently received requests for COVID-19 statistics in emails that appeared to come from US Department of Health and Human Services. However, the emails included external links that…

Preparing for Post-Pandemic IT Needs

Read time: 45 seconds
Now that vaccines are becoming available for COVID-19, there’s a light, however distant at the end of the tunnel. Smart business leaders are already starting to think about how to use technology better now to prepare themselves for the post-pandemic future. These five strategies will help you get a head start:  Leverage automation, AI, and cloud services to take more flexible approaches to work and make your organization…

IT Cost Savings in a Pandemic? Yes!

Read time: 45 seconds
When you sat down last year to draw up your 2020 budget, we’re pretty sure you didn’t envision having to cope with the exigencies of a global pandemic. We’re also pretty sure that your business continuity planning didn’t cover months of disruption with no end in sight. So if you’re staggering under financial and operational burdens, trust us, you’re not alone.   We’ve been spending a lot of time coming up…

Remote Teamwork Tips

Read time: 30 seconds
Even though many of us have been working remotely full-time for the better part of a year, it’s been a massive adjustment, and one that’s required a lot of tweaking along the way. Plenty of companies are still looking for ways to make working from home work better. If you haven’t quite achieved the same sense of teamwork you had…

And the Top IT Priority for 2020 Was…

Read time: 30 seconds
Nobody could have predicted in January that we’d spend most of the rest of the year working from home. By June, though, IT leaders had embraced reality and rethought their operational and spending priorities. Out went upgrading on-premises infrastructure, hardware refreshes, and hiring. In came improving cybersecurity and enabling remote work.  We weren’t surprised to hear that the place most IT leaders opted to focus…

Top 10 Keyboard Shortcuts for Microsoft Business Apps

Read time: 20 seconds
Microsoft apps such as Word, Outlook, Excel, Edge, and PowerPoint are commonly found in the workplace. To save time when using these business apps, employees can take advantage of keyboard shortcuts. However, a keyboard shortcut will only save them time if it automates an action they perform often. Plus, they need to remember what keys to press. Click here to…

This Microsoft Office Feature is a Time-Saver

If you work with a lot of information, there are times when you need to copy information from one file to another. Microsoft Office is a suite of productivity tools that help you perform tasks like creating documents, entering data into spreadsheets, or designing databases. Sometimes you find it necessary to copy and paste material from one tool to another.…

Gain a Competitive Edge with Advanced Security Solutions from Microsoft

Read time: 45 seconds
When The Walsh Group—a construction contractor—moved to the cloud, it realized it needed better ways to manage who accesses its systems. The company set up identity as the control plane—with Microsoft Azure Active Directory at the center and a zero-trust security stance to better protect access to all its resources. Now, The Walsh Group CIO says the company leads the industry…

Four Key Areas of Intelligent Security with Microsoft

Read time: 30 seconds
Need intelligent security solutions to protect your entire company? Look no further than Microsoft Advanced Threat Protection, Azure Security, and Azure Sentinel. To learn more about Microsoft’s four key areas of intelligent security, click here to check out our infographic and contact us with any questions.   

Blog

MOST POPULAR

Best Practices for Browser Privacy

The only true way to keep business, advertisers, and cyber criminals from monitoring and profiling your online activity in uncomfortable detail is not to go online at all. But since that’s not a reasonable option for most of us, your next best choice is to make it harder for cookies, trackers, beacons, and other technologies to follow you around the…

4 Useful Features That Are New in Microsoft Edge

Read time: 45 seconds
Microsoft began a phased rollout of the newest version of its Chromium-based web browser on January 21, 2021. Version 88 of Microsoft Edge offers many enhancements, including four new features that will likely prove useful no matter whether you are using the browser at work or at home. After your Edge browser is updated (it might a take several weeks…

2 Digital Trends to Keep in Mind in 2021

Read time: 90 seconds
By keeping abreast of current trends, business professionals can find out about threats and opportunities that might lie ahead. This information can help them chart the best course forward for their companies.  Here are two digital trends business professionals should keep in mind when they establish their digital strategies and business plans for 2021:  1. The Coronavirus Pandemic Is Changing Customers’…

Cybersecurity for the New Normal

Read time: 30 seconds
It seems likely that some of the changes COVID-19 forced on us have been popular enough to become business as usual – especially a shift toward long-term and even permanent work-from-home policies. But if your organization doesn’t plan to return to the office for many months to come (or at all), you’ve got cybersecurity challenges you didn’t have in pre-pandemic times. And that means…

Strategic, Reliable, and Secure. Learn more about our services.

Seven Steps to Building a Cybersecurity Strategy

If it seems like we’re spending a lot of time talking about cybersecurity lately, you’re not imagining things. Between the need to secure systems so employees can work effectively from home and a massive uptick in cyberattacks, security is at the top of everyone’s agenda, including our own. This step-by-step checklist for building an effective cybersecurity strategy is written for CIOs, but we think it’s useful…

Today is Data Privacy Day

Read time: 20 seconds
Data Privacy Day is Jan. 28, just like it is every year. But as with everything else, COVID-19 has forced us to reconsider a new normal for enforcing data privacy in the work-from-home (WFH) environment. Sponsored by the National Cyber Security Alliance (NCSA), Data Privacy Day is designed to “inspire dialogue and empower individuals and companies to take action” on…

​Share with Care: Manage Privacy Settings

Share with care, what you post can last a lifetime. Update the privacy settings on at least one of your online accounts this Data Privacy Day, January 28.  Want to view your privacy/security settings, but don’t know where to find them? Click here for direct links to update your privacy settings on popular devices and online services.  

Six Steps to Protecting Sensitive Data in the Cloud

Read time: 45 seconds
You understand the importance of protecting sensitive and proprietary data. You’re careful to choose cloud vendors with strong security controls. But is your own use of cloud services giving bad actors an opening to breach your protections?   It sure is. At least according to Gartner, which projects that through 2025, 90% of the organizations that neglect to control their use of public cloud will share sensitive…

Health Care Warning: Beware of Pandemic Phishing Attempts

Read time: 30 seconds
Hospitals and other health care organizations need to tighten up their email security protocols and boost their anti-phishing training to fend off growing cyberattacks that use requests for COVID-19 data to try to penetrate IT systems.  CEOs at several Massachusetts hospitals recently received requests for COVID-19 statistics in emails that appeared to come from US Department of Health and Human Services. However, the emails included external links that…

Preparing for Post-Pandemic IT Needs

Read time: 45 seconds
Now that vaccines are becoming available for COVID-19, there’s a light, however distant at the end of the tunnel. Smart business leaders are already starting to think about how to use technology better now to prepare themselves for the post-pandemic future. These five strategies will help you get a head start:  Leverage automation, AI, and cloud services to take more flexible approaches to work and make your organization…

IT Cost Savings in a Pandemic? Yes!

Read time: 45 seconds
When you sat down last year to draw up your 2020 budget, we’re pretty sure you didn’t envision having to cope with the exigencies of a global pandemic. We’re also pretty sure that your business continuity planning didn’t cover months of disruption with no end in sight. So if you’re staggering under financial and operational burdens, trust us, you’re not alone.   We’ve been spending a lot of time coming up…

Remote Teamwork Tips

Read time: 30 seconds
Even though many of us have been working remotely full-time for the better part of a year, it’s been a massive adjustment, and one that’s required a lot of tweaking along the way. Plenty of companies are still looking for ways to make working from home work better. If you haven’t quite achieved the same sense of teamwork you had…

And the Top IT Priority for 2020 Was…

Read time: 30 seconds
Nobody could have predicted in January that we’d spend most of the rest of the year working from home. By June, though, IT leaders had embraced reality and rethought their operational and spending priorities. Out went upgrading on-premises infrastructure, hardware refreshes, and hiring. In came improving cybersecurity and enabling remote work.  We weren’t surprised to hear that the place most IT leaders opted to focus…

Top 10 Keyboard Shortcuts for Microsoft Business Apps

Read time: 20 seconds
Microsoft apps such as Word, Outlook, Excel, Edge, and PowerPoint are commonly found in the workplace. To save time when using these business apps, employees can take advantage of keyboard shortcuts. However, a keyboard shortcut will only save them time if it automates an action they perform often. Plus, they need to remember what keys to press. Click here to…

This Microsoft Office Feature is a Time-Saver

If you work with a lot of information, there are times when you need to copy information from one file to another. Microsoft Office is a suite of productivity tools that help you perform tasks like creating documents, entering data into spreadsheets, or designing databases. Sometimes you find it necessary to copy and paste material from one tool to another.…

Gain a Competitive Edge with Advanced Security Solutions from Microsoft

Read time: 45 seconds
When The Walsh Group—a construction contractor—moved to the cloud, it realized it needed better ways to manage who accesses its systems. The company set up identity as the control plane—with Microsoft Azure Active Directory at the center and a zero-trust security stance to better protect access to all its resources. Now, The Walsh Group CIO says the company leads the industry…

Four Key Areas of Intelligent Security with Microsoft

Read time: 30 seconds
Need intelligent security solutions to protect your entire company? Look no further than Microsoft Advanced Threat Protection, Azure Security, and Azure Sentinel. To learn more about Microsoft’s four key areas of intelligent security, click here to check out our infographic and contact us with any questions.   
Menu