
Afraid of New Technology?
It might be commendable to fix and patch your lawn mower, your snow blower, or even your car until it finally gives out. It’s a different story, however, when you’re talking about the technology that runs your business and one reason why business leaders insist on stalling new technology investments…

3 Cyber Insurance Myths Busted
You didn’t used to need cyber insurance, but now you do if you want to make sure that your cybersecurity strategy does what it’s supposed to do. The goal of cybersecurity isn’t just to prevent cyber attacks. It’s to give you the ability to bounce back if and when you have an intrusion. No one…

Take Your Phone Communications from Clumsy to Coordinated with Microsoft Business Voice
Think back to what your organization looked like prior to the COVID-19 exodus to remote work. Now consider what it looks like today. Chances are good that you found out that your technology setup was integral to your ability to pivot to changing circumstances. Some companies found out that the most difficult…

Questions Answered About Cyber Insurance and Cybersecurity Strategy
We recently hosted a webinar for our clients to help them become better informed buyers of cyber insurance. The positive response that we received from clients confirmed for us that managing cyber risk is an increasing concern for business leaders. In fact, some of our clients opened up participation…

The CISA Says Stop These Bad Cybersecurity Practices Right Now
The Cybersecurity and Infrastructure Security Agency (CISA) has started a “Bad Practices” list and they’re beginning the list with two things that you need to stop doing right now. Stop using unsupported software and stop using weak passwords on accounts. Why should you listen to the CISA if your…

Can I Outsource Managed IT Services and Keep My IT Staff?
If you’re holding back on outsourcing Managed IT Services because you really don’t want to let go of your internal IT staff, there’s a solution that you may not have considered – use both. Having both outsourced and internal IT can bring you benefits that you can’t get when you go with one…
