<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">

Posted on 05.18.20 by Greg Mooney

6 Data Security Tips for State and Local Government Agencies

The sense of urgency around cybersecurity is reaching a whole new level for state and local governments.

Posted on 05.15.20 by Adam Bertram

How to Set Up Windows Defender Custom and Scheduled Scans

Windows Defender comes with Windows 10 is a great way to keep your computer protected from malware.

Posted on 05.12.20 by Greg Mooney

Podcast: IT Troubleshooting and Pivoting During the Pandemic

From data security to hardware issues, the new normal of a remote workforce has been chaos for IT teams.

Posted on 05.12.20 by Arun Vishwanath

4 Barriers Impeding Everyone's Ability to Work from Home

Most of us are now working from home, but that doesn't mean it has been easy for everyone. These are the four barriers that are impeding a remote workforce during the pandemic.

Posted on 05.05.20 by Michael O'Dwyer

Rogue Device Detection And Prevention

How do we protect ourselves from rogue devices? What are the current solutions?

Posted on 04.28.20 by Adam Bertram

How to Automate Azure Cloud Deployments with Azure ARM Templates

In this article, you’re going to learn how to create a simple Azure ARM template and deploy it into Azure using the Azure CLI.

Posted on 04.27.20 by Michael O'Dwyer

6 Ways for Financial Institutions to Avoid Wire Fraud

Wire fraud is a federal offense under U.S. law and refers to fraud committed using electronic communications, such as telephone or computer. Unfortunately for financial institutions, wire fraud is on the increase, and not just in the U.S.

Posted on 04.22.20 by Andrew Sanders

Top 7 Data Security Concerns for Lawyers

Relative to the sensitivity of the data that they protect, law firms have some of the laxest information security that you can find.

Posted on 04.21.20 by Gwen Luscombe

4 Ways Colleges and Universities Are Failing at Cybersecurity

Bursting with personal information and financial details for students and employees, as well as valuable research information that could result in financial loss if stolen, Universities are seen as having lax systems and an abundance of reward.

Posted on 04.21.20 by Neal O'Farrell

How a Pandemic Started a Trend Called Zoombombing

Zoom has seen hyper-growth during what IT teams are calling the "new normal." But that fame comes with a cost--the attention of hackers and security pros.

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.