Your Employees are Wasting 30% of Their Time Resetting Passwords

Research shows 30% of an organization’s time is wasted waiting for a password reset ticket to be resolved. These days, time is more limited—and more valuable—than ever.

SEC Adopts Rules Permitting E-Signature Authorization

On November 17, 2020, the Securities and Exchange Commission (SEC) voted to allow e-signatures, subject to certain prerequisites, on documents filed with the SEC via the Electronic Data Gathering, Analysis, and Retrieval system.

Are Your Users Happy with IT in a Work-From-Home Environment?

The pandemic has challenged everyone; CTOs in particular. Your users may be working from home, but their expectations haven’t changed.

Ransomware Poses an Imminent Threat to U.S. Healthcare

Tips and recommendations to inform your defense against this most troubling form of malware.

Can Your Employees Handle an Attack Every 11 Seconds?

Training end users to be vigilant against cyber-attacks is the first step towards keeping your organization secure.

Hackers Compromise Nearly 2,000 Robinhood Accounts

Nearly 2,000 users of stock trading and investment app Robinhood are the latest victims of a steady string of financially motivated cyber-attacks.

How Microsoft Intune and Conditional Access Keep Endpoints Secure

With your firm is operating in the public cloud, make sure your workforce is operating safely, smartly, and securely.

Will Contact Tracing Apps Play a Role in Reopening Your Office?

Are you considering bringing your workforce back into the office? It’s a big decision that comes with significant considerations.

Revolutionizing the MSP Industry

We’re focused on building next gen technology that redefines what it means to be an enterprise partner of the future.

Security Operations Centers are Only as Good as a Company’s Culture

Here are some ideas that demonstrate the steps we take to be effective and productive.

4 Myths About Server Management, Debunked

Here are three reasons smart IT leaders are embracing automation and offloading server management to partners.

Hacking Awareness & Alternate Data Streams (ADS)

This post highlights some of the common technology that bad actors may use against systems to orchestrate attacks.