Author - John LeMay

Password Management Best Practices

We are all familiar with the pain associated with managing a variety of passwords for online accounts and services in...


IT Basics – Software Updates and Patch Management

Managing software updates for your organization is an important task and a security best practice. Software updates, or patches, typically...


Endpoint Protection

IT Basics – Endpoint Security

This is the second article in our IT Basics series. This series focuses on core technology best practices that should...


IT Basics – Data Backup and Recovery

This article is part of a new series on basic IT processes that should be part of every organization’s plan....


Working remotely using laptop

Microsoft Previews Windows 365

Microsoft Previews Windows 365 Last week Microsoft provided a preview of the upcoming Windows 365, a simplified Desktop as a Service...


Endpoint Protection

Hackers Shift Aim to IT Supply Chain

Kaseya Targeted in Latest Breach Over the past several days a ransomware attack targeting Kaseya, a provider of IT management tools,...


Cybersecurity

Five Free Sources for Cybersecurity Awareness Training

Cybersecurity threats targeting small businesses are on the rise. Recent studies show that 43% of all cybersecurity attacks are targeted...


Cybersecurity

Antivirus, EPP, and EDR – What’s the difference?

Most people are familiar with antivirus software, its purpose, and why it is necessary. Fewer are familiar with newer terms...


Protecting Against Cloud Data Loss

Many business and IT leaders incorrectly assume that public cloud storage services, such as Microsoft OneDrive for Business, a component...


Improving Business Results through IT Alignment

Business and IT leaders seeking improved success rates of IT projects and initiatives should focus on business-IT alignment. Aligning IT...