Author - John LeMay

Image depicting cybersecurity as a padlock and text

Cybersecurity Awareness Month

Introduction Since 2004, October has been recognized as Cybersecurity Awareness Month. This annual event aims to raise awareness about the ever-growing...


Working using laptop

The Importance of Robust Technology Support for Small Businesses

Introduction In today's fast-paced and highly competitive business landscape, technology plays a pivotal role in the success of small businesses. A...


Password Management Best Practices

We are all familiar with the pain associated with managing a variety of passwords for online accounts and services in...


IT Basics – Software Updates and Patch Management

Managing software updates for your organization is an important task and a security best practice. Software updates, or patches, typically...


Endpoint Protection

IT Basics – Endpoint Security

This is the second article in our IT Basics series. This series focuses on core technology best practices that should...


IT Basics – Data Backup and Recovery

This article is part of a new series on basic IT processes that should be part of every organization’s plan....


Working using laptop

Microsoft Previews Windows 365

Microsoft Previews Windows 365 Last week Microsoft provided a preview of the upcoming Windows 365, a simplified Desktop as a Service...


Endpoint Protection

Hackers Shift Aim to IT Supply Chain

Kaseya Targeted in Latest Breach Over the past several days a ransomware attack targeting Kaseya, a provider of IT management tools,...


Cybersecurity

Five Free Sources for Cybersecurity Awareness Training

Cybersecurity threats targeting small businesses are on the rise. Recent studies show that 43% of all cybersecurity attacks are targeted...


Cybersecurity

Antivirus, EPP, and EDR – What’s the difference?

Most people are familiar with antivirus software, its purpose, and why it is necessary. Fewer are familiar with newer terms...