Author - John LeMay

Password Management Best Practices

We are all familiar with the pain associated with managing a variety of passwords for online accounts and services in...


Posted By

IT Basics – Software Updates and Patch Management

Managing software updates for your organization is an important task and a security best practice. Software updates, or patches, typically...


Posted By
Endpoint Protection

IT Basics – Endpoint Security

This is the second article in our IT Basics series. This series focuses on core technology best practices that should...


Posted By

IT Basics – Data Backup and Recovery

This article is part of a new series on basic IT processes that should be part of every organization’s plan....


Posted By
Working remotely using laptop

Microsoft Previews Windows 365

Microsoft Previews Windows 365 Last week Microsoft provided a preview of the upcoming Windows 365, a simplified Desktop as a Service...


Posted By
Endpoint Protection

Hackers Shift Aim to IT Supply Chain

Kaseya Targeted in Latest Breach Over the past several days a ransomware attack targeting Kaseya, a provider of IT management tools,...


Posted By
Cybersecurity

Five Free Sources for Cybersecurity Awareness Training

Cybersecurity threats targeting small businesses are on the rise. Recent studies show that 43% of all cybersecurity attacks are targeted...


Posted By
Cybersecurity

Antivirus, EPP, and EDR – What’s the difference?

Most people are familiar with antivirus software, its purpose, and why it is necessary. Fewer are familiar with newer terms...


Posted By

Protecting Against Cloud Data Loss

Many business and IT leaders incorrectly assume that public cloud storage services, such as Microsoft OneDrive for Business, a component...


Posted By

Improving Business Results through IT Alignment

Business and IT leaders seeking improved success rates of IT projects and initiatives should focus on business-IT alignment. Aligning IT...


Posted By