Passwords aren’t new, and over the years, we have developed some bad habits when it comes to creating and updating them. Like doing chores and keeping up with personal hygiene, passwords require continual refreshing and updating to stay effective. How Hygienic are Your Passwords? With so many of us relying on so many passwords every […]
Microsoft Office 2010 hit a milestone last week, Oct 13, 2020. It was labeled END of LIFE, which is a scary way to say that the software is no longer supported and you can no longer purchase it. Those of you still using Office 2010 may be asking, “What does this mean for my business?” […]
The CMMC is making progress towards training new CMMC auditors. With the first round of trainees through, they are gearing up to begin the next round. This is an exciting time, and recently we have seen an emergency action that is now included in the finalization of the DFARS rules change. Approved by the Office […]
The Cybersecurity Maturity Model Certification (CMMC) is redefining the cybersecurity requirements for all companies that work with the Department of Defense (DoD) in any capacity. This means that these companies will need to take the time to analyze their cybersecurity solution and compare it to the listed requirements for each certification level—if you don’t have […]
As more and more people begin working from home and utilizing new video conferencing software. Hackers are finding more and more ways to unsuspecting users into giving up user data. The latest platform has been the ever popular Zoom video conferencing tool. What is Zoom? Zoom is a video conferencing tool, that allows users to connect […]
Teleworking opportunities have become increasingly more favorable in today’s world, with an increased list of benefits for both employers and employees. Reduction in overhead costs, reduced commute time, zero judgment from colleagues regarding your sweatpants Friday dress-code to name a few. And especially today, as we are in the middle of a public health crisis, teleworking […]
If Q4 isn’t stressful enough for organizations, cyber criminals will make sure it is. The near constant occurrence of cyberattacks ramps up even more in advance of Halloween and the holiday shopping spree. If you have done little to train your staff to identify cyber threats or convinced yourself that anti-virus/malware applications are sufficient deterrents, […]
Read Our Guide: How to Choose the Best Office Phone System The quick guide discusses: Landline Systems VoIP on Premise Solutions Cloud Based VoIP Systems Find out the questions to ask and features to look for in your next phone system. Which one is right for you?
“Dogfooding” or eating your own dog food: a term used to reference a scenario in which a company uses its own product to validate the quality and capabilities of the product.