Uncategorized
-
The largest source of cybersecurity breaches remains human error, and phishing scams are a major part of this problem. A recent study found...
Read blog
-
Microsoft Teams is one of the most popular options for communication within a business and is part of the Microsoft 365 package. Continuing...
Read blog
-
Cybersecurity Trends for 2022
12/31/21In 2021, there were plenty of factors that led to increased opportunities for cybercriminals. Between remote work, supply chain challenges and a slew...
Read blog
-
Last week, a new vulnerability was discovered and documented in a very public fashion. The official title for this vulnerability is CVE-2021-44228, but the...
Read blog
-
Approved by both Epicor and Microsoft, running your Epicor ERP system in Azure offers your business a wide variety of benefits. One that...
Read blog
-
Shortly after Microsoft released its Windows 365 Cloud PC solution earlier this month, cybersecurity vulnerabilities were uncovered by security researchers. These vulnerabilities were...
Read blog
-
Multi-factor authentication (MFA) is one of the most powerful tools you can use in the fight against cyberattacks of various kinds. However, this...
Read blog
-
Azure Strengthens Zero Trust Security with Azure Active Directory Privileged Identity Management
07/13/21One of the best defenses against cyberattacks is to implement Zero Trust security and least privilege access for users and resources who need...
Read blog
-
By now, you’ve likely heard of the Industrial Internet of Things and the countless benefits it can bring to your manufacturing operations, ranging...
Read blog
-
Cyber Insurance Only Covers So Much
06/29/21Cyber insurance has come a long way from its origins as add-ons to your company’s main insurance policies. Today, policies are more complex and can be...
Read blog