Our Blog
Office 365 Backup: Is it worth it?
As a cloud service, one of the major benefits of Office 365 is its reliability and resilience to various incidents that would otherwise disrupt on-premises servers. Notably, cloud hosting eliminates [...]
Is Windows Defender Good Enough? An Overview of Microsoft’s Anti-Virus
When it comes to defending against malware, installing an anti-virus is the first step many users will take. Choosing the right application can prove to be an overwhelming task, however, [...]
Phishing in 2018 – What to Look Out For
As a managed service provider, our clients often forward us emails that they suspect may be a phishing attempt. They trust us, so they often leave it to us to [...]
How to Block Ransomware in Windows 10
By John Bath We’ve written extensively about ransomware in the past, offering best practices for how users can identify threats and avoid the risks that may result in some unwarranted [...]
Expanding Security & Compliance with Data Loss Prevention
What is DLP and how can it help protect your data? We cover common features of DLP and touch on how Microsoft is taking the service a step further. For [...]
Remote Desktop vs. Virtual Private Network: Which Should You Use?
One of the major concerns of technology professionals today is to protect users and data from various cyber threats. And just as there are many things to worry about, there [...]
What is Microsoft 365? Breaking Down Microsoft’s New Bundle
This morning kicked off Microsoft’s Inspire conference, a week long showcase of Microsoft’s impact in the enterprise space and the strides its taking in the coming year to increase its [...]
What is Petya? How to protect against the newest ransomware attack.
Yesterday afternoon, reports began to surface about a new series of cyberattacks from a ransomware virus called ‘Petya’. This comes just one month after the WannaCry ransomware ravaged IT systems [...]
New SharePoint Enhancements!
Today, Microsoft hosted its SharePoint Virtual Summit to discuss the latest improvements coming to the platform. There were three key sections to the presentation that we wanted to take the [...]