Our Blog
Is Windows Defender Good Enough? An Overview of Microsoft’s Anti-Virus
When it comes to defending against malware, installing an anti-virus is the first step many users will take. Choosing the right application can prove to be an overwhelming task, however, [...]
Phishing in 2018 – What to Look Out For
As a managed service provider, our clients often forward us emails that they suspect may be a phishing attempt. They trust us, so they often leave it to us to [...]
How to Block Ransomware in Windows 10
By John Bath We’ve written extensively about ransomware in the past, offering best practices for how users can identify threats and avoid the risks that may result in some unwarranted [...]
Expanding Security & Compliance with Data Loss Prevention
What is DLP and how can it help protect your data? We cover common features of DLP and touch on how Microsoft is taking the service a step further. For [...]
Remote Desktop vs. Virtual Private Network: Which Should You Use?
One of the major concerns of technology professionals today is to protect users and data from various cyber threats. And just as there are many things to worry about, there [...]
What is Microsoft 365? Breaking Down Microsoft’s New Bundle
This morning kicked off Microsoft’s Inspire conference, a week long showcase of Microsoft’s impact in the enterprise space and the strides its taking in the coming year to increase its [...]
What is Petya? How to protect against the newest ransomware attack.
Yesterday afternoon, reports began to surface about a new series of cyberattacks from a ransomware virus called ‘Petya’. This comes just one month after the WannaCry ransomware ravaged IT systems [...]
New SharePoint Enhancements!
Today, Microsoft hosted its SharePoint Virtual Summit to discuss the latest improvements coming to the platform. There were three key sections to the presentation that we wanted to take the [...]
Defending from Ransomware in 2017
As far as malware goes, ransomware poses one of the biggest threats to businesses today, costing an estimated 2.4 million per year. Infection occurs through email phishing, in which the attacker [...]