Posts written by:
Andrew Rivett
The paradigm shift of better IT affects any company that wants to elevate its operational maturity level, regardless of the starting point. This is becoming a competitive imperative, given the benefits.
Read MoreToday, a single subscription service like Microsoft 365 can empower users at any company to do more, faster, and better, while decreasing IT involvement as well as overhead costs.
Read MoreEmail is not secure. It has never been secure, and little has changed since its invention by Ray Tomlinson back in 1971. Fast forward to 2022 and most business leaders and end users are aware of the risks of email phishing. Most also know that it is a primary way for hackers to gain access to sensitive company data, however,…
Read MoreMalicious hackers have an enormous trove of common passwords they can use to try and access your network. These lists demonstrate how weak common password choices tend to be. Some common examples of passwords highlight how important a password policy can be: 11111112345678abc123PasswordSuperman A small business employee has an average of 85 passwords that they…
Read MoreShared user accounts are often adopted in situations where a business may have multiple people who need access to the same resources on their network. This happens in situations for example, with roles like reception or with maintenance personnel. All these employees share the same email address, and they access shared files and applications. While…
Read MoreIt has never been easier to share and collaborate with co-workers on data than now. Saying that, let’s be sure we protect our sensitive company information against the threats that cloud-based computing accelerates. Historically, you may have had an internal policy that lays out the standards for protecting data on your laptop or when using…
Read More74% of data breaches involved privileged credential abuse. Who has access to private data at your business? What policies do you have in place to ensure that your internal IT department is accountable? When it comes to user access, every organization needs to: Limit privileged access. Ensure restricted access to: infrastructure, databases, network devices, cloud…
Read MoreBuilding good habits is a lot of work, and while rewarding on a cosmic scale, you don’t always get immediate feedback that you’re doing something good for yourself. If you’re like me, you’ve longed for someone to transform these sometimes tedious tasks into a simple, interactive RPG-style mini-game! Wait no longer, try Habitica. Habitica is…
Read MoreAlongside the explosion of BYOD (Bring Your Own Device) policies comes the rise of mobile malware. Take precaution and install a mobile security app. Sophos is a FREE lightweight antivirus and security app. It was the winner of the AV-Test Award in 2015 and contains no advertising. Key features include: Malware protection Loss and theft protection…
Read MoreCovert your file formats without shady software. Ever needed to covert a file – perhaps a video file so that you could play it on a different device, or an image to a different format – and had to scour the Internet for programs shadier than that guy with a trench coat in the alley?…
Read More