End of Year: Data Archive/Snapshot

In All by Alex KallimanisLeave a Comment

A good Backup and Disaster Recovery (BDR) plan is a central pillar of any Information Technology strategy. The BDR provides peace of mind in the event of data loss. In …

End of Year: Active Directory

In All by Alex Kallimanis

The end of the year is a great time to take stock of your IT infrastructure. Over the course of the year you have probably had some employees join, move …

IT Red Flags to Watch Out For

In All, Blog by Mike Abbott

  IT Red Flags to Watch Out For   As someone running a SMB, you probably have a lot on your plate. You are the core decision maker, responsible for …

Failover Systems

In All by Alex Kallimanis

Redundancy : [serving as a duplicate for preventing failure of an entire system (such as a spacecraft) upon failure of a single component (Merriam-Webster)] is a foundational concept in Information Technology Security …

Think you are too small

In All, Uncategorized by Mike Abbott

    Think you are too small to be targeted by a cybercriminal? Think again.   When I meet with clients, especially SMBs, I often hear them say that they …

See All All Posts

IT Red Flags to Watch Out For

In All, Blog by Mike Abbott

  IT Red Flags to Watch Out For   As someone running a SMB, you probably have a lot on your plate. You are the core decision maker, responsible for …

See All Blog Posts

Don’t Get KRACK-ed

In All, Blog, BYOD, Manage Risk by Alex Kallimanis

By now you may be aware of the recent discovery of a security vulnerability in the WPA2 security standard for Wi-Fi networks, as reported by CNN, Fox News, cnet and …

See All BYOD Posts
See All Cloud Posts
See All Communicate Better Posts
See All Company Culture Posts
See All Compliance Posts
See All Contain Costs Posts

Don’t Get KRACK-ed

In All, Blog, BYOD, Manage Risk by Alex Kallimanis

By now you may be aware of the recent discovery of a security vulnerability in the WPA2 security standard for Wi-Fi networks, as reported by CNN, Fox News, cnet and …

See All Manage Risk Posts
See All News Posts
See All Operate Efficiently Posts
See All Plan Strategically Posts
See All Security Posts
See All Software Posts

Think you are too small

In All, Uncategorized by Mike Abbott

    Think you are too small to be targeted by a cybercriminal? Think again.   When I meet with clients, especially SMBs, I often hear them say that they …

Keeping your data safe: Access Control

In All, Uncategorized by Mike Abbott

    Keeping your data safe: Access Control   Cyberattacks are a commonplace today. Malwares such as viruses, worms and more recently ransomwares not only corrupt your data or hold …

Benefits of Using VoIP Technology

In All, Uncategorized by Mike Abbott

Benefits of Using VoIP Technology More and more businesses are implementing Voice over Internet Protocol or VoIP technology because of its versatility, flexibility and cost effectiveness. With new developments in …

Disaster Recovery Plans: Do You Have One?

In All, Uncategorized by Mike Abbott

Disaster Recovery Plans: Do You Have One? Disaster recovery and business continuity plans are issues that almost all small businesses fail to think about. More frequently, they decide they haven’t …

See All Uncategorized Posts