RECENT NEWS

Blog

Webinar Replay: Tech Planning 101

On May 20th, many of you joined us for the second webinar in our 2021 series. Below is a recap of the main points we shared and a link if you would like to watch the webinar. Top Technology Concerns of Business…
June 2, 2021
Blog

Webinar Replay: Is Your Data Secure?

On March 18th, many of you joined us for the first webinar in our 2021 series. Below is a recap of the main points we shared and a link if you would like to watch the webinar. Top Technology Concerns of Business…
April 6, 2021
Blog

Two Essential Steps to Keeping Your Data Safe

January 28th, 2021 - Happy Data Privacy Day! In the age of the remote work force and increased dependency on technology, many of you have expressed that your number one concern is, “How do I keep our data safe?” In…
January 28, 2021
Blog

IT Checklist – Eight Steps to Achieve Security

Cybercrime is an unsettlingly fluid and versatile practice. Some threats are incredibly sophisticated and exploit low-level mechanisms. Meltdown – a hardware vulnerability discovered in 2018 – exploits a CPU performance technique to read a computer’s entire physical memory. After Meltdown…
December 16, 2020