Aldridge Blog

Quick reads to improve your IT strategy

Most Recent Posts

Trending Threat: Live off the Land (LOTL) Attacks

Trending Threat: Live off the Land (LOTL) Attacks

Cybersecurity has significantly evolved over the past decade. Five to ten years ago, the primary focus was on antivirus software and protecting against malicious software intrusions. While these measures remain crucial components of a layered security approach, the...

How Executives Should Adapt to the New Security Landscape

How Executives Should Adapt to the New Security Landscape

It’s crucial to recognize that the IT world we operate in has changed and is a new security landscape. This shift isn't exclusive to cybersecurity providers; it encompasses every business across various industries. Whether you're dealing with customers, vendors, or...

Microsoft 365 For Business: Picking The Right Plan

Microsoft 365 is Microsoft’s modern solution for business productivity, communication, collaboration, and security. There are multiple tiers of Microsoft 365 For Business, intended to suit the diverse needs of different businesses. This article will give you an...

How Do Criminals Plan and Execute Cyber Attacks?

By now, you most likely know there has been an increase in the number of cyberattacks on small and midsized businesses, but you may not know the level of sophistication many cybercriminals have when it comes to planning and executing attacks. We break down the...

Top 4 Cyberthreats Facing Businesses

With more people working from home or in hybrid situations, employees are more vulnerable than ever to cyberattacks. From using personal devices and public wifi to lack of security awareness, it’s more important than ever for you and your team to understand the...

How A Business Email Compromise Happens

If you get caught in a business email compromise, the process can start a new string of related attacks on your associates, partners, customers, and vendors. Financial fraud, relationship exploits, ransomware, and business disruption are all likely outcomes of an...

Understanding External Vulnerability Scans

Hackers continue to evolve their attack methods to take advantage of weaknesses in the external network of governments and organizations around the globe. External vulnerability scans check the surface area your network presents to the world and the larger internet....

Understanding Internal Vulnerability Scans

Cyberthreats evolve as hackers hunt for potential vulnerabilities they can exploit, such as unpatched software running on a user's laptop or poorly implemented security controls. As new vulnerabilities are discovered, cybercriminals evolve their attacks to target...

9 Signs You’re Not Getting the IT Support You Need

Businesses today need more than just a help desk from their IT outsourcing provider. At a minimum, your IT support provider should keep things running, but it takes more than functional IT to get your business where you want it to go. What your business really needs...

It Security

Microsoft Copilot 365 | Which Plan is Right for You?

Microsoft Copilot 365 is now available to all businesses! There are multiple tiers of copilot, here is what they are, how much they cost, and how to use them.  Microsoft Copilot for Business Use  Copilot  Congratulations! If you're using Microsoft 365 with an Entra ID...

Essential Cybersecurity Solutions for Businesses

The surge in cyber threats has elevated cybersecurity to a critical business priority. As organizations increasingly rely on digital infrastructure, safeguarding sensitive information and ensuring the uninterrupted flow of operations become necessary.   Essential...

[Webinar] 2024 AI Update | Lessons Learned from Our AI Journey

Aldridge CIO, Chad Hiatt gives a candid update on our project to implement AI across our business. We’ve reached our first project milestone and things have not gone as we anticipated. We want to share our AI journey, warts and all, because we believe that everyone...

Microsoft 365

SharePoint in 30 Minutes – Part 4: Recover and Restore Documents

  Video Transcription If you need to recover a deleted file from anywhere in SharePoint, regardless of who the changes or who deleted the file, you can do this from the recycle bin located in the left navigation menu. Once here, you can see information about a...

SharePoint in 30 Minutes – Part 3: Features and Collaboration

  Video Transcription Now that we have our first document created, let me show you some of the actions that you can take on that document. If you'll notice, there's a ribbon up at the top with some quick actions that you can take. We've already used the "new"...

It Consulting

[Webinar] Microsoft Excel: Beyond the Basics

Watch the training to learn advanced Microsoft Excel techniques and best practices. You’ll get a quick overview of Excel’s advanced features and common business use cases. No matter what your experience with Excel is, you’ll leave this training with something new....

Trending Threat: Live off the Land (LOTL) Attacks

Cybersecurity has significantly evolved over the past decade. Five to ten years ago, the primary focus was on antivirus software and protecting against malicious software intrusions. While these measures remain crucial components of a layered security approach, the...

Don’t Miss Our Most Popular Articles

Microsoft Copilot 365 | Which Plan is Right for You?

Microsoft Copilot 365 | Which Plan is Right for You?

Microsoft Copilot 365 is now available to all businesses! There are multiple tiers of copilot, here is what they are, how much they cost, and how to use them.  Microsoft Copilot for Business Use  Copilot  Congratulations! If you're using Microsoft 365 with an Entra ID...

Essential Cybersecurity Solutions for Businesses

Essential Cybersecurity Solutions for Businesses

The surge in cyber threats has elevated cybersecurity to a critical business priority. As organizations increasingly rely on digital infrastructure, safeguarding sensitive information and ensuring the uninterrupted flow of operations become necessary.   Essential...

[Webinar] 2024 AI Update | Lessons Learned from Our AI Journey

[Webinar] 2024 AI Update | Lessons Learned from Our AI Journey

Aldridge CIO, Chad Hiatt gives a candid update on our project to implement AI across our business. We’ve reached our first project milestone and things have not gone as we anticipated. We want to share our AI journey, warts and all, because we believe that everyone...