Aldridge Blog
Quick reads to improve your IT strategy
Most Recent Posts
Wealth Management Firm Strengthens IT to Safeguard Client Data
A wealth management firm serving high-net-worth clients struggled to securely protect their client’s sensitive data while ensuring efficiency for both in-office and remote work. Their reliance on scattered technology platforms led to inefficiencies, making it...
Donate Your Old Computers & Help Us Support Youth in Need
We're asking our readers to donate their old computers and help support our non-profit partner, Comp-U-Dopt®, in their efforts to provide youth in underserved communities with the technology they need for success. If you would like to make a donation, email us at...
Behind The Scenes: How Cybercriminals Plan Their Attacks
Understanding how threat actors plan and execute their attacks is crucial in strengthening our defenses and protecting against potential breaches. Unmasking the Dark Art: How Cybercriminals Plan Their Attacks How Cyber Attacks Work Step 1 Identify Target There...
Do You Have the Right Cyber Insurance Policy?
It is not a matter of ‘if’, but ‘when’ your company will experience a security breach. A well-prepared company is one that has thought through their security incident response and has a plan on how to recover from a successful cyber-attack. Cyber insurance is the...
What is SOC 2 Type 2 Compliance & Why Your IT Provider Should Have It
Aldridge understands the value of our clients' data to their reputation and future success. Because of this, we obtained our SOC 2 Type 2 Report and completed the certification through the MSP Cloud Verify Program™. Like many other professionals today, you may be...
What is an MSSP? (Managed Security Services Provider)
Thanks to innovation in the cybercrime industry, launching a successful cyber-attack campaign has never been easier. This innovation has unfortunately led to an explosion in attacks, especially against small and midsized businesses. Smaller businesses typically lack...
Small Business Cybersecurity Stats 2022
Cybersecurity is on every business leader's mind, but what are they actually thinking about? To answer that question, we conducted a survey of over 100 small business leaders and here is what we learned. Where are you on your ‘Security Journey’? The ‘Security Journey’...
7 Cyber Insurance Takeaways for 2023
Cyber insurance is changing, the application process is more complex and the requirements to get coverage are growing. Here are 7 things to keep in mind as you prepare for your next renewal: Be Proactive The time to start working on your security is now. Do not wait...
What Does A Ransomware Attack Cost?
We have seen a lot of numbers thrown out in our industry about the cost of a typical ransomware attacks. The amount is alarming and is increasing every year, making it more critical than ever to protect your organization. Let’s look at the actual amount, how to...
Small Business Cyber Insurance Stats [2022]
Cybersecurity is on every business leader's mind, but what are they actually thinking about? To answer that question, we conducted a survey of over 100 small business leaders and here is what we learned. Where are you on your ‘Security Journey’? The ‘Security Journey’...
It Security
The Importance of Cyber Insurance for Cyber Resilience
The landscape of cybersecurity is constantly evolving, presenting both opportunities and challenges for businesses of all sizes. With the absence of federal regulations and the emergence of various state-level initiatives, the commercial market, driven by key players...
Copilot for Productivity: Microsoft Word & Excel
In an era defined by rapid digital transformation, the demand for natural productivity tools has never been greater. Enter Copilot for Microsoft 365, an AI assistant directly integrated into Microsoft Word and Excel that will redefine the way we create documents and...
Mastering Cyber Resilience: Using a Layered Security Approach
Cybersecurity isn’t about completely avoiding an attack – that isn’t feasible. Today, security aims to build resilience. A resilient business can withstand and attack and continue operating in adverse conditions. Mastering Cyber Resilience: Using a Layered Security...
Microsoft 365
SharePoint in 30 Minutes – Part 3: Features and Collaboration
Video Transcription Now that we have our first document created, let me show you some of the actions that you can take on that document. If you'll notice, there's a ribbon up at the top with some quick actions that you can take. We've already used the "new"...
SharePoint in 30 Minutes – Part 2: New Documents in SharePoint Online
Video Transcription I'm going to create a new folder here first so I can create that document inside of it. I click on new and then folder. Then, I give that folder a name. You can see that the folder "Test" is created inside of this library. Now, if I want to...
SharePoint in 30 Minutes – Part 1: Search Basics
Video Transcription As we learned in the first video, files are stored in folders which are contained inside of libraries, inside of your company's SharePoint site. You're probably accustomed to searching for files on a traditional network share, so let's show...
It Consulting
AI’s Impact on Cybercrime: Attackers & Defenders
AI is fundamentally a tool for enhancing productivity, not a replacement for humans. Just as Microsoft Excel revolutionized accounting and reshaped the skills necessary to be a successful accountant, AI is poised to have a similar impact across various fields. This is...
Donate Your Old Computers & Help Us Support Youth in Need
We're asking our readers to donate their old computers and help support our non-profit partner, Comp-U-Dopt®, in their efforts to provide youth in underserved communities with the technology they need for success. If you would like to make a donation, email us at...
Don’t Miss Our Most Popular Articles
The Importance of Cyber Insurance for Cyber Resilience
The landscape of cybersecurity is constantly evolving, presenting both opportunities and challenges for businesses of all sizes. With the absence of federal regulations and the emergence of various state-level initiatives, the commercial market, driven by key players...
Copilot for Productivity: Microsoft Word & Excel
In an era defined by rapid digital transformation, the demand for natural productivity tools has never been greater. Enter Copilot for Microsoft 365, an AI assistant directly integrated into Microsoft Word and Excel that will redefine the way we create documents and...
Mastering Cyber Resilience: Using a Layered Security Approach
Cybersecurity isn’t about completely avoiding an attack – that isn’t feasible. Today, security aims to build resilience. A resilient business can withstand and attack and continue operating in adverse conditions. Mastering Cyber Resilience: Using a Layered Security...











