Jun 30, 2022 | Cybersecurity
You may have heard about Log4j earlier this year. It was a big enough deal that it received coverage on mainstream news sites. Log4j refers to a common software utility that’s commonly found on many web services. Its intended use is for logging the health and activity...
Jun 29, 2022 | Cybersecurity
Cybersecurity can be thought of like home security. You can implement the latest and greatest security technology, but none of that will stop an intruder if you leave your keys out in the open. Your corporate credentials can be thought of as keys to your business. An...
Jun 22, 2022 | Cybersecurity, Microsoft 365
Microsoft 365 has established itself as the best-in-class productivity and collaboration platform for businesses. Microsoft 365 offers 4 different subscription tiers, however there are really only 2 tiers that are suitable for professional organizations of up to 300...