Sep 6, 2022 | Cybersecurity, Microsoft 365
Microsoft Intune gives you the ability to control how devices work with your organization’s data. Intune is a cloud-based mobile device management (MDM) tool that allows your IT team to remotely deploy applications, apply business-standard settings, enforce...
Aug 10, 2022 | Cybersecurity
The threat landscape is evolving and cyber insurance carriers are scrambling to catch up. In this webinar, IT Security and cyber insurance experts from Aldridge and FifthWall Solutions will talk you through a brief history of the cyber insurance industry so you can...
Jul 8, 2022 | Cybersecurity
Building an effective security strategy isn’t something that can happen overnight. It requires careful thought and an iterative process you are always refining. Below, we outline three steps you can work through to help identify your exposure and your current security...
Jun 30, 2022 | Cybersecurity
You may have heard about Log4j earlier this year. It was a big enough deal that it received coverage on mainstream news sites. Log4j refers to a common software utility that’s commonly found on many web services. Its intended use is for logging the health and activity...
Jun 29, 2022 | Cybersecurity
Cybersecurity can be thought of like home security. You can implement the latest and greatest security technology, but none of that will stop an intruder if you leave your keys out in the open. Your corporate credentials can be thought of as keys to your business. An...
Jun 22, 2022 | Cybersecurity, Microsoft 365
Microsoft 365 has established itself as the best-in-class productivity and collaboration platform for businesses. Microsoft 365 offers 4 different subscription tiers, however there are really only 2 tiers that are suitable for professional organizations of up to 300...