Endpoint Protection

Endpoint Protection

Traditionally, endpoint protection was a priority for security against user error. The biggest concern companies had were having accidental data deleted, lost or stolen corporate devices, and other common employee mistakes. In this day and age, common user errors have...
Mobile Device Management (MDM) for Small Businesses

Mobile Device Management (MDM) for Small Businesses

In this day and age, the bring-your-own-device (BYOD) approach is increasingly more popular with small and medium sized corporations. Allowing employees to utilize their own personal smart phone for both business and personal use is a win-win: Corporations are able to...
Two-factor Authentication: What is it and Why do I Care?

Two-factor Authentication: What is it and Why do I Care?

Google just last week announced that since 2017, not one single employee out of its 85,000+ staff has had their account successfully phished and taken over by hackers.  When we live in an age where 80,000 people fall for phishing scams every single day and exposing...

O365 Phishing scam REALLY looks legit

Wow, even I am impressed at this one! We just worked with a client who got the following email, Thank goodness he knew enough to call us when he felt something looked suspicious! When you click on the sign in link it takes...