GDPR and Business Continuity―why you must care

New Jersey is considering enacting GDPR-like regulations and other states are sure to follow. Find out what you need to do now to get in front of this pending regulation.
backup plan

Overcoming "little disasters" with your BDR plan

One nice thing about backup and disaster recovery plans is that they're helpful in situations that aren't exactly devastating. Take a power outage or snow day, for example. “Little disasters” can be inconvenient and even potentially crippling, depending on the situation.

Local backups vs. cloud backups (and why you want both)

Backups play an important role in keeping information safe. In general, backups are divided into two categories, known as local and cloud backups. Here's what you should know about these two types of backups and why a hybrid approach involving both is typically the best solution for businesses.
meeting discussing business continuity

The SMB owner's complete guide to business continuity

Even when operations are humming along, there's always a chance of disaster. Just one significant negative incident could disrupt your business. It may sound sensational, but it’s not an overstatement to say that whole companies have been destroyed in the wake of just one unfortunate event.
outsourced IT

5 reasons to consider outsourcing your IT support

Managed IT services come with some significant advantages. In fact, the business case for outsourcing has been proven many times over. And if you’re smart and choose your partner wisely, you can reap those same benefits, even on a limited budget. There’s an outsourcing option that will work for you.

A Lesson To Be Learned

If your company has not been hacked or victimized yet―consider yourself lucky and use the time to prepare for an attack when it comes.

Security Alert: 23 Million Bogus Emails Spreading Ransomware

23 million phishing emails have been launched by hackers - all carrying infected attachments. Your prize for opening a document? Ransomware!
Malware Evolves To Dangerous Levels

Malware Evolves To Dangerous Levels

Hackers have evolved. Now that users are wary of opening attachments in emails, they've come up with new ways of attacking us.
Employee on cell phone

Anatomy Of A CEO-Wire Fraud Attack

CEO Wire Fraud is costing businesses billions each year. Social engineers stalk their victims for months before pouncing.

How To Identify A Phishing Email—An Example

Do you know how to identify a phishing email? Read this post as we look at a bogus email branded like an MSO365 communication.