Blog

Technology expertise, advice and tips

Category Archives: Technology Tips

  1. Microsoft Bulk Email

    One of the more common non-technical questions we get from clients relates to methods and best practices for sending bulk emails.  Most solutions require you to send emails using your organizations email domain which adds credibility but also comes with spam considerations.  There are countless bulk email platforms you can utilize that make this task…

  2. How To Stop Spam Emails: 5 Effective Strategies

    Are you tired of getting spam emails? If so, you’re not alone. Millions of people receive spam emails every day. These intrusions can be more than bothersome; they can pose genuine threats. Here is how to stop spam emails. 5 Spam Countermeasures 1. Empower Your Existing Email Filter Most email providers have built-in spam filters…

  3. Strengthening Password Security

    In today’s high-frequency cyber-attack landscape, protecting your passwords is paramount for strong cyber security. Recent concerns and data breaches have brought password managers into the spotlight. LastPass, a popular password manager, faced scrutiny due to a breach that raised questions about their security. While it is a valid concern, abandoning password managers entirely is not…

  4. The Importance of Network Documentation

    Imagine this scenario: a valuable member of your IT team leaves the company, taking their knowledge of the network with them. Without proper documentation, you have a black box, unsure of how to manage and maintain the network effectively. This can lead to chaos, downtime, and costly mistakes. Documentation is the key to ensuring continuity…

  5. Data Backup: Myths vs. Reality

    Does your organization have backups? Many may quickly respond with an affirmative response, but they may subscribe to myths about backups. Someone may say, “Back up their critical infrastructure, check that box, and move on.” When choosing a backup solution, method, and configuration, it’s crucial to make the right considerations. Critical Foundation: Separation of Control…

  6. Data Security & Tech Recycling

    The rise of ransomware attacks targeting small and medium businesses has made data security a top priority for IT leaders. While there are many security products available to protect and detect threats, one simple but often overlooked mitigation tactic is proper tech recycling policies. When disposed of improperly, old IT equipment can pose a security…

  7. Best Line of Defense Against Business Email Compromises

    The Cost of Business Email Compromise In May of 2022, the FBI published a report stating that Business Email Compromises account for over $43 Billion in losses Internationally.  In the “2022 State of Email Security Report” from Mimecast, a polling of 1400 organizations showed that 96% of the participants had experienced targeted phishing attacks with…

  8. How Much Bandwidth Does Your Business Need?

    Whether you’re moving to a new office, your contract is up or your business is growing, determining how much bandwidth you need is more stressful than it should be.  Overshoot, and you could be stuck in a contract overpaying for years.  Go with too little, and you could be revising your contract long before you’d…

  9. Preparing Your Business for a Major Storm or Hurricane

    Many businesses fail to prepare for major storms because they seem like a remote possibility until they’re right in front of you.  Hurricanes are the most common natural disasters in North Carolina, and if your business is in the line of one, it can have a big impact. There are two levels of preparation that…

  10. A Growing Concern: Data Loss

    There are plenty of statistics out there about disaster recovery.  The Federal Emergency Management Agency (FEMA) says 65% of businesses fail within two years of a disaster, while the Small Business Administration (SBA) says it’s 90%.  That’s a wide range, but it doesn’t matter too much, because either one is terrible. Businesses do fail during…