Endpoint Security Versus Endpoint Management

As network traffic is increasingly encrypted and attacks are moving to the user or the application itself, "network security" is being replaced by "endpoint security". An endpoint is any device that connects users to a network. This includes desktops, laptops, and servers, as well as mobile devices and even printers. It also includes Internet-of-Things devices like thermostats, refrigerators, surveillance systems.... and on and on.

Read More


Current Email Scam

In the last three days we have seen 5 clients receive an email that starts as follows:   "Hello! I'm a hacker who cracked your email and device a few months ago." The rest of the threatening message claims to have installed a virus that will send compromising images to all of one's email recipients. These messages try to blackmail people into sending money to an anonymous bitcoin account. They rely on:

Read More


6 Common Reasons for Data Loss

Data loss is not just an inconvenience; it can actually put you out of business.  The time to think about it is before, not after, a critical incident. We've listed a number of common causes to watch out for.  The solution in all cases is performing regular backups managed by experienced technicians using dependable technology.

Read More


Colorado’s New Cybersecurity Law

For most companies, the problem isn't how to abide by Colorado's new cybersecurity law - it's making sure the company actually has a written plan and follows basic cybersecurity procedures. These laws were in effect for years, not only in Colorado but across the country. This new Colorado law just tightens up a few things.

Read More


The Three Stages of IT Support

IT services companies range from one-person operations to large corporations.  Which type is best suited for you depends on the size and complexity of your operation.

Read More


Nice Try, Move Along

With the consistent use of scare tactics in informational blogs and docuseries now-a-days, it’s easy to be fearful and disheartened at all the possibilities of harm to your business; but sometimes we all need to be reminded of how good prevails.

Read More


Phishing for Answers?

The age of digital information has created a playground of possible ways for cybercriminals to attack and hold your information for their gain. Only through a combined knowledge of tools and information can a business owner or employee truly be able to protect themselves from these ever growing and adapting threats. Keeping up to date with Microsoft’s defense packages, employing a safety net of anti-virus programs, and having an up-to-date…

Read More


A Bandwidth of Thieves

The age of digital information has created a playground of possible ways for cybercriminals to attack and hold your information for their gain. Only through a combined knowledge of tools and information can a business owner or employee truly be able to protect themselves from these ever growing and adapting threats. Keeping up to date with Microsoft’s defense packages, employing a safety net of anti-virus programs, and having an up-to-date…

Read More


Datto and Autotask Have Teamed Up

The recent merger of Datto and Autotask under the same ownership generates a powerful synergy that benefits customers. I say that as someone with hands-on experience on both technologies. Autotask is a feature-rich, device-management software enabling IT staff to automatically patch, configure, and monitor hundreds of workstations and servers.

Read More


The DRAAS Industry

A hot buzzword today is "business continuity" - keeping operations going no matter what. Backup recovery is a critical component of the overall business continuity mission, and the cloud is a major player in these solutions. Most clients opt for a "hybrid" approach, storing data both locally and on the Internet, and DRAAS providers typically offer cloud syncing solutions in addition to on-site dedicated backup hardware.

Read More