Ron Cervantes

Why You Should Archive Your Email (and Back it Up)

Why You Should Archive Your Email (and Back it Up) Why You Should Archive Your Email (and Back it Up)

An email is a vital tool for business communication, but it can also be a source of clutter and confusion. With the endless influx of emails, it’s easy to lose track of important messages, making it difficult to find them when needed. The onslaught of notifications and messages can easily overwhelm any inbox. This is […]

The Benefits Of Aligning Your Business With CIS Standards

The Benefits Of Aligning Your Business With CIS Standards The Benefits Of Aligning Your Business With CIS Standards

If you own a business, you know that staying up-to-date with industry standards is crucial for success. One standard that more and more businesses are turning to is the Center for Internet Security (CIS) standards. These standards are a set of best practices for technology security and can help your business stay safe and secure […]

NIST versus CIS – part one

NIST versus CIS – part one NIST versus CIS - part one

It would be difficult to discuss cyber security without mentioning either the National Institute of Standards and Technology (NIST) or the Center for Internet Security (CIS). Both of these organizations play a major role in setting cybersecurity standards, but there are some key differences between the two that IT professionals should keep in mind.

The Next Evolution Of Passwords: Passkeys – How They Work and How You Will Use Them

The Next Evolution Of Passwords: Passkeys – How They Work and How You Will Use Them The Next Evolution Of Passwords: Passkeys - How They Work and How You Will Use Them

Password security is becoming an increasingly important discussion, given the growing frequency of cyber-attacks as well as the proliferation of digital services we use to manage every aspect of our lives. Although we’re often encouraged to use strong passwords and different passwords for different online accounts, this is a task that many of us find […]

You Should Be Concerned About the Recent Jump in Mobile Malware Attacks

You Should Be Concerned About the Recent Jump in Mobile Malware Attacks

Mobile malware attacks are on the rise and they are becoming ever more sophisticated and harmful to potential victims. As our lives become more reliant on mobile devices, it is important to be aware of the dangers that come with using them.

These Trends in Data Privacy Could Change Your 2023 Compliance Strategy

These Trends in Data Privacy Could Change Your 2023 Compliance Strategy

Data privacy is a trending topic in the tech industry, and for good reason. As our lives move increasingly online and more businesses collect and store customer data, the potential for information leaks and cyber attacks grows. In response, governments are enacting stricter data privacy laws that will directly impact the way a business can […]

Incident Response Plan: Does Your Business Have One?

Incident Response Plan: Does Your Business Have One?

In today’s digital world, your business will inevitably face numerous cybersecurity threats. When this happens, your degree of preparation will determine whether you can thwart a potential attack or suffer a momentous data breach.  Preparing for cybersecurity incidents is what’s known as incident response. Below, we’ll explore what incident response is, why your business needs […]

Why You Should Consider Microsoft 365 Premium Part 3: Endpoint Management (Intune)

Why You Should Consider Microsoft 365 Premium Part 3: Endpoint Management (Intune)

If you’ve been reading this blog recently, you’ll know that we’re big fans of Microsoft 365 Business Premium: a productivity and collaboration suite with fantastic security features. Don’t believe us? Just look at the stats. Microsoft Office 365 controls nearly half of the office productivity software market. Its market share in 2021 was around an […]