by John Ahlberg | Featured, Security
One of the most common ways to breach business systems is phishing. All it takes is one employee, one email, one click and your business is at risk and your data vulnerable. Email phishing is a type of cyber-attack that has been around for many years and continues to...
by John Ahlberg | Featured, Security
On February 14, the long-anticipated Veeam Backup & Replication V12 was released! We have been trusting Veeam with our backups for more than 10 years and are one of Veeam’s top partners with more than 1,000,000 back-ups. This release is exciting to us techies...
by Patrick Giantomasso | Featured, Security, Strategy
After SMBs Identify risks in the first step of the NIST Framework, the second step defines the process to Protect your assets. We like to refer to this NIST step as making the “security sandwich.” We like this metaphor because we incorporate layers of...