Thought Leadership

Microsoft Windows Server 2012 End of Life and Your Organization

April 11, 2023

Windows Server 2012 and 2012 R2 will soon be unsupported by Microsoft and could pose serious risks for organizations using it after the official end-of-life date in October 2023. Potential Risks and Important Considerations Once Microsoft ends support for operating systems, security patches or updates, bug fixes, or technical support are no longer offered.  What does this mean for your organization? Increased cybersecurity vulnerability:  Operating on unsupported ope [...]

Quickpass Setup Instructions – as easy as 1, 2, 3!

March 27, 2023

1.QuickPass_Account_Setup-1Download 2.QuickPass_ResetPassword_UnlockAccountDownload 3.QuickPass_End_User_VerificationDownload [...]

Solving the Cyber Insurance Puzzle

March 15, 2023

Partnering with a technology consultant can help your organization end up with the best protection. Cyber liability insurance coverage is a still-evolving landscape. A lot is changing, including the types of cybersecurity measures required for an insurer to cover an organization. In 2023, many insurers require Multi-Factor Authentication (MFA), Endpoint Detection and Response (EDR), and Security Information and Event Management (SEIM). This is a step up from the coverage requiremen [...]

Endpoint Protection Evolution: improving your cybersecurity

January 25, 2023

The cybercrimes landscape has changed drastically over the last few years with bad actors getting far more aggressive.  Recent attacks have proven that no industry – hospitals, schools, manufacturers, government – is safe.  However, as cyberattacks have increased, so have advances in cybersecurity defenses.  EDR, or Endpoint Detection and Response technology, has had a significant impact in protecting organizations.  What is EDR and does your organization need [...]

New Year, New Enhancements for Multi-Factor Authentication

January 18, 2023

Third-party authentication apps, like Microsoft Authenticator, offer users a higher level of security than SMS or phone calls. But, as with all things cybersecurity-related,  the tools that protect us must continue to evolve to stay ahead of bad actors.  To bolster the security of push notifications, Microsoft announced new features to Authenticator’s two-factor authentication capabilities for mobile device users. Most notably among the updates, number matching and additi [...]

Does your cybersecurity defense need SIEM (Security Information and Event Management)

October 20, 2022

Bad actors are currently targeting small- to medium-sized businesses (SMBs) because they often find them less prepared to deal with a cyberattack. These organizations often take the position that “I’m too small to be a target.”  This false sense of security is precisely what makes them an attractive target. This mindset can cost your business both outright, in the case of a ransomware attack, and in downtime. In fact, according to IBM, the average cost of a data breach in [...]

There is Time for Listening to Your Body with Eliza Kingsford, Boulder, Colorado

October 6, 2022

What’s the best way to compete burnout? By letting your teams know it’s okay to be human. Eliza Kingsford, psychotherapist and author, says it comes down to leaders to create workplaces based in psychological safety. And for Eliza, the key to doing that lies in science. Eliza has devoted her life to helping others understand their nervous systems more deeply so they can properly listen to their bodies and interpret the signals they are constantly sending. Listen in to hear how to reco [...]

Managing Your Technology Through End-of-Life

August 31, 2022

As with all things related to technology, change and evolution are inevitable.  End of Life (EOL) is part of a typical technology lifecycle and means an application, platform, or hardware will no longer be supported by its manufacturer. No more patching or security, no more updated versions. Choosing to continue to use an application, platform, or hardware once it has reached its end of life can result in compliance issues, increased operational costs, and, as mentioned above, security [...]

Cybersecurity Best Practices: Changing MFA Processes

May 3, 2022

Data breaches can be devastating to an organization. They can come out of nowhere and leave your organization completely exposed. With approximately 50% of small businesses experiencing a cyberattack every year, it is imperative that your organization keep up to date on cybersecurity best practices to protect itself. What is SMS Multi-Factor Authentication (MFA)? MFA (Multi-Factor Authentication) is one of the simplest and most effective ways to curb cyber attacks. Think of it as [...]

Making an Impact with Microsoft Power Platform

November 30, 2021

Power Platform consists of four Microsoft applications: Power Apps, Power Automate, Power BI, and Power Virtual Agents. Launched in 2019, these four applications sit on top of and pull data from Common Data Service (CDS), Microsoft’s underlying data storage and management platform. Power Platform also can extract data from any number of external data sources, like third-party data platforms (i.e. Google Analytics, QuickBooks) or internally maintained databases (i.e. manually produced Excel fi [...]