Blog
5 Questions to Ask Yourself To Test Your Cybersecurity Knowledge
By Scott Hirschfeld | | Best Practices, Blog Post, Leadership, Security
October is Cybersecurity Month. I’m not sure if everyone knows this, or if only people in the technology business are aware. I’m not a big consumer of traditional media, so maybe it has been in the news and you all know. The real question might be, if we do know, do we care? What exactly…
Read More Reflecting on a Decade of IT MSP Service
By Scott Hirschfeld | | Best Practices, IT Support, Leadership, Managed Services, Security
We’ve been doing this IT gig for a long time. Some of you who are reading this may have been with us from the beginning. Things have changed a lot in the IT world since 1990, and we have had the pleasure of adapting and growing with our clients on that journey. Those of you…
Read More 3 IT Security Measures to Improve Peace of Mind
By Scott Hirschfeld | | Best Practices, Security
I overheard a conversation at a trade show the other day indicating that “the boss” is very concerned about IT security. According to this employee, it is one of the things that keeps the boss up at night. I couldn’t help but wonder if he was doing anything about his concerns. Let’s face it, IT…
Read More The Expiration of Windows 7
By Scott Hirschfeld | | Best Practices, Blog Post, Leadership, Security, Software
Windows 7 has an expiration date. Like that past-date gallon of milk in the fridge, it won’t be good for long. Hopefully, this does not come as a surprise to you! Windows 7 went out of mainstream support on January 13, 2015. This date was of little impact, because Microsoft continued to update and keep…
Read More 7 Keys for Cyber Security
By Scott Hirschfeld | | Blog Post, Security
There is a new data breach in the news every day. Today’s report comes via security awareness training firm KnowBe4 but is attributable to an FBI Alert released on Sept 18, 2018. They say, “Cybercriminals target employees through phishing emails designed to capture an employee’s login credentials. Once the cybercriminal has obtained an employee’s credentials, the…
Read More