Adopt Zero Trust Security for Your SMB With the cyberthreat landscape getting more complicated with every passing minute, cybersecurity deserves more attention than ever before. Fully trusting applications, interfaces, networks, devices, traffic and users without...
If you do anything with Department of Defense (DoD) contracts, you are probably already familiar with the new Cybersecurity Maturity Model Certification, or its abbreviation CMMC. The DoD is rolling out the program in phases over the next several years. For DoD Fiscal...
Last August I wrote about the coming of Cloud PCs in Cloud PCs: Get Ready to Subscribe Your Next PC. All the facts and benefits I presented there are still true, maybe even more so now. While it may not be visible to most small businesses and consumers, those of us...
We all have seen some serious shortages caused by the Pandemic. Of course, masks and disinfectant were not to be found a year ago, and who can forget the bare shelves where toilet paper normally sat. But as time went on, other goods started showing up in short supply....
In the course of our work, we get to see a lot of IT networks that have been essentially unmanaged, sometimes for years. This often leads to a strange mix of hardware and software. It reminds me of that Jonny Cash song “One Piece at a Time”, where an auto worker...
Last year several of our articles were about cybersecurity. That was intentional, considering how widespread and ever changing the cyber threats are that we face today. Similarly, our project teams spent a significant portion of their time on maintaining, reviewing,...