Quantcast
Channel: Blog - i.t.NOW
Browsing all 107 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

A Sneak Peek at Windows 11

Microsoft’s recent unveiling of Windows 11 gives us a look into the next iteration of the companies popular operating system.  While there are some details still to come, we’ll fill you in on a vague...

View Article



Print Nightmare

A new security vulnerability that has been nicknamed “Print Nightmare” has been making a big splash in IT security communities.  The exploit has been deemed a zero-day attack as there was no patch...

View Article

How to Prevent the Easiest Hack in History

Yahoo Finance published an article a few days ago about Fran Finnegan.  You can read the whole thing here.  The article details how Fran’s business got attacked and infected with ransomware, which...

View Article

Image may be NSFW.
Clik here to view.

The Digital Receptionist

One thing that we’ve seen some of our clients embracing more during the pandemic is the idea of the digital receptionist.  It’s been brought to the forefront lately because of the desire to limit...

View Article

New User Creation Automation

There are a lot of tasks in IT that need to be completed by a human.  There area lot that don’t need to be completed by a human.  The trick to efficient IT service delivery is to automate everything...

View Article


What are IT Services? 12 Demonstrated Ways IT Support Can Benefit Your Business

Gartner defines IT services like this.  “IT services refers to the application of business and technical expertise to enable organizations in the creation, management, and optimization of or access to...

View Article

Image may be NSFW.
Clik here to view.

Monster Monitors

Having two and three monitors on your desk has become the norm for a lot of businesses.  There have been studies that have shown multiple monitors significantly improve your productivity.  Many...

View Article

Office 365 Price Hike

The office 365 price hike. It’s a common game plan for SAAS software manufacturers to offer their products free or at a very low price.  They build a large subscriber base, and eventually start...

View Article


How to Tell When Your IT Provider is Failing

Technology is critical to almost every business today.  Many small and medium businesses turn to an outsourced IT provider to help manage that technology.  Not all IT providers are created equal....

View Article


The Evolution of Business Email Compromise

That Nigerian prince has finally grown up.  Business Email Compromise or BEC is a real and evolving threat.  It may have started with humble beginnings but has been continually evolving.  Attackers...

View Article

Microsoft One Drive vs. SharePoint vs. Azure Files

As remote work has become more prevalent over the last couple of years, having a web-based file sharing platform has become more important than ever.  Ensuring your team has access to the files they...

View Article

Image may be NSFW.
Clik here to view.

Secure File Uploads with OneDrive for Business

Recent discussions with a couple of different businesses identified a need for secure file sharing with their clients.  Traditionally clients sent sensitive documents over email.  This isn’t ideal....

View Article

What is HIPAA Compliance and Why is it Important?

HIPAA compliance is a critical part of protecting the privacy of patient information. It is also important for healthcare organizations to maintain HIPAA compliance in order to avoid potential fines...

View Article


2021 Cybersecurity Year In Review

In 2021, cybersecurity continued to be a top concern for businesses and individuals alike. Despite increased awareness and investment in cybersecurity solutions, there were still many high-profile...

View Article

Top 5 Phishing Threats You Need to Know About for 2022

Moving into 2022, cybersecurity is a hot topic. With hacking and data breaches on the rise, it is more important than ever for individuals and businesses to protect their digital information. You may...

View Article


Cyber Liability Insurance – IT Security Requirements are Increasing

With the rise of ransomware and increasing automated bot attacks the need for cyber liability insurance has never been higher than right now.  Business owners often underestimate the cost of a breach...

View Article

Image may be NSFW.
Clik here to view.

Microsoft Secure Score

Businesses should always be on the lookout for ways that they can increase their security posture.  Microsoft is aware of this and wants to help.  They’ve created some built in functionality within...

View Article


Cyber Security Training

The weakest link in most IT security plans is frequently your employees.  Cyber security training can help them recognize threats and not fall for that phishing scam.  Without it, a misguided click...

View Article

Image may be NSFW.
Clik here to view.

Threat Report – Emotet 2.0

For several years bad actors have been using Emotet malware and its variants in large scale phishing attacks.  These attacks are meant to compromise business email accounts and then allow them to...

View Article

Reducing Human Error

As the saying goes, you’re only as strong as your weakest link, and in the case of cybersecurity, your weakest link is humans.  With the new security challenges brought about by remote work, humans...

View Article
Browsing all 107 articles
Browse latest View live




Latest Images