Blog

Blog

Top 5 Reasons Small Businesses Should Use a Password Manager

While many small businesses typically opt for one login email and one password across their accounts to keep things straight, this system actually puts them at a heightened risk of compromise. Before reading any further, check to see if your password appears on the list for the top 200 most common passwords – some of our favorites include ‘monkey’, ‘pokemon’, ‘dragon’, and ‘myspace1’, though the majority are simple patterns like ‘123456’ and ‘qwerty’. 

Read More »

5 Must-Know Productivity Hacks for Summer

This is not a Jeff Foxworthy bit – pinky promise – but if you’re familiar with “the doldrums” you might be a sailor passing through the area where the northeast and the southeast trade winds converge, right between Africa and South America.  

 

Or maybe, just maybe, you’re a huge fan of the Norton Justor classic The Phantom Tollbooth 

 

No matter how you disambiguate it, the term always refers to a place that’s dull, slow, and listless. Adjectives you probably don’t want to be associated with you or your team, unless you’re professional sloths. 

Read More »

The Pros and Cons of Using a Managed Service Provider for Small Business

If you came here looking for Minneapolis-St. Paul content, otherwise known as “The Other MSP” around these parts, you’re out of luck. This is a blog all about Managed Service Providers, not Kirby Puckett’s famous Game 6 home run. 

 

And that’s okay, Kirby! We don’t mean any disrespect, none of us can hit like you could. But we think we have more experience taking care of some difficult digital tasks for our clients through our version of the MSP abbreviation. 

Read More »

Here's What You Need To Know About Penetration Testing

The IT world is full of phrases that could come off as odd or confusing to those who aren’t full-time in the industry. It’s not uncommon at all – there are definitely some really odd phrases farmers or shoemakers or chefs all use that might make us scratch a hole in our heads. But when it comes to today’s topic, penetration testing is a wildly straightforward concept, at least as far as naming conventions go.  

 

If you’ve never heard the phrase before, just stop right here and take a stab at it.  

 

… Good.

Read More »

Five Easy Ways to Strengthen Your Cloud Security

The security world once was able to (safely) gather and discuss all things topical and relevant to the industry during the 2022 RSA Conference. There were tons of takeaways, with one survey of attendees finding remote work was the number one concern for 17% and ransomware affecting 19% the most. But the main concern for the largest group, 37% of the attendees, was cloud security.  

 

And while we’ve touched on security topics from specific things like protecting against $43B scams and how Microsoft Azure works to why more cyber security training is important, nothing quite scratched the itch on the best ways to beef up cloud security. 

Read More »
   
New Call-to-action

Posts by Topic

see all