Blog

Blog

What is Microsoft 365 Security and Compliance?

 

A recent Upwork study found around a quarter of the professional workforce will work outside of the office by 2025. This shift to remote and hybrid work, away from the traditional ‘inside our four walls’ business model means the reliance on cloud and SaaS platforms, such as Microsoft 365, has drastically increased.

 

And if you’re reading this, that probably means someone at your office – or more likely a team – works remotely and you’ve got questions. Microsoft 365 is an excellent tool with plentiful security features that will keep your business compliant and working.

Read More »

60,000 New Emails! What Happens When Your Inbox Gets Subscription Bombed.

Hopefully, you’ve never run into this problem, but if you have and you’re looking for answers... Welcome. Refreshments are on the left.

 

One day you open your email to find that you’re bombarded with “Thank you for your subscription!” messages in all sorts of different languages from every corner of the internet. You obviously couldn’t have done this, nor would you have, but the subscriptions exist regardless.

Read More »

What is an Incident Response Plan (IRP)?

An incident response plan is defined as the documentation of a predetermined set of instructions or procedures to detect, respond to, and limit the consequences of malicious cyber-attacks or an organization’s information systems. In shorter, simpler terms, it’s the written plan your team has to respond to specific problems with your IT systems.

Read More »

3 Ways to Boost Your Security Using Identity and Access Management (IAM)

Haters may call it alphabet soup or too confusing to care about, but here at PTG, we’re pretty keen on all of our acronyms and what they represent. Not only are there dozens of terms to remember, making these shortened versions the perfect little helper, but writing PAM instead of things like Privileged Access Management over and over again saves time and space. It's our goal to simplify these complex topics into something a little more palatable- if you will.

 

Today’s alphabet soup is a hearty helping of security from your favorite chefs in the industry. Instead of harping on MFA and EDR or even PAM for your SMB, today our IT topic may be a little longer than a TL;DR but covers an equally important topic: IAM.

Read More »

Is Privileged Access Management (PAM) Important for Small Business?

We deal with a lot of complex topics here, and our goal is always to clarify them. Privledged Access Management, or PAM for short, is one of the topics we believe all of our partners should be well-versed on no matter their line of work.

Read More »
   
New Call-to-action

Posts by Topic

see all