Blog

Blog

Top 5 Reasons Small Businesses Should Use a Password Manager

While many small businesses typically opt for one login email and one password across their accounts to keep things straight, this system actually puts them at a heightened risk of compromise. Before reading any further, check to see if your password appears on the list for the top 200 most common passwords – some of our favorites include ‘monkey’, ‘pokemon’, ‘dragon’, and ‘myspace1’, though the majority are simple patterns like ‘123456’ and ‘qwerty’. 

Read More »

5 Must-Know Productivity Hacks for Summer

This is not a Jeff Foxworthy bit – pinky promise – but if you’re familiar with “the doldrums” you might be a sailor passing through the area where the northeast and the southeast trade winds converge, right between Africa and South America.  

 

Or maybe, just maybe, you’re a huge fan of the Norton Justor classic The Phantom Tollbooth 

 

No matter how you disambiguate it, the term always refers to a place that’s dull, slow, and listless. Adjectives you probably don’t want to be associated with you or your team, unless you’re professional sloths. 

Read More »

The Pros and Cons of Using a Managed Service Provider for Small Business

If you came here looking for Minneapolis-St. Paul content, otherwise known as “The Other MSP” around these parts, you’re out of luck. This is a blog all about Managed Service Providers, not Kirby Puckett’s famous Game 6 home run. 

 

And that’s okay, Kirby! We don’t mean any disrespect, none of us can hit like you could. But we think we have more experience taking care of some difficult digital tasks for our clients through our version of the MSP abbreviation. 

Read More »

Two-Factor vs. Multifactor Authentication: What's the Difference?

 

No matter the industry you’re in if you’re collecting information, you should be protecting that data. And to protect that data, you’ve undoubtedly run into phrases like single-factor, two-factor, and multifactor authentication – and the responsibilities that go come collecting all that data. In nearly every instance that breaches occur, the missteps can be boiled down to simple problems like weak credentials and poor security standards. (Go ahead and take the sticky notes with your passwords off of your computer monitor before you read the rest of this.)

Read More »

20 Cyber Insurance Questions That Can Help Lower Your Premium

 

Cyber Insurance protects one of the most important assets your company has- your data. With recent high-profile security incidents, requirements are tightening to qualify for reasonable cyber insurance premiums.

Use the questions below to prepare yourself for the questions you will encounter when applying for and renewing your cyber insurance.

Read More »
   
New Call-to-action

Posts by Topic

see all