Latest News

Password Management Solutions … Safe, Secure, and Simple to Use

With the cybersecurity incident first revealed by LastPass last August and updated a few weeks ago on December 22nd, questions have arisen on whether password…

Read More

Planning Your Cybersecurity Budget for 2023

For many organizations, this is the time of year for forecasts and budgets for the upcoming year. From an IT perspective there are many considerations…

Read More

Cybersecurity Layers – Part 3

So far in this three-part series of articles focused on a layered approach to cybersecurity we have covered the people, perimeter, network, and endpoints. In…

Read More

Cybersecurity Layers – Part 2

In the first article of this three-part series, we talked about taking a layered approach to developing and implementing a solid cybersecurity strategy. We talked…

Read More

Cybersecurity Layers – Part 1

As we enter the holiday season and people and organizations are planning their holiday get togethers and parties with friends, family, and colleagues, we thought…

Read More

Can Phishing Simulations Help Reduce Cyber Risk?

In a previous article we talked about what cybersecurity awareness training is and how it has helped organizations and their employees be aware and prepared…

Read More

What is Cybersecurity Awareness Training?

Cybersecurity awareness training programs have been around for many years. Over the last couple of years these programs have gained traction. With remote or hybrid…

Read More
Phishing, smishing, vishing

Phishing, Smishing, Vishing – What’s the Difference?

In the IT world there are many words and acronyms used that mean something to those of us in the industry but that may not…

Read More

Ransomware Beliefs That Can be Detrimental to Organizations

Although ransomware attacks continue to increase, many organizations still don’t believe that it could happen to them or that they should do anything to prepare…

Read More

Azure Virtual Desktop vs Windows 365: What is the Difference?

As we mentioned in a previous blog Desktop as a Service (DaaS) is a cloud-based offering where the backend is hosted by a third party….

Read More

Common Reasons for Adopting Azure Virtual Desktop

There have been significant changes in the last several years in the way organizations of all sizes serve their customers. The same applies to their…

Read More

What Is Desktop as a Service?

Desktop as a Service (DaaS) is a cloud based offering where the backend is hosted by a third party. These hosted desktops are also known…

Read More

Securing the Hybrid Work Environment

From what we can tell the hybrid work environment is an environment that many businesses are operating in and will operate in for the foreseeable…

Read More

Get the most from your IT

As service providers to more than 300 companies, the dedicated professionals at MicroAge are second to none when it comes to managed services. By improving efficiency, cutting costs and reducing downtime, we can help you achieve your business goals!

Most commented posts

tendances informatiques 2020 it trends

4 Upcoming IT Trends Businesses Need to Know About

As we look toward 2020, there are some very interesting IT trends that will affect the way businesses operate. Let’s take a look at 4…

Read More

3 Basic Security Errors Many SMBs Are Still Making

In the past decade, the number of known malware programs has risen from 65 million to 1.1 billion. The ways in which cybercriminals deploy the malware…

Read More
windows 365

What is Windows 365?

The pandemic has changed the way many companies operate. One notable development is an increase in the number of businesses adopting a hybrid work model….

Read More
Hybrid work

Securing the Hybrid Work Environment

From what we can tell the hybrid work environment is an environment that many businesses are operating in and will operate in for the foreseeable…

Read More
different kind of backups

The Pros and Cons of Different Kinds of Backups

If you’ve read our last blog on the importance of data backups, you are likely considering which kind of backup you should perform to keep…

Read More