This month, I'd like to invite you to join us for 12 days of Tech-mas, a celebration of all things technology. You'll find tech-focused tools and tips you can use all year long.
On the first day of Tech-mas my MSP gave to me: a webinar to watch for free
Watch the webinar replay to hear Dr. Dante Lauretta, the principal investigator for NASA’s OSIRIS-Rex mission, tell the incredible story of how their planning strategies allowed them to do more than they imagined! OSIRIS-REx is a NASA asteroid study and sample-return mission. The mission's primary goal is to obtain a sample from Bennu, a carbonaceous near-Earth asteroid, and return the sample to Earth for a detailed analysis. Join us as we learn how to use these planning strategies for our businesses.
On the second day of Tech-mas my MSP gave to me: 2 factor authentication
Multifactor authentication (MFA) is an easy IT security measure that small- and mid-sized businesses can use to protect their data. Once a tool used primarily by enterprise companies, MFA is now an accessible – and necessary – tool for all businesses. However, many business owners remain unsure about how to implement it across their organization. If you haven’t implemented MFA yet, check out our blog to see what you need to know.
On the third day of Tech-mas my MSP gave to me: the backup rule of threes
The Rule of Threes should be considered when creating your backup plan. This means you should make at least three copies of your data, store them on at least two distinct types of media, and maintain a third copy offsite. The offsite copy of your data should be kept separate from the rest of your data and network. If anything happens to your location or the equipment at your location, your data will remain safe and sound.
On the fourth day of Tech-mas my MSP gave to me: 4 common network security risks to fix
Unfortunately, many businesses are unaware that they have been impacted until it is too late. Attempting to strengthen your security after a data breach is frequently too little, too late. The good news is there is a way to measure the impact of an attack without suffering one: a network security assessment. (H3) Here are four of the most common network security risks we find during an assessment:
Want to know more about what we uncover in network security assessments? Check out our blog.
On the fifth day of Tech-mas my MSP gave to me: 5 benefits of using a Tucson managed services provider
When choosing an IT provider, there are so many options available it can seem overwhelming. Do you go with a national service
company? An award-winning local firm? An international start-up? How do you choose? For businesses like yours, the best solution is to go with a local provider, here are 5 reasons why:
These days, business technology is in a state of flux. Digital transformations, a pandemic, and security breaches have made selecting the proper technology partner more than simply a matter of staying current — it's also about staying connected to customers and keeping your competitive edge. Here is what you need to have to maintain that connection:
Did you know that the average person has over 100 passwords? Password reset requests are one of the most common service requests we receive. Most people use the same simple password for a variety of accounts, both personal and professional. And we
get it - it’s hard to remember over 100 different passwords. Let alone think of the long mixture of numbers, letters, and symbols that are required for a secure password. Password managers can generate and store secure passwords automatically.
We now work from anywhere, on a wider range of devices and networks, and are exposed to more and greater threats than ever before. The way we think about protecting our organizations and data hasn't kept pace. While defensive cyber security is being deployed by businesses, in the face of more sophisticated attacks, these safeguards are proving inadequate. We need both cyber resilience and cyber security, and it's critical to know the difference. Check out this article from the World Economic Forum.
Change is rarely simple or pleasant, but we can all play a role in promoting it by tackling bias and inequity. This year, we're focusing on the outstanding women leaders who exemplify the #ChooseToChallenge slogan in order to make actual, positive changes in our Tucson community. Check out the 9 ladies we have featured so far in this campaign.
We're increasingly likely to hear tech language in our daily discussions as technology becomes more integrated with our professional and social lives. In honor of Cyber Security Awareness Month in October, I had compiled a list of the top 10 IT security terms you should know (get all the details on the October blog):
With the nation pushed to remote and hybrid workforces, The standard approach of purchasing and setting up new hardware based on whatever fits your current need is no longer advisable. In an uncertain environment, there’s no guarantee that your actual hardware needs will stay the same or deliver a return on that major capital investment. Take a look at these resources, where I cover some strategies for keeping your hardware current with Hardware as a Service, and how to budget for it.
Most people use the same simple password for a variety of accounts, both personal and professional. This makes it simple to guess the password. A long mixture of numbers, letters, and symbols is required for a secure password. Check out my post on more areas you can improve your IT security.