The End of Antivirus?

1/3/2019 by Troy Stoneking

A few weeks ago I was speaking to a client about the need for antivirus as called for in the Payment Card Industry Data Security standards (PCIDSS) Requirement 5: Protect all systems against malware and regularly update antivirus software or programs. He made an unusual statement, “We don’t use antivirus.” Having been in IT and cybersecurity for many years I knew this was eventually coming, but it was the first time I’d seen it in a real-world implementation. Here are some facts:
Read More »about The End of Antivirus?

Security+ is Important TODAY!

11/20/2018 by Karen Gill

It doesn’t matter if you are at a small business or a very large company, cybersecurity is more important today than it has ever been! As we move into the holiday season, retail cybersecurity is dominating our attention, but any company involved in digital transformation continues to lack the workforce needed to protect assets.
Read More »about Security+ is Important TODAY!

Windows Server 2019!

11/5/2018 by Troy Stoneking

In case you haven’t heard, Microsoft is moving along nicely on Windows Server 2019. It’s filled with new features and improvements to features introduced in previous releases. Here are few I’m excited about:
Read More »about Windows Server 2019!

Access vs Excel

10/22/2018 by Kelly Cummings

Even though Microsoft Excel can be used for data management and fields can be calculated in Microsoft Access, the two softwares are very different, and to maximize usage in each program, it is important to understand the unique aspects of each one. Likely, they are both part of a subscription your company is paying for, so no additional expenses will be lost to undertake the learning curve required for one or both of the programs.
Read More »about Access vs Excel

Can't You Trust Anyone Anymore?

9/4/2018 by Troy Stoneking

When I’m working with a client and the topic of cybersecurity arises they want to talk about attacks from Russia, North Korea or various organized crime entities. But did you know that these types of threats are not the most likely avenue from which you’ll have a breach in your cybersecurity? In fact they are WAY down the list of who’ll be the reason your security is compromised. Want to know the greatest threat?
Read More »about Can't You Trust Anyone Anymore?


8/17/2018 by Karen Gill

One of the key aspects of success with ITIL is making sure everyone in on the same page. Foundational level ITIL training provides common terminology, accountability through defined roles, and an understanding of the value of implementing process best-practices.
Read More »about Why ITIL?

1 2 3 4 5 6 7 8 9 10  Next