What Does “Moving to the Cloud” Really Mean?

In the technology world, what does “moving to the cloud” really mean? Moving to the cloud refers to the process of shifting a company’s data and applications from on-site servers and physical hardware that you can see and touch to remote servers and virtualized resources accessible via the internet. Basically, it means transitioning from local,… Continue reading What Does “Moving to the Cloud” Really Mean?

Hackers Will Never Go Away, But We Can Frustrate Them with This Protocol

Every week, we read and hear about data breaches and cybersecurity threats on the news. As technology continues to evolve, so do the methods used by cybercriminals to steal personal information and gain access to secure systems. One of the most effective ways to protect against such threats is utilizing multi-factor authentication (MFA). MFA provides… Continue reading Hackers Will Never Go Away, But We Can Frustrate Them with This Protocol

The new king of content is your password

Working in the United States, when the FBI makes a security recommendation, you probably pay attention. Since February of 2020 (two years ago), the FBI has touted password phrases (aka passphrase) over passwords as more secure. Using long-formed phrases (aka content king) keeps hackers from figuring out your password – ranging from hours to more-than-your-lifespan.… Continue reading The new king of content is your password

3 ways we’re [looking at] using AI and ChatGPT

The ‘Christmas Present of the Year (2022)’ goes to OpenAI for ChatGPT! If you haven’t heard of this AI utility yet, you either aren’t reading the news or social media – I may even go as far as suggesting, you are purposely existing inside a vacuum. Riding the AI/ChatGPT bandwagon should be on everyone’s to… Continue reading 3 ways we’re [looking at] using AI and ChatGPT

How Identity and Access Management (IAM) helps meet cyber security insurance requirements

We’re still in January and at least four (4) significant cyber-attacks have made the media circuits. T-Mobile, Yum! Brands, LastPass, and ODIN have all succumbed to breaches leaking millions of user identifies, personally identifying information (PII), and other confidential data. These brands may be able to recover quickly from cyber incidents, but for a small… Continue reading How Identity and Access Management (IAM) helps meet cyber security insurance requirements

Boost operations and save money using Microsoft Business Premium

From a business owner’s perspective, doing more with less is an attractive principle. Microsoft recognizes that need for small/medium businesses and combines a comprehensive suite of services, layered with multiple security features, into their Business Premium offering. With more than 70 different capabilities, Business Premium keeps people and assets productive and safe. Here are just… Continue reading Boost operations and save money using Microsoft Business Premium

IAM ready to secure my business (basics)

Identity and Access Management (IAM), made popular through Microsoft security recommendations and expertise creating TLAs (three letter acronyms), allows a business to deliberately control their users’ digital identities and the privileges those identities have to business assets. Simplified: who has access to what within an organization. As an IT administrator, you may be asking, “do… Continue reading IAM ready to secure my business (basics)

Farewell basic authentication

Starting on October 1st, 2022, Microsoft will be removing the ability to connect into Office 365 using legacy authentication methods. This affects the native mail application on both iPhone and Android, as well as several other connection methods like printers, scanners, and line-of-business applications. Some folks aren’t comfortable with change, but this is a very… Continue reading Farewell basic authentication

Continuous feedback for continuous improvement

IMS provides a variety of technology services to over two hundred (at the time of writing) businesses on the eastern sea board. From cloud services, to network-as-a-service, to help desk, and business continuity – we cover a large swath of technology needs for manufacturers, attorneys, accountants, logistics providers, local governments and municipalities, non-profits, and the… Continue reading Continuous feedback for continuous improvement

How to crush the Microsoft price-change curveball

Over the last few months, Microsoft made a series of announcements that will impact all users of Microsoft 365. The easiest of these to understand (and prepare for) is the price increase. Microsoft hasn’t increased their pricing for the Office Suite applications in a decade. Now, now; let’s temper our attitudes about this. How many… Continue reading How to crush the Microsoft price-change curveball