How Identity and Access Management (IAM) helps meet cyber security insurance requirements

We’re still in January and at least four (4) significant cyber-attacks have made the media circuits. T-Mobile, Yum! Brands, LastPass, and ODIN have all succumbed to breaches leaking millions of user identifies, personally identifying information (PII), and other confidential data. These brands may be able to recover quickly from cyber incidents, but for a small… Continue reading How Identity and Access Management (IAM) helps meet cyber security insurance requirements

Farewell basic authentication

Starting on October 1st, 2022, Microsoft will be removing the ability to connect into Office 365 using legacy authentication methods. This affects the native mail application on both iPhone and Android, as well as several other connection methods like printers, scanners, and line-of-business applications. Some folks aren’t comfortable with change, but this is a very… Continue reading Farewell basic authentication

Continuous feedback for continuous improvement

IMS provides a variety of technology services to over two hundred (at the time of writing) businesses on the eastern sea board. From cloud services, to network-as-a-service, to help desk, and business continuity – we cover a large swath of technology needs for manufacturers, attorneys, accountants, logistics providers, local governments and municipalities, non-profits, and the… Continue reading Continuous feedback for continuous improvement

What to Look for During Your Search for a Managed Services Provider

Is your organization outgrowing its in-house IT solution? Whether your business is large or small, your focus should be on your business rather than on the business of IT. If it seems like things are operating the other way around, it’s probably time to start your search for a Managed Services Provider (MSP). Outsourcing to… Continue reading What to Look for During Your Search for a Managed Services Provider