Blog

The Importance of Least Privilege in IT Security

The Importance of Least Privilege in IT Security

The Importance of Least Privilege in IT Security Safeguarding sensitive data and protecting critical systems are paramount. One crucial practice that organizations must adopt is the principle of least privilege. By granting users only the minimum access necessary for...

What Does “Moving to the Cloud” Really Mean?

What Does “Moving to the Cloud” Really Mean?

In the technology world, what does “moving to the cloud” really mean? Moving to the cloud refers to the process of shifting a company’s data and applications from on-site servers and physical hardware that you can see and touch to remote servers and virtualized...

The new king of content is your password

The new king of content is your password

Working in the United States, when the FBI makes a security recommendation, you probably pay attention. Since February of 2020, the FBI has touted password phrases (aka passphrase) over passwords as more secure. Using long-formed phrases (aka content king) keeps...

3 ways we’re [looking at] using AI and ChatGPT

3 ways we’re [looking at] using AI and ChatGPT

The ‘Christmas Present of the Year (2022)’ goes to OpenAI for ChatGPT! If you haven’t heard of this AI utility yet, you either aren’t reading the news or social media – I may even go as far as suggesting, you are purposely existing inside a vacuum. Riding the...

IAM ready to secure my business (basics)

IAM ready to secure my business (basics)

Identity and Access Management (IAM), made popular through Microsoft security recommendations and expertise creating TLAs (three letter acronyms), allows a business to deliberately control their users’ digital identities and the privileges those identities have to...

Farewell basic authentication

Farewell basic authentication

Starting on October 1st, 2022, Microsoft will be removing the ability to connect into Office 365 using legacy authentication methods. This affects the native mail application on both iPhone and Android, as well as several other connection methods like printers,...

Continuous feedback for continuous improvement

Continuous feedback for continuous improvement

IMS provides a variety of technology services to over two hundred (at the time of writing) businesses on the eastern sea board. From cloud services, to network-as-a-service, to help desk, and business continuity – we cover a large swath of technology needs for...