How To Use CIS Cybersecurity Controls
Small to mid sized organizations face many challenges, including shifting supply chains, staffing shortages, produc…
Print Security Report Reveals 6 Need-To-Know Stats
Watch out – Quocira’s annual report on the state of print security is out, and it is a stark reminder of the work n…
My Summary of Verizon’s 2024 Data Breach Investigations Report (DBIR)
The Verizon Data Breach Investigations Report (DBIR) has been published annually for the past 17 years. It provides…
Trends in Business Process Automation
For many of us, “automation” conjures up images of the first automobile assembly lines. For others, the word sparks…
CrowdStrike Global Outage
This morning, a faulty update from CrowdStrike caused systems to encounter a Blue Screen of Death (BSOD) error on W…
How To Implement Unified Communications as a Service
Unified Communications as a Service (UCaaS) can be a real game changer, and these platforms tend to be extraordinar…
The Rise of Business-Led IT
Have you ever gotten exactly what you wished for and not loved the result? Well, that’s what’s been happening for a…
The Best Print Management Software Programs for Your Business
Between constant toner replacements, paper jams, unauthorized print jobs, and the overhead costs of managing a flee…
Cloud Computing Basics
Cloud computing is quickly becoming the new normal, and for good reason. It can save you serious money, it allows y…