19 Aug 2021

HIPAA and Network Security

If your practices’ network is hacked, could you say you took all reasonable precautions to prevent it?

Read More
31 Dec 2020

What is the Easiest Way to Prevent Cyber Attacks?

According to Microsoft, their cloud services experience over 300 million fraudulent sign-in attempts every day. If you find this number alarming, you’ll be happy to know that there is a simple[…]

Read More
30 Dec 2020

What is the Difference between a CIO, CTO, and a vCIO?

As a whole, the entire tech industry is rife with acronyms: HTTPS, SMTP, PHP, NOC & SOC…

Read More
17 Sep 2020

Why CyberNews' Printer Hack Proves You Need a vCIO

Has your printer been hacked recently? As reported by Forbes, approximately 28,000 printers were hacked by the group known as CyberNews. Luckily, CyberNews is comprised of ethical hackers — and[…]

Read More
02 Sep 2020

How Do I Upgrade My Business' Remote Capabilities

Looking back at standard business models from a year ago evokes a feeling like reminiscing about a bygone age. Even sixth months ago, the current state of business was believed to be a temporary[…]

Read More
27 Aug 2020

What Are the Three Tiers of Managed IT Services, and Which One Do I Need?

Managed IT services are not a one-size-fits-all deal - so what kind of MITS package could your company benefit from?

Hi, I’m Jeff Blount with Cobb Technologies, and in this video we’re going to[…]

Read More
24 Jun 2020

Backups - What Your Business Needs to Know

We live in a universe dictated by Murphy’s law; anything that can happen, will happen. No matter how secure your business’ network is, eventually, disaster will strike. And when it does, there is[…]

Read More
11 Jun 2020

Your Passwords Could be Plotting Against You - Here's How a Password Manager Can Help

Passwords are the first line of defense against hackers — and often, they are the only measure of security preventing unwanted access to your account.

Read More
04 Jun 2020

What is EDR?

If a thief steals a painting from a museum, the detectives on the case will dust for fingerprints in order to gather information on the identity of the intruder. Then, they’ll take the prints down[…]

Read More
26 May 2020

Can I Replace My Server with Microsoft 365?

If your organization uses an on-site server for emails, application processing, or network controls, it may be time to let that server out to pasture. Why? Because there’s a much more affordable[…]

Read More
1 2 3
»