Begin Your Privacy Program with These Steps
Blogs / Although you may not have a regulatory or legal obligation to establish a privacy program for your organization, it is in your best
Begin Your Privacy Program with These Steps Read More »
Blogs / Although you may not have a regulatory or legal obligation to establish a privacy program for your organization, it is in your best
Begin Your Privacy Program with These Steps Read More »
Blogs / The Davey Awards exclusively honor the “Davids” of creativity, the finest small shops, firms and companies worldwide. David defeated the giant Goliath with
American Technology Services Wins Two Davey Awards Read More »
Blogs / There has been some commotion lately regarding Microsoft’s Managed and Virtualized Windows Desktop announcements. It may appear at first glance that both revolve around Microsoft’s modern
Microsoft Managed Desktop (MMD) vs. Windows Virtual Desktop (WVD): How do they Differ? Read More »
Blogs / Unfortunately, there is no single correct answer to the CSP vs. EA question, since it depends on your organization’s specific needs for quantities,
Microsoft’s EA Versus CSP Licensing, Which Option is Better for Your Organization? Read More »
Blogs / New cybersecurity threats emerge in the news every week, it seems, and new terms attached to these threats become part of our lexicon.
What’s a DDoS Attack and How Can My CPA or Law Firm Avoid One? Read More »
Blogs / On June 28, 2018 California Governor Jerry Brown signed into law the California Consumer Privacy Act of 2018 which goes into effect on
U.S. Consumer Privacy Regulations: California’s Consumer Privacy Act of 2018 Read More »
Blogs / The digital landscape is evolving rapidly, and so are the methods we use to secure our online identities. Traditional passwords, once the bedrock
A Password-less Future: Navigating the Shift in Digital Authentication Read More »
Blogs / Just because you’ve invested in the latest and greatest IT tools and security measures doesn’t guarantee safety from hacks and incidents. Tech only
Cybersecurity and IT Terms Everyone Should Know, Q to Z Read More »
Blogs / Ghosts and ghouls are very spooky, but nothing is more frightening than realizing a cyberattack has targeted you. Be wary of these common
7 Scary Cybersecurity Threats to Avoid this Halloween Read More »
Blogs / It has become a matter of when – not if – an incident will occur. A cyber or security incident is an event
How can Organizations Prepare for a Security Incident? Read More »