Microsoft 365 – Planting the Seed of Innovation

J Walter Thompson Unlocking creativity with Microsoft Teams from Digital GTM on Vimeo.   Short Message: From creating ads to giving veterans the prosthetics they need to swim once more, watch how J. Walter Thompson is using #MicrosoftTeams to evolve  This week,...
Security Lessons Learned From the Pandemic

Security Lessons Learned From the Pandemic

As the pandemic rages on, work-from-home orders have been reinstated across the country. When the initial orders came down to have everyone work from home, IT teams rushed to ensure the networks were as secure as possible. Part of this effort was to provide employees...
Top IT Security Threats in 2020

Top IT Security Threats in 2020

Almost every day, we see catastrophic breaches on the news and the subsequent fallout from it. 2020 has seen many cyber criminals step up their sophistication with phishing attacks, ransomware, and IoT-based attacks. To keep from paying enormous legal fees and losing...
Guard Your Business Against COVID-19 Phishing Scams

Guard Your Business Against COVID-19 Phishing Scams

Since COVID-19 started to ravage our way of life, phishing and other cybercrimes have spiked as much as 300%. Much of these scams and attacks have come from campaigns designed to take advantage of the pandemic, and the fear brought on by the disease. With many...
Cybersecurity Best Practices for Remote Employees

Cybersecurity Best Practices for Remote Employees

90% of IT professionals agree that remote work is not secure. However, with the pandemic forcing everyone to work remotely, businesses and IT professionals need to develop solutions that allow remote work to be as secure as working directly in the office (or as close...
Security Vulnerabilities in Mobile Financial Apps

Security Vulnerabilities in Mobile Financial Apps

Most financial apps fail miserably when it comes to protecting their apps, and the customers who use them. These security deficiencies expose the app’s source code, sensitive customer information, and access to backend systems. This article will go over the most...