Best practices for working from home

Best practices for working from home

Many of us are now finding ourselves working from home, which has created unfamiliar terrain from what we’re accustomed to, but hackers — who are continuing their activities unabated — may see this time of uncertainty as an opportunity. That’s why you and your...

Take Control Remote Access Instructions

Take Control Remote Access Instructions   NOTE:  Firefox was used to make these instructions.  If you are using another browser like Chrome, Edge or Internet Explorer the screenshots may differ slightly. Login to https://proxycare.proxurve.com Click on the green...

March Events We Recommend

HOW TEXAS MSPS CAN TAKE ADVANTAGE OF THE NEW 2020 CYBERSECURITY REQUIREMENTS FOR REGULATED INDUSTRIES March 17, 2020 - 1 pm EST   If you're a Texas MSP, join us to learn about how you can leverage our pre-certified, white-label cybersecurity training course to grow...

TAX SEASON SCAMS

It's tax season, and that means scammers are BUSY. Cybercriminals are continuing to use their old tricks with email-based scams to target businesses and individuals, but this year, a new scam has emerged, specifically targetting small tax-prep businesses. New scam...

Use Microsoft Authenticator with Office 365

If your organization is using 2-step verification for Office 365, the easiest verification method to use is Microsoft Authenticator. It's just one click instead of typing in a 6-digit code. And if you travel, you won't incur roaming fees when you use it.Choose the...

vCIO and Your IT Team

vCIO and Your IT Team

What is a vCIO? vCIO or Virtual Chief Information Officer is a contractor that serves as your organizations Chief Information Officer. If there is an existing IT department within your organization, the vCIO advises and...