by Steve Bowman | Oct 31, 2018 | Cyber Security
Estimated Reading Time: 4 minutesKnowing where users login, and when, can be a very useful tool, especially when it comes to an organization’s cybersecurity efforts. For example, you could potentially spot when a user account has been compromised, or when a user has a...
by Steve Bowman | Oct 17, 2018 | Windows 10
Estimated Reading Time: 4 minutesThis is something I hear (or see) often when working with clients. They have a bunch of machines running Windows 7, but they need to invest in some new hardware…all of which comes with Windows 10. So now they are operating in an...