by Steve Bowman | Feb 3, 2025 | Case Studies, Manufacturing
Estimated Reading Time: 3 minutesThe hard reality is there’s often enough IT work for a hundred engineers, but only one or two to handle it all. Small IT budgets and a lack of available talent make it hard for manufacturing companies to find skilled, affordable...
by Jason Rutherford | Aug 30, 2024 | Cyber Security, Manufacturing
Estimated Reading Time: 10 minutesIn manufacturing, keeping your production line running smoothly and safely is the top priority. Your IT team plays an important role in making sure that new technologies like the Internet of Things (IoT) and cloud computing enable...
by Mike Brimberry | Jul 9, 2024 | Cyber Security, Legal Services
Estimated Reading Time: 5 minutesAs a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for cybercriminals. According to the American Bar Association (ABA), “25% of law firms have experienced a data breach at some point”...
by Mike Brimberry | Mar 14, 2023 | Cyber Security
Estimated Reading Time: 4 minutesPhishing is a form of fraud in which an attacker masquerades as a reputable person or company in email or other electronic communication channels. A common phishing tactic is to send an email with a forged return address, so that the...
by Jesse Walter | Dec 9, 2021 | Cyber Security, Endpoint Management
Estimated Reading Time: 3 minutesThis post is a short overview of how you can use Microsoft Defender for Identity to investigate high-alert users in your environment. If your active directory is a little bit spread out, using Microsoft Defender for Identity will allow...