CONTACT
Menu
Support
Contact

The Springboard / Endpoint Protection (2)

by Elaine Evans, on Jan 14, 2020 4:57:40 PM

You may have heard of the California Consumer Privacy Act and know that it is bringing more stringent data protection laws than we’ve seen yet. And, while its name leads …

Read Story
Topics:InsiderNetwork ManagementTech TipsEndpoint ProtectionBusiness TipsDevice ManagementRansomwareManaged servicestwo-step verificationransomware attackCo-Managed ServicesBest Practices

by Duncan McNabb, on Mar 6, 2019 8:18:00 AM

In 2019, Ransomware continues to be the leading form of cyber attack for small and medium businesses. During the period from Q2 2016 to Q2 2018, more than three-quarters (79%) …

Read Story
Topics:Tech TipsEndpoint ProtectionRansomware

A Blog for Businesses That Use Apple

Our blog is dedicated to educating our clients and potential clients about all things Apple IT-related but in real-world capacity. So, we talk about Mac management, but we also talk about ways to teach your employees about phishing. We highlight topics surrounding our Best Practices for Managing Apple IT in Business.  Learn More  >

Get Apple IT tips for your business straight to your inbox (do it!)