Connect2geek.com Logo
CALL US
208-468-4323
FOLLOW US
  • Home
  • About
  • Services
    • Protect IT
    • Home Services
    • Business Services
    • Managed Cybersecurity for Microsoft 365
  • Testimonials
  • Blog
  • Contact
  • Support
    • Book a Time
    • New Client Form (Residential)
    • New Client Form (Business)
    • Customer Portal
    • Download Remote Support Tool
  • Hire Us

Remote Team Security Tip: Put IoT Devices on their Own Wi-Fi Network

May 25, 2022 by Glen Michaelson

Remote Team Security Tip: Put IoT Devices on their Own Wi-Fi Network

Most companies have now settled into the flow of having remote workers. Since the pandemic, remote work and hybrid teams have become the new normal. But when it comes to cybersecurity, companies are still figuring a few things out. [Read more…]

Filed Under: Blog Post

Share:

7 Important Ways to Prevent a Cloud Data Ransomware Infection

May 18, 2022 by Glen Michaelson

7 Important Ways to Prevent a Cloud Data Ransomware Infection

Ransomware can strike data no matter where it resides. On employee devices, company servers, and in cloud storage and SaaS (Software as a Service) platforms. [Read more…]

Filed Under: Blog Post

Share:

What Is the Best Training Interval for Employee Security Awareness Training?

May 11, 2022 by Glen Michaelson

What Is the Best Training Interval for Employee Security Awareness Training?

Any strong, reliable company cybersecurity strategy will include layers of different types of protection. Including device protections, network security, and cloud-based security. One protection that is just as important as all the others is employee security awareness. [Read more…]

Filed Under: Blog Post

Share:

SMS Phishing (Smishing) Is On the Rise! Here’s What to Look Out For

May 4, 2022 by Glen Michaelson

SMS Phishing (Smishing) Is One the Rise! Here's What to Look Out For

Most people are aware that they will get phishing emails in their inboxes. Email scams have been around for decades now, and people often will pause before they interact with an email that looks in any way suspicious. [Read more…]

Filed Under: Blog Post

Share:

Learn About the Microsoft Power Platform & How It Can Take You to the Next Digital Level

April 27, 2022 by Glen Michaelson

Learn About the Microsoft Power Platform & How It Can Take You to the Next Digital Level

In today’s world, often what makes one business stand out from its competitors is how well it can leverage technology. This has benefits both for company productivity and for the customer experience it provides. [Read more…]

Filed Under: Blog Post

Share:

Biggest Threats to Mobile Device Security You Need to Watch Out For

April 20, 2022 by Glen Michaelson

Biggest Threats to Mobile Device Security You Need to Watch Out For

How often do you use your mobile phone instead of a computer for things like checking email? Accessing social media? Checking in on your company’s team messaging app? [Read more…]

Filed Under: Blog Post

Share:

Why Do You Need to Include RPO & RTO in Your Disaster Recovery Plan?

April 13, 2022 by Glen Michaelson

Why Do You Need to Include RPO & RTO in Your Disaster Recovery Plan

When most business owners consider a business continuity and disaster recovery plan, they immediately think of cloud backup services.  Backup and recovery are vital to ensuring your company can recover from an event such as a ransomware attack, hard drive crash, or other data loss incident.  [Read more…]

Filed Under: Blog Post

Share:

5 Exciting Trends Happening in Cloud Storage That Your Business Can Benefit From

April 6, 2022 by Glen Michaelson

5 Exciting Trends Happening in Cloud Storage That Your Business Can Benefit From

One area of cloud services that has continued to grow since it was first introduced in the late 1990s is cloud storage. The market is expected to grow from 76.43 billion in 2021 to 390.33 billion in 2028. That is an increase of over 410%. [Read more…]

Filed Under: Blog Post

Share:

What Is “Passwordless” Security & Why Is It Becoming a Standard?

March 30, 2022 by Glen Michaelson

What Is "Passwordless" Security & Why Is It Becoming a Standard?

One of the drumbeats you may have heard us sounding lately is the dangers of credential compromise. Breached passwords unlock a treasure trove of company resources, and it’s an area of attack that has become increasingly dangerous. [Read more…]

Filed Under: Blog Post

Share:

4 Key Pillars to Build a Strong Cloud Security Environment

March 23, 2022 by Glen Michaelson

4 Key Pillars to Build a Strong Cloud Security Environment

With cloud adoption nearly at 100% for most companies, data has moved largely from on-premises systems to cloud-based environments. Likewise, the software that many companies rely on (QuickBooks Online, Salesforce, Microsoft 365, etc.) is also largely based in the cloud. [Read more…]

Filed Under: Blog Post

Share:

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 21
  • Next Page »

Services

  • VoIP Services
  • Computer Repair
  • Network Support
  • Data Recovery
  • Managed Services
  • Office 365
  • 24/7 Monitoring
  • Managed Cybersecurity Services
Click to Protect Your PC Now Webinars hosted by Glen Michaelson

FOLLOW US

Copyright © 2025 · Connect2geek.com