Detecting Phishing: The SLAM Method

By |2023-12-29T15:32:24-06:00December 29th, 2023|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , |

Business email compromise scams, commonly called “phishing,” are one of the biggest threats to businesses today. Over 90% of data [...]

Comments Off on Detecting Phishing: The SLAM Method

On-Premises Microsoft Exchange Vulnerability – Another Reason to Switch to Office 365

By |2021-03-09T17:51:01-06:00March 9th, 2021|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , |

On March 3, 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) issued an Emergency Directive regarding vulnerabilities in on-premises [...]

Comments Off on On-Premises Microsoft Exchange Vulnerability – Another Reason to Switch to Office 365

Benefits of Office 365

By |2017-01-19T09:14:30-06:00June 6th, 2014|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , |

Let’s face it: Microsoft Office products rule the workplace. Whether it’s documenting last quarter’s expenses in an Excel spreadsheet or [...]

Comments Off on Benefits of Office 365

The End of Windows Small Business Server

By |2017-01-19T09:14:33-06:00August 27th, 2012|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , , , , |

Yes, you heard right, after 25 years with the same logo, Microsoft has finally revealed a new look. “Out with [...]

Comments Off on The End of Windows Small Business Server

Why Hosted Email?

By |2017-01-19T09:14:35-06:00September 30th, 2011|Categories: All Blogs, Software and Solutions|Tags: , , , , , , , , , , , , , , , , , , , , , , , , |

There was a time we thought doing everything in-house and being self sufficient was the only way to go. Unfortunately, [...]

Comments Off on Why Hosted Email?
Go to Top