Card image cap

June 9, 2020 | Lizzie Danielson

Office 365 is Now Microsoft 365- What Does That Mean for Users?

Microsoft recently changed the name of its flagship product from Office 365 to Microsoft 365. According to the software giant, the name change was a part of natural evolution. Microsoft 365 began in 2017 as an enterprise offering that contained a combination of Windows, Office, and Enterprise Mobility and Security.

Continue Reading

Card image cap

June 2, 2020 | Lizzie Danielson

What Is Digital Transformation?

Digital Transformation is about changing the way a business interacts internally and with its customers and creating a process that ensures a consistent experience in a more efficient way.

Continue Reading

Card image cap

May 21, 2020 | Robert Smith

Business Continuity: More than Back Ups

Business Continuity for many organizations ends with the implementation of one solution - a system backup. There are many types of system backup including file-based or imaged based, onsite, or offsite, daily or hourly. And system backups are a major factor in the success of a business’s recovery, but it is not the only component.

Continue Reading

Card image cap

May 19, 2020 | Lizzie Danielson

A Look at the Corsica Technologies Cyber Security Awareness Training Program

Security Awareness training is a form of education where our team of experts provides information and knowledge on how to not get taken advantage of online by cyber threats.

Continue Reading

Card image cap

May 13, 2020 | Peter

Remote Work is the New Normal. Here’s How to Embrace It.

Although many industries have been forced to quickly pivot to a remote workforce due to COVID-19, the shift is not a new one. Over the last five years remote work has seen a 44% growth, over the last decade that number is 91%.

Continue Reading

Card image cap

May 7, 2020 | Peter

Five Ways to Defend Against COVID-19 Scams

From tricking people into revealing sensitive information on social media to requesting donations for fraudulent charities, cybercriminals have been working hard to leverage the hype and fear surrounding COVID-19.

Continue Reading

Card image cap

May 5, 2020 | David Powell

Improving Business Efficiency Post COVID-19

While we do not have all of the answers, we do have some suggestions on ways to improve efficiencies in your business and gain a competitive edge in light of the recent COVID-19 pandemic. There is no playbook for businesses on how to reopen after a pandemic related shutdown, so everyone will be looking for the best path forward.

Continue Reading

Card image cap

April 27, 2020 | Peter

How Social Media Trends are Exposing Your Personal Information

Latest Social Media trends include sharing your senior photo alongside details such as the name of your high school, the year you graduated, and your mascot. Hackers are using these personal details to gain access to your confidential accounts and personal data. Skip the trend and protect your personal data.

Continue Reading

Card image cap

April 20, 2020 | Lizzie Danielson

SHIELD Act Compliance: The Definitive Guide for New York Businesses

SHIELD Act requires companies to implement and maintain reasonable security measures. Affected businesses must deploy safeguards to protect the security, confidentiality, and integrity of private information of New York residents including, but not limited to, secure disposal of data.

Continue Reading

Card image cap

April 17, 2020 | Delano Collins

Why Endpoint Detection & Response is so important for your Remote Workforce

Endpoint Detection & Response (EDR) is a critical tool in combatting cybersecurity threats. The best EDR solutions are used to detect anomalous activity on endpoints (servers, workstations, laptops, and some mobile devices). While some mistakenly assume antivirus does these same things, antivirus only looks for known bad programs that match a specific signature

Continue Reading