There is a shift happening in the marketplace where businesses are increasingly choosing to outsource part of their IT to Managed Service Providers. For many larger businesses, it is not effective to keep all IT roles in house, or there isn’t enough budget for projects and people. So, IT managers choose co-managed IT. After 150+ […]
Author Archives: Dawn Sizer
In the past, businesses either had an internal IT person/team or they worked with an outsourced IT company that provided Break/Fix or Managed IT Services. As the model has developed, businesses are finding it advantageous to have a combination of in-house and outsourced IT. For instance, they may not have the budget or need for […]
Microsoft 365 VS Google Workspace
Most companies have had at least one server on their network. The network servers’ main purpose in life is to authenticate users, store files, send print jobs to the printers, and handle some security measures. All that is great stuff. But the real question is, can my company move to SharePoint only from having a […]
I’m sure you’ll agree with me when I say most people get an email in, skim it, and then maybe delete it. Most often that email sits in the inbox or gets filed in a folder so it is out of sight and out of mind, never to see any action again. Your information becomes […]
In part 1 of this article, IT Plans, Assessments, and Asset Management we learned about IT Plans and Strategy. If you haven’t read that yet, go back and give it a read. It will help to have that information before we talk about IT budgets and asset management. How do IT leaders forecast and budget […]
IT plans, assessments, and asset management are the foundation of any IT department. The scope is typically vast and spread across technologies, business areas, and people. Developing a strategic plan is a critical asset for the business as it outlines how IT will support the key business goals set by your company. It also describes […]
The Health Insurance Portability and Accountability Act (HIPAA) Security Rule requires that covered entities and their business associates conduct a risk assessment of their healthcare organization. A risk assessment helps your organization ensure it is compliant with HIPAA’s administrative, physical, and technical safeguards. A risk assessment also helps reveal areas where your organization’s protected health […]
Do you remember iconic films like Hackers, WarGames, or The Matrix? In each, we watched computer whiz after computer whiz work magic on a keyboard to hack some corporation, win a game, or download extra Kung Fu knowledge and beat the bad guys. Movies about cybersecurity and computer hacking seem to have slipped into the […]
Is it really necessary? Yes. Cyber Insurance is a core coverage for every business. The cost of cyber incidents often exceed several million dollars. You must take into consideration the cost of lost data, the cost to restore your systems, the cost to notify and insure thousands of affected customers, damage to your reputation, etc. […]