12 Days of Tech-mas from Your Favorite IT Company

  1. Lack of or gaps in security awareness training
  2. Not using Multifactor Authentication
  3. Little or no Endpoint Management
  4. Fully or hybrid remote workforce that is unsecure:
  1. Accessible help that keeps you productive
  2. Insider knowledge about doing business in Tucson
  3. Better customer service
  4. More cost-effective
  5. More time to run your business

On the sixth day of Tech-mas my MSP gave to me: 6 technology must-haves

These days, business technology is in a state of flux. Digital transformations, a pandemic, and security breaches have made selecting the proper technology partner more than simply a matter of staying current — it’s also about staying connected to customers and keeping your competitive edge. Here is what you need to have to maintain that connection:

On the seventh day of Tech-mas my MSP gave to me: 7 password reset requests

Did you know that the average person has over 100 passwords? Password reset requests are one of the most common service requests we receive. Most people use the same simple password for a variety of accounts, both personal and professional. And we

On the eighth day of Tech-mas my MSP gave to me: 8 ways to measure cyber resilience

We now work from anywhere, on a wider range of devices and networks, and are exposed to more and greater threats than ever before. The way we think about protecting our organizations and data hasn’t kept pace. While defensive cyber security is being deployed by businesses, in the face of more sophisticated attacks, these safeguards are proving inadequate. We need both cyber resilience and cyber security, and it’s critical to know the difference. Check out this article from the World Economic Forum.

  1. Determining your most valuable assets and crucial talents.
  2. Examine your system’s interconnection and how exposed you are to an attack.
  3. Adapting to the broader social and political environment more swiftly.
  4. Forming partnerships with neighbors, competitors, and agencies.
  5. Examine how your team recruits and develops talent.
  6. Shifting your mindset so that you’re not just securing your business, but also empowering it through security.
  7. Assessing whether a culture of security and adaptability is being maintained.
  8. Measuring customer transparency and trust.

On the ninth day of Tech-mas my MSP gave to me: 9 Ladies Leading

Change is rarely simple or pleasant, but we can all play a role in promoting it by tackling bias and inequity. This year, we’re focusing on the outstanding women leaders who exemplify the #ChooseToChallenge slogan in order to make actual, positive changes in our Tucson community. Check out the 9 ladies we have featured so far in this campaign.

On the tenth day of Tech-mas my MSP gave to me: 10 Techy Terms

We’re increasingly likely to hear tech language in our daily discussions as technology becomes more integrated with our professional and social lives. In honor of Cyber Security Awareness Month in October, I had compiled a list of the top 10 IT security terms you should know ( get all the details on the October blog):

1) Firewall

2) Multi-Factor Authentication (MFA)

3) Malware

4) Cloud Backup

5) Single Sign-On (SSO)

6) Principal of Least Privilege

7) Data Privacy

8) Managed Service Provider

9) Remote Desktop Connection (RDC)

10) Social Engineering

On the eleventh day of Tech-mas my MSP gave to me: 11 new workstations

With the nation pushed to remote and hybrid workforces, The standard approach of purchasing and setting up new hardware based on whatever fits your current need is no longer advisable. In an uncertain environment, there’s no guarantee that your actual hardware needs will stay the same or deliver a return on that major capital investment. Take a look at these resources, where I cover some strategies for keeping your hardware current with Hardware as a Service, and how to budget for it.

On the twelfth day of Tech-mas my MSP gave to me: a password with at least 12 characters

Most people use the same simple password for a variety of accounts, both personal and professional. This makes it simple to guess the password. A long mixture of numbers, letters, and symbols is required for a secure password. Check out my post on more areas you can improve your IT security.



Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store