Contact
Let's Talk

Microsoft Dynamics GP Blog, Sage 300 Blog, Technology Tips Blog

Technically Speaking

World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers, and everyone in between.

Blog Posts by Bill Walter

Bill, our lead networking guru, loves showing clients how technology can be worked into their existing processes to improve efficiency and security. His expertise includes cyber security, high level planning for internal and external networks, , and hands-on installation and configuration of networks. He helps organizations of all types and sizes implement cyber security best practices to protect sensitive data. Normally a pretty easygoing guy, Bill thinks there should be a law against wearing a Bluetooth headset when it’s not in use.

Blog Feature

Cyber Security

The Latest Trends in Cyber Security and Compliance

With the cyber landscape constantly changing, your organization must be alert to today’s biggest threats and what’s on the horizon. You don’t want to face an uphill battle responding to a cyberattack when you could’ve taken proactive measures to keep your organization safe.

Read More

Blog Feature

Cyber Security

Four Strategies to Safeguard Against Emerging Cyber Threats

Cyber security breaches have consistently been on the rise. Hackers are developing new and complex strategies to access your sensitive information. If it doesn’t work the first time, they’re sure to try again.

Read More
Subscribe to our blog

Subscribe To Our Blog

With your blog subscription, you'll get a free cyber security awareness guide for you and your team.

Blog Feature

Cyber Security

Don’t Wait to Update: Apple Security Vulnerabilities

Apple released an emergency software update, iOS 15.6.1, in response to security vulnerabilities in certain versions of their devices, including iPhones, iPads and Mac computers. The vulnerabilities would open the opportunity for a hacker to have full control of these devices.

Read More

Blog Feature

Cyber Security

The Top Cyber Threats for 2022 and How to Protect Your Organization

Bad actors have too many methods to take advantage of vulnerable organizations, and they’re getting more sophisticated with time. That’s why it’s imperative that your organization is aware of potential cyber threats and has the right measures in place to avoid falling victim to an attack.

Read More

Blog Feature

Cyber Security

The Log4j Vulnerability and What You Should Know

At this point, you’ve likely heard about the Apache Log4j vulnerability and the severity of the issue. With all of the buzz around the security flaw, you need to know what exactly the threat is and who it potentially affects.

Read More

Blog Feature

Cyber Security

How to Make Your Home More Cyber Secure

Be it your doorbell, thermostat, garage door or even the new coffee maker, your home likely has several devices and appliances that connect to the internet. It may seem like this capability is an added benefit of these items to modernize your space and make your life easier. Although the connectivity provides an added convenience, each device that hooks up to your home’s Wi-Fi can be troublesome and threaten your overall network security.

Read More