Contact
Let's Talk

Microsoft Dynamics GP Blog, Sage 300 Blog, Technology Tips Blog

Technically Speaking

World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers, and everyone in between.

Blog Posts by Joshua Beitler

Josh monitors, updates and troubleshoots network and server systems for clients. He works primarily in Windows Server, Microsoft Office and Office 365 environments, but also has experience with automated network monitoring and data backup solutions. Outside of work, Josh is a wine enthusiast. His technology background resulted in Josh creating an app to log the different wines he’s sampled.

Blog Feature

Cyber Security

Prioritizing Cyber Security in the Wake of Disaster

The conflict in Ukraine should serve as a reminder to review your cyber security, backup/disaster recovery and business continuity plans. Forbes reported that “immediately after the conflict broke out, suspected Russian-sourced cyberattacks were observed over a 48-hour period at an increase of over 800%.”

Read More

Blog Feature

Cloud Productivity and Collaboration

The Benefits and Magic of Virtualization 2.0

Back in January of 2017, I wrote a blog post called “The Benefits and Magic of Virtualization for your Organization’s Computer Network.” Over five years have gone by, and since then, a lot has changed. We’ve been through a pandemic that pushed a lot of people into a 100% virtual world. It’s time to bring you up to speed on what has changed, what hasn’t changed and what’s new and exciting in the world of virtualization.

Read More
Subscribe to our blog

Subscribe To Our Blog

With your blog subscription, you'll get a free cyber security awareness guide for you and your team.

Blog Feature

Cyber Security

Cyber Monday: 5 Tips To Keep You Safe This Online Shopping Season

With the holidays right around the corner, we’ve put together a few tips and tricks to look out for while doing your online shopping. In recent years, online shopping has grown exponentially in comparison to shopping in-person - and bad actors are aware of this shift. They will be working overtime to try and scam you, steal your credit card, get their hands on your banking or personal information and a whole lot more. But you don’t have to fall victim to their tactics.

Read More

Blog Feature

Cyber Security

Tips and Tricks for Cyber Security Awareness Month

It’s October and that means one thing. Well, it actually means a few things: Halloween, hayrides, pumpkins and spice and everything else that’s nice. But October is also Cyber Security Awareness Month. The Cybersecurity & Infrastructure Security Agency’s (CISA) theme for this October is “Do your part. #BeCyberSmart.”

Read More

Blog Feature

Cyber Security

Password Managers for Families

We live in a digital age with usernames, passwords, biometric logins and so much more. Like it or not, it’s here to stay. But having all these passwords can be confusing and frustrating. How do you keep track of them all? And how do you make sure they’re secure enough to fend off hackers?

Read More

Blog Feature

Cyber Security

What’s Included In the New WatchGuard EPDR

When thinking about anti-malware products, most people think Norton, McAfee, Webroot, Trend Micro and so on, but not too many people think of WatchGuard. Don’t they just make firewalls? Actually, that’s no longer the case. For years, WatchGuard has had anti-malware software that talks to the firewall, known as Threat Detection and Response (TDR). With TDR already in place, why would you also need Endpoint Protection Detection and Response (EPDR)? The truth is, EPDR could be the layer of protection that puts you ahead of sophisticated threats when other anti-malware measures miss the mark.

Read More