Contact
Let's Talk

Microsoft Dynamics GP Blog, Sage 300 Blog, Technology Tips Blog

Technically Speaking

World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers, and everyone in between.

Blog Posts by Joshua Beitler

Josh monitors, updates and troubleshoots network and server systems for clients. He works primarily in Windows Server, Microsoft Office and Office 365 environments, but also has experience with automated network monitoring and data backup solutions. Outside of work, Josh is a wine enthusiast. His technology background resulted in Josh creating an app to log the different wines he’s sampled.

Blog Feature

Cyber Security  |  Networking

How to Protect Your Business From Ransomware

It’s all over the news: the Colonial Pipeline, JBS meat company and Massachusetts Steamship Authority have all been struck down by crippling ransomware attacks. Let’s look at why these cyber attacks are happening and, more importantly, what you need to do to safeguard your business from an attack.

Read More

Blog Feature

Construction & Real Estate  |  Healthcare  |  Manufacturing & Distribution  |  Networking  |  Service Businesses

What Business Owners Need To Know About Cyber Insurance

Cyber attacks continue to be on the rise. That's why organizations are turning to new safeguards to protect their business, and their wallet, from the expense of a cyber attack.

Read More
Subscribe to our blog

Subscribe To Our Blog

With your blog subscription, you'll get a free cyber security awareness guide for you and your team.

Blog Feature

Networking

New Technology Innovations Every Business Should Tap Into

We’ve been deep in this new realm of remote work for more than a year now. Zoom, Microsoft Teams, Slack, GoToWebinar and virtual whiteboards are our daily norm. While software tools often get all the glory because of impressive user interfaces, fun virtual backgrounds and a constant flow of new features, let’s not forget about what powers those tools — hardware. I’m here to pull back the curtain on several tech innovations that will make your organization’s remote users more efficient than ever.

Read More

Blog Feature

Home Cyber Security

How Smart Is Too Smart? 8 Ways To Defend Against A Digital Home Invasion

If you’ve ever seen Disney’s 1999 classic, Smart House, you know that while having a smart house is cool and convenient, it can lead to some messy situations. Sure, there might not be a robot woman wreaking havoc on you and your family as you use home technology. But, the reality is a lot creepier. Our homes are becoming more “smart” every day. With the convenience of adjusting your thermostat from the road, there lies some risk. What if a hacker gets into your thermostat and adjusts the A/C to 60 degrees, making your electric bill skyrocket? What if someone could remotely view your cameras and tell when you were not home? Unfortunately, that is the world we are living in. Now we’re not saying that having a connected smart home is a bad or dangerous thing, but there are several ways you can protect yourself, your family and your home. Let’s start by seeing where home cyber threats are coming in…

Read More

Blog Feature

Networking

The Quick, Easy Steps You Can Take To Fight a Cyber-Criminal Like A Superhero

What do you do when you find someone doing something illegal on the internet? There’s no superhero seeking out cyber criminals on your behalf and sending them off to the police department. You can call the police if you’ve experienced a substantial cyber-crime like a major ransomware hack or identity theft. However, the run-of-the-mill cyber-criminal can steal from you and get away with it for a long time before ever getting caught. You might be surprised to know that there are several effective online tools to report a cyber-criminal. Let’s look at some common cyber-crimes, how to spot them, and what to do about them.

Read More

Blog Feature

Networking

6 Shockingly Effortless Ways To Keep Up On Cyber Security That Even Your Grandma Can Do

With the number of cyber threats targeting your business, cyber security should always be top of mind. With hackers changing their methods so frequently, how can you keep up? Even though cyber attacks are getting more sophisticated, there are a few shockingly effortless ways to keep up on cyber security. In fact, even your grandma can handle these cyber security tactics.

Read More