Contact
Let's Talk

Microsoft Dynamics GP Blog, Sage 300 Blog, Technology Tips Blog

Technically Speaking

World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers, and everyone in between.

Blog Posts by Joshua Beitler

Josh monitors, updates and troubleshoots network and server systems for clients. He works primarily in Windows Server, Microsoft Office and Office 365 environments, but also has experience with automated network monitoring and data backup solutions. Outside of work, Josh is a wine enthusiast. His technology background resulted in Josh creating an app to log the different wines he’s sampled.

Blog Feature

Cyber Security

Password Managers for Families

We live in a digital age with usernames, passwords, biometric logins and so much more. Like it or not, it’s here to stay. But having all these passwords can be confusing and frustrating. How do you keep track of them all? And how do you make sure they’re secure enough to fend off hackers?

Read More

Blog Feature

Cyber Security

What’s Included In the New WatchGuard EPDR

When thinking about anti-malware products, most people think Norton, McAfee, Webroot, Trend Micro and so on, but not too many people think of WatchGuard. Don’t they just make firewalls? Actually, that’s no longer the case. For years, WatchGuard has had anti-malware software that talks to the firewall, known as Threat Detection and Response (TDR). With TDR already in place, why would you also need Endpoint Protection Detection and Response (EPDR)? The truth is, EPDR could be the layer of protection that puts you ahead of sophisticated threats when other anti-malware measures miss the mark.

Read More
Subscribe to our blog

Subscribe To Our Blog

With your blog subscription, you'll get a free cyber security awareness guide for you and your team.

Blog Feature

Cyber Security

Paying Ransom On a Ransomware Attack Is Illegal

What would be your first reaction if your business got hit with a ransomware attack? Many business owners would jump to pay the ransom, as it seems like the quickest and most painless way to get operations back to normal.

Read More

Blog Feature

Cloud Productivity and Collaboration  |  Networking

Windows 365 vs Azure VDI: What’s the Difference?

Adopting a new technology tool can sometimes feel like more trouble than it’s worth because of the steep learning curve. It’d be nice if everything you already knew how to use was simply ushered into the next tool. You’re used to current workflows, but you can’t completely forgo the efficiencies that come with the latest in cloud technologies, especially when growing your business. Luckily, Microsoft Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC.

Read More

Blog Feature

Construction & Real Estate  |  Cyber Security  |  Government Contractors  |  Healthcare  |  Manufacturing & Distribution  |  Networking  |  Nonprofit  |  Service Businesses

Fend Off Cyber Attacks With Webroot Evasion Shield

Business owners continue to learn the importance of going on the offensive to fend off cyber attacks. Unfortunately, many learn the hard away — after they’ve experienced a costly attack. With a slew of cyber security products hitting the market over the last few years, it’s hard to know which ones to select for your business. I’m here to fill you in on one of my favorite security tools.

Read More

Blog Feature

Cyber Security  |  Networking

How to Protect Your Business From Ransomware

It’s all over the news: the Colonial Pipeline, JBS meat company and Massachusetts Steamship Authority have all been struck down by crippling ransomware attacks. Let’s look at why these cyber attacks are happening and, more importantly, what you need to do to safeguard your business from an attack.

Read More