Technically Speaking
World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers, and everyone in between.
Cloud Productivity and Collaboration | Networking
Adopting a new technology tool can sometimes feel like more trouble than it’s worth because of the steep learning curve. It’d be nice if everything you already knew how to use was simply ushered into the next tool. You’re used to current workflows, but you can’t completely forgo the efficiencies that come with the latest in cloud technologies, especially when growing your business. Luckily, Microsoft Windows 365 combines the power and security of the cloud with the versatility and simplicity of the PC.
Share
Construction & Real Estate | Cyber Security | Government Contractors | Healthcare | Manufacturing & Distribution | Networking | Nonprofit | Service Businesses
Business owners continue to learn the importance of going on the offensive to fend off cyber attacks. Unfortunately, many learn the hard away — after they’ve experienced a costly attack. With a slew of cyber security products hitting the market over the last few years, it’s hard to know which ones to select for your business. I’m here to fill you in on one of my favorite security tools.
Share
With your blog subscription, you'll get a free cyber security awareness guide for you and your team.
Construction & Real Estate | Cyber Security | Government Contractors | Healthcare | Manufacturing & Distribution | Networking | Nonprofit | Service Businesses
Another malicious cyber attack was reported just before the July 4 holiday weekend. This one hit close to home here at Gross Mendelsohn. Before I go into the details, rest assured that we were not affected. This massive ransomware attack is one of many recent incidents that provides further proof that every business needs to take cyber security seriously, and put measures into place to prevent a disastrous attack.
Share
It’s all over the news: the Colonial Pipeline, JBS meat company and Massachusetts Steamship Authority have all been struck down by crippling ransomware attacks. Let’s look at why these cyber attacks are happening and, more importantly, what you need to do to safeguard your business from an attack.
Share
We’ve been deep in this new realm of remote work for more than a year now. Zoom, Microsoft Teams, Slack, GoToWebinar and virtual whiteboards are our daily norm. While software tools often get all the glory because of impressive user interfaces, fun virtual backgrounds and a constant flow of new features, let’s not forget about what powers those tools — hardware. I’m here to pull back the curtain on several tech innovations that will make your organization’s remote users more efficient than ever.
Share
If you haven’t heard the news, there is a major zero-day exploit quickly spanning the globe. A zero-day exploit is an advanced cyber attack that exposes a vulnerability in software/hardware, which can create a series of complications before it is detected. Until the vulnerability is remediated, hackers can exploit it affecting your data and network. The most recent exploit is targeting local installations of Microsoft Exchange. Once attackers find a vulnerable Exchange server, they gain a foothold on that server and attempt to mine your data.
Share