Contact
Let's Talk

Microsoft Dynamics GP Blog, Sage 300 Blog, Technology Tips Blog

Technically Speaking

World-class insights from Gross Mendelsohn's technology consultants for executives, IT managers, and everyone in between.

Blog Feature

Construction & Real Estate  |  Cyber Security  |  Government Contractors  |  Healthcare  |  Manufacturing & Distribution  |  Networking  |  Nonprofit  |  Service Businesses

Fend Off Cyber Attacks With Webroot Evasion Shield

Business owners continue to learn the importance of going on the offensive to fend off cyber attacks. Unfortunately, many learn the hard away — after they’ve experienced a costly attack. With a slew of cyber security products hitting the market over the last few years, it’s hard to know which ones to select for your business. I’m here to fill you in on one of my favorite security tools.

Read More

Blog Feature

Construction & Real Estate  |  Cyber Security  |  Government Contractors  |  Healthcare  |  Manufacturing & Distribution  |  Networking  |  Nonprofit  |  Service Businesses

One More Reason to Test Your Organization’s Cyber Security, For Real

Another malicious cyber attack was reported just before the July 4 holiday weekend. This one hit close to home here at Gross Mendelsohn. Before I go into the details, rest assured that we were not affected. This massive ransomware attack is one of many recent incidents that provides further proof that every business needs to take cyber security seriously, and put measures into place to prevent a disastrous attack.

Read More
Subscribe to our blog

Subscribe To Our Blog

With your blog subscription, you'll get a free cyber security awareness guide for you and your team.

Blog Feature

Cyber Security  |  Networking

How to Protect Your Business From Ransomware

It’s all over the news: the Colonial Pipeline, JBS meat company and Massachusetts Steamship Authority have all been struck down by crippling ransomware attacks. Let’s look at why these cyber attacks are happening and, more importantly, what you need to do to safeguard your business from an attack.

Read More

Blog Feature

Networking

New Technology Innovations Every Business Should Tap Into

We’ve been deep in this new realm of remote work for more than a year now. Zoom, Microsoft Teams, Slack, GoToWebinar and virtual whiteboards are our daily norm. While software tools often get all the glory because of impressive user interfaces, fun virtual backgrounds and a constant flow of new features, let’s not forget about what powers those tools — hardware. I’m here to pull back the curtain on several tech innovations that will make your organization’s remote users more efficient than ever.

Read More

Blog Feature

Cyber Security  |  Networking

What You Need to Know About the Microsoft Exchange Zero-Day Exploit

If you haven’t heard the news, there is a major zero-day exploit quickly spanning the globe. A zero-day exploit is an advanced cyber attack that exposes a vulnerability in software/hardware, which can create a series of complications before it is detected. Until the vulnerability is remediated, hackers can exploit it affecting your data and network. The most recent exploit is targeting local installations of Microsoft Exchange. Once attackers find a vulnerable Exchange server, they gain a foothold on that server and attempt to mine your data.

Read More

Blog Feature

Networking

3 Questions You Need To Ask About Your Managed Services Contract Before You Sign

You have many options when searching for the best managed services IT provider for your company. Finding the right fit can be overwhelming and stressful. Not to mention costly if you make the wrong choice. Here are three questions you should ask prospective tech companies before signing on the dotted line.

Read More