Uncategorized Articles

How to Understand URLs to Identify Phishing

How to Understand URLs to Identify Phishing

Despite an ever-changing digital world, email remains one of the most popular forms of communication. As a result, cybercriminals have come up with new and creative ways to use email to scam you out of personal or customer-sensitive information. In this post, we cover how to prevent phishing scams by learning how to read URLs.

Remote IT Management and Culture

Remote IT Management and Culture

With remote work here to stay, business leaders need to pay particular attention to how their IT programs are impacting company culture. In this article, we’ll explore the role of technology in remote company culture.

Using Jamf Pro and MDM for Schools

Using Jamf Pro and MDM for Schools

John Wetter is the Technical Services Manager at Hopkins Public Schools in Michigan, a network of four schools that services grades K through 12 in the Hopkins school district. While attending the Jamf Nation User Conference (JNUC) in 2015, he was...

Reactive vs Proactive IT Solutions

The most operationally mature Managed Service Providers (MSPs) take a Proactive approach to IT – it's better for them and better for you. Introduction Many businesses take a reactive, break-fix approach to their IT support, essentially waiting until something breaks...