Making the change to remote work?
We're happy to help you stay connected

Learn more
View post: Why Add Cloud Backup — Now More Than Ever
, , , , , ,

Why Add Cloud Backup — Now More Than Ever

Posted on February 16, 2021

Intermedia Backup for Microsoft 365 is a flexible, agile, and reliable solution that offers comprehensive data protection across the full Microsoft 365 tenant

View post: Introducing Advanced Email Security
, , ,

Introducing Advanced Email Security

Posted on April 27, 2016

Earlier this year, Intel® Security announced end of life for a large number of McAfee® SaaS security services, including email protection and continuity services sold by Intermedia within […]

View post: Does your email solution meet the New Standard?
, , , , ,

Does your email solution meet the New Standard?

Posted on March 28, 2016

Email solutions have come a long way. I remember when we all used on-premises Exchange servers, when that was the height of high tech for corporate email. Now, of course, we’re told […]

View post: New email encryption templates make it easier to protect sensitive information
, , , ,

New email encryption templates make it easier to protect sensitive information

Posted on February 2, 2016

Now healthcare, financial services and legal services customers can more easily encrypt sensitive data Regulations such as HIPAA, GLBA and TILA-RESPA identify specific types of information […]

View post: Make sure your users are educated about cybersecurity risks
, , ,

Make sure your users are educated about cybersecurity risks

Posted on January 4, 2016

I read about it all the time in the news…another company falls victim to cybercrime. Whether it’s a phishing attack or a hacked password, your company can be vulnerable if you […]

View post: 5 Ways Your Email Could Be At Risk
, , , , , ,

5 Ways Your Email Could Be At Risk

Posted on December 15, 2015

Nearly all businesses rely on email to assist with day-to-day activities. But many businesses haven’t addressed new and seemingly unavoidable vulnerabilities.  If you are running an […]

View post: The Business World’s Riskiest User Will Surprise You
, , , , ,

The Business World’s Riskiest User Will Surprise You

Posted on December 14, 2015

And your customers need to know. Educate them on how to combat risky user security practices and manage access to IT services during employment – and after employment ends. In our 2015 […]

View post: Ryan Barrett talks IT risk management and compliance with Michael Heller at TechTarget
, , , ,

Ryan Barrett talks IT risk management and compliance with Michael Heller at TechTarget

Posted on December 8, 2015

As we start planning for 2016, I’m sure a lot of us will be focused on “doing more with less”. That includes streamlining processes and finding ways to speed up […]

View post: McAfee Transition Plan
, ,

McAfee Transition Plan

Posted on December 2, 2015

Recently, Intel® Security announced they were retiring a large number of McAfee® SaaS security services, including email protection and continuity services currently sold by Intermedia […]

View post: What is “Autodiscover”—and why do I need it?
, , ,

What is “Autodiscover”—and why do I need it?

Posted on September 8, 2015

The Microsoft Exchange environment can be quite complicated. There are a ton of Fully Qualified Domain Names (FQDNs) for servers, which gives you a lot to memorize when you configure clients […]

View post: Fighting the toughest battle in Cybercrime: Spear phishing
,

Fighting the toughest battle in Cybercrime: Spear phishing

Posted on April 24, 2015

Introduction:  Just last week CBS ran a 60 Minutes segment about the cyber-attack on Sony Pictures, and it brought to light the dangers of phishing. Specifically, it highlighted a tactic […]