Blog

Why have a managed firewall (UTM)? 4 reasons.

We’ve seen it happen. Maybe the person responsible for your company’s IT and firewall management recently retired or left. No one else really ever had to pay much attention to this stuff, so what happens now? Actually, the term “firewall” is dated. If you’re doing it right, it’s actually a Universal Threat Management (UTM) security…
Read more

5 Tips for Detecting and Avoiding a Phishing Attack

Ever wonder why Carmen and Ken get way more malware alerts than any other user on your network? Are they loose cannons creating preventable problems for you? There are a few ways for you to help get this under control. It turns out some people are pretty gullible when it comes to email, because after…
Read more

Is someone getting fake email from you?

“Someone has hacked our email!” We frequently hear from administrators and users freaked out because their contacts are receiving janky email that looks like it’s from them or their company when it most definitely isn’t. Usually that bogus email also includes a link that is oddly and irresistibly compelling for the recipient to click. A…
Read more

EMAIL AS A SERVICE?

Many businesses use email as a service. The economics can be very compelling. Email as a service is simply defined as getting your email delivered from a company centrally hosting a mail server and software. Another common method is to have your own email server and software. If you’re already using an email service I…
Read more