<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

Three Cybersecurity Best Practices for Your Firm

Proper education can help in preventing any of the cybersecurity attacks described in the 411 on Cybersecurity and Your Firm. While it is true that your IT department plays a vital role in ensuring your firm follows cybersecurity best practices, that does not mean they alone are responsible for your firm’s security. Awareness of and participation in cybersecurity best practices need to become part of your firm’s culture for every single person. Here are three things you can do.

Three Benefits of Becoming a Tabush Group Channel Partner

A question you may be asking yourself is why should my firm become a Channel Partner with Tabush Group? In today’s marketplace, joining a Channel Partner program can be quite attractive. Here are three benefits of Tabush Group’s Channel Partner program.

Blackberry, Hybrid, and (Even More!) Cybersecurity

People often ask me what's on my mind, what I'm working on, and what's "new and exciting." Since I'm not big on social media, this is how I share these things a few times a year.

Annual Update 2022

2021 was another successful year of innovation and development at Tabush Group. Not only did we experience growth in 2021, we also spent the year focusing our efforts on improving client experience, updating our datacenter and security to the latest technology, and much more. Find out about these improvements and get a taste of what's ahead for 2022!

The 411 on Cybersecurity and Your Firm

Cybersecurity attacks are a constant and growing threat for businesses and organizations. Cybercriminals attempt to access personal data and confidential information through a variety of tactics. With much of the workforce having mobility, firms need a proper, clear, and effective cybersecurity plan to ensure everyone can work securely from anywhere.

What Is Social Engineering and How to Prepare Your Firm

Social engineering is the practice of exploiting human psychology and manipulating people to gain access to systems, data, or a physical location. This term might be newer, but the art of the scam has been around for much longer.

Boxtop Supports Microsoft Teams and Zoom

Tabush Group is excited to announce that Microsoft Teams and Zoom are now available for use in the Boxtop solution. Boxtop, our cloud-based Windows desktop as a service (DaaS) solution supports Teams and Zoom video chat with HD video and sound quality. This capability enables you to run video chats and meetings seamlessly and efficiently in Boxtop.

Cybersecurity Tips: If You Get Caught Phishing, Prepare to Catch a Whopper!

Phishing remains one of the most common types of data breaches and often leads to a ransomware attack. When ransomware hits your IT, all or substantial parts of your IT will stop functioning and your data becomes compromised. The only way to bring your systems back online is to restore from backup or to “pay the piper,” the cybercriminal, their ransom. While ransoms of the past were in the thousands, they are now typically hundreds of thousands or even millions! In a worst-case scenario, there will be operating losses due to interruption of services when restoring and rebuilding your systems. The other main results of phishing are the stealing of personal or confidential business information, as well as the hijacking of a person’s mailbox, to deliver false instructions to illicit a payment to the cybercriminal.

Podcast: Simplifying and Systematizing Your Remote Workspace

Our very own Darragh Fitzpatrick, Partner & Executive Vice President here at Tabush Group, was recently featured on the Systems Simplified podcast, discussing Simplifying and Systematizing Your Remote Workspace.