<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

Your 5-Step Guide to Ensure Successful Cloud Implementation

We recently published a post, 6 Considerations When Moving Desktops to the Cloud, that discussed the most important factors to consider once a firm decides that cloud is the right decision.  The next step is ensuring that the implementation goes smoothly.

Sitting Ducks: What You Can Do to Protect Yourself from the Next Cyberattack

Not long ago I read, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” an eye-opening article on Wired about a massive cyberattack that happened roughly a year ago in 2017. If you have 15 minutes, I highly recommend reading it. If you don't, then allow me to summarize: In 2017, NotPetya malware infected large companies such as Merck, Maersk, and others (companies with huge IT teams and thousands of employees), and literally brought their entire operations to a grinding halt for days, if not weeks, costing them upwards of $300 million in damages per company.

10 Simple Ways to Protect Your Business from a Cyber Attack

Small businesses, especially law and accounting firms that deal with sensitive data and financial transactions need to be concerned about cybersecurity. Cyber attacks are becoming more sophisticated and more rampant every day. Luckily, there are some very important – and often inexpensive – things every organization can do to protect themselves.

Top 5 Lies in IT Services

The IT business is loosely defined. If you surveyed 100 IT companies, you would learn just as many different ways of doing things. Every company needs the right IT resources for their business and making the right matches can be a challenge.

How to Protect You and Your Business from the Latest Wave of Email Scams

Phishing emails (emails which appear to be from a legitimate sender, asking for personal or financial information) have been around for many years. However, in the last few months we’ve seen a big rise in spear phishing (scam email specifically targeting a company or person) and ransomware (viruses which encrypt files on your computer and network, and demand a ransom payment to have the files unlocked). These threats are very real for anyone using email.

Safe Internet Browsing - Best Practices

The Internet is a dangerous place. Unfortunately, due to the lack of central control and ownership, and the fact that the Internet is accessible from anywhere in the world, including many countries without proper law enforcement, there are many fraudulent traps out there looking to steal people’s personal information and money.

While having proper antivirus and anti-malware software is important, it’s also important to always follow safe browsing practices to ensure your data stays private.