EXP will host a free webinar on Thursday November 8th.
FREE ONE HOUR SECURITY CONSULTATION FOR ALL ATTENDEES!
FREE DRAWING FOR AN AMAZON ECHO!
The most vital aspects or your overall IT
Security Plan, including how to effectively AND efficiently secure
Learn from the EXPerts on how to stay
“The typical computer network usually has a closet full of skeletons. Now, there could be more than one closet in any organization, but here I speak of the IT closet, and its name is convenience. It is filled with seemingly harmless security compromises designed to make work more enjoyable, and in the short term, more productive. Filling this closet usually occurs slowly over time, not overnight, and the effects can have serious consequences.”
Pat Cooke, EXP VP of Business Solutions delivered a webinar on cloud technologies in AEC firms on May 31st 2018. Click below to watch a recording.
At EXP, we strongly believe in the web of protection that must exist to properly guard institutions and their data from these threats. This web is comprised of several things. Many of these are technological tools that keep threats from ever entering your environment, let alone being executed within it. Unfortunately, all the gates, checkpoints and filters cannot prevent human error\action – frequently the last stop on the cyberthreat train. Humans must be informed users of technology for our web of protection to remain whole.
Patty Sather celebrated 15 years with EXP
EXP had a triple celebration this month. We called it our 5-10-15 party!
Good food and good times were enjoyed by All! We are looking forward to the next 15 years of working with such great people and providing outstanding […]
On March 31st, the EXP Team volunteered for a full day at a Habitat for Humanity new 10-cottage community build site, to help families unlock the power of homeownership. When completed it is estimated that this project will provide safe, affordable, decent housing for up […]
We regularly see cases of successful phishing attacks. Most of them involve people being conned into sharing valuable personal information with unauthorized parties. This is usually done over email but sometimes involves a phone call.
A frequent scam goes like this. You receive an email from someone claiming to work at an organization you trust or regularly interact with such as your bank or a retailer you often shop with. They seem legitimate because they have likely gathered some accurate information about you from social media, your company website, press releases, or other public means. Since they get a few details right, you may be inclined to believe them. But you must dig deeper to determine if the request is legitimate.
You may be asked for personal information that could be used to access funds — credit card numbers, bank account information, passwords, etc. — or even asked to wire money. All this is done, of course, under false pretenses. And it could cost your business a heap of money and hassle.
You probably heard about the ransomware attack named “WannaCry” that swept the world on May 12, 2017. It was the largest ransomware attack to date, affecting millions of people and crippling businesses in more than 100 countries.
The purpose of this article is to highlight other useful, less familiar applications included with your Office 365 subscription, and to illustrate how they can help your business in a variety of ways.
The concept of a virtual CIO, or vCIO, is gaining prominence across the industry because it provides a variety of benefits. We can help you choose the best solutions for your needs by analyzing the overall application of IT within your organization.