<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

When Working Remote (Occasionally) Becomes Work from Anywhere (All the Time!)

As we all know, the pandemic amplified the need for people to be able work from home. But people must also work from home in the same way they can work in the office. In other words, people need to be able to access all of their files and the same applications that they use in the office. Their applications must not lose functionality and cannot work slower or inefficiently. So what is a firm to do?

Topics: Boxtop Virtual Desktop remote access mobility

Three Cybersecurity Best Practices for Your Firm

Proper education can help in preventing any of the cybersecurity attacks described in the 411 on Cybersecurity and Your Firm. While it is true that your IT department plays a vital role in ensuring your firm follows cybersecurity best practices, that does not mean they alone are responsible for your firm’s security. Awareness of and participation in cybersecurity best practices need to become part of your firm’s culture for every single person. Here are three things you can do.

Topics: IT Cybersecurity cyberattack

Three Benefits of Becoming a Tabush Group Channel Partner

A question you may be asking yourself is why should my firm become a Channel Partner with Tabush Group? In today’s marketplace, joining a Channel Partner program can be quite attractive. Here are three benefits of Tabush Group’s Channel Partner program.

Topics: cloud Boxtop Tabush Group Desktop as a Service (DaaS)

Annual Update 2022

2021 was another successful year of innovation and development at Tabush Group. Not only did we experience growth in 2021, we also spent the year focusing our efforts on improving client experience, updating our datacenter and security to the latest technology, and much more. Find out about these improvements and get a taste of what's ahead for 2022!

Topics: cloud IT Cybersecurity Boxtop Tabush Group Desktop as a Service (DaaS) mobility cyberattack

The 411 on Cybersecurity and Your Firm

Cybersecurity attacks are a constant and growing threat for businesses and organizations. Cybercriminals attempt to access personal data and confidential information through a variety of tactics. With much of the workforce having mobility, firms need a proper, clear, and effective cybersecurity plan to ensure everyone can work securely from anywhere.

Topics: IT Cybersecurity cyberattack

What Is Social Engineering and How to Prepare Your Firm

Social engineering is the practice of exploiting human psychology and manipulating people to gain access to systems, data, or a physical location. This term might be newer, but the art of the scam has been around for much longer.

Topics: IT Cybersecurity Social Engineering cyberattack

Boxtop Supports Microsoft Teams and Zoom

Tabush Group is excited to announce that Microsoft Teams and Zoom are now available for use in the Boxtop solution. Boxtop, our cloud-based Windows desktop as a service (DaaS) solution supports Teams and Zoom video chat with HD video and sound quality. This capability enables you to run video chats and meetings seamlessly and efficiently in Boxtop.

Topics: cloud Microsoft Boxtop Tabush Group

Cybersecurity Tips: If You Get Caught Phishing, Prepare to Catch a Whopper!

Phishing remains one of the most common types of data breaches and often leads to a ransomware attack. When ransomware hits your IT, all or substantial parts of your IT will stop functioning and your data becomes compromised. The only way to bring your systems back online is to restore from backup or to “pay the piper,” the cybercriminal, their ransom. While ransoms of the past were in the thousands, they are now typically hundreds of thousands or even millions! In a worst-case scenario, there will be operating losses due to interruption of services when restoring and rebuilding your systems. The other main results of phishing are the stealing of personal or confidential business information, as well as the hijacking of a person’s mailbox, to deliver false instructions to illicit a payment to the cybercriminal.

Topics: Cybersecurity Law Firm Phishing cyberattack