<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

The Time for DaaS is Right Now

At the onset of the pandemic, there was an immediate shift to remote work. More than 2 years later, this has morphed into widespread adoption of hybrid work environments. Not surprisingly, a recent report from Accenture found that the spike in remote work resulted in more growth of laptops and notebooks than desktops. But no matter what device they use, people must be able to work from home in the same way they can work in the office.

Three Cybersecurity Best Practices for Your Firm

Proper education can help in preventing any of the cybersecurity attacks described in the 411 on Cybersecurity and Your Firm. While it is true that your IT department plays a vital role in ensuring your firm follows cybersecurity best practices, that does not mean they alone are responsible for your firm’s security. Awareness of and participation in cybersecurity best practices need to become part of your firm’s culture for every single person. Here are three things you can do.

Blackberry, Hybrid, and (Even More!) Cybersecurity

People often ask me what's on my mind, what I'm working on, and what's "new and exciting." Since I'm not big on social media, this is how I share these things a few times a year.

Annual Update 2022

2021 was another successful year of innovation and development at Tabush Group. Not only did we experience growth in 2021, we also spent the year focusing our efforts on improving client experience, updating our datacenter and security to the latest technology, and much more. Find out about these improvements and get a taste of what's ahead for 2022!

The 411 on Cybersecurity and Your Firm

Cybersecurity attacks are a constant and growing threat for businesses and organizations. Cybercriminals attempt to access personal data and confidential information through a variety of tactics. With much of the workforce having mobility, firms need a proper, clear, and effective cybersecurity plan to ensure everyone can work securely from anywhere.

What Is Social Engineering and How to Prepare Your Firm

Social engineering is the practice of exploiting human psychology and manipulating people to gain access to systems, data, or a physical location. This term might be newer, but the art of the scam has been around for much longer.

Cybersecurity Tips: If You Get Caught Phishing, Prepare to Catch a Whopper!

Phishing remains one of the most common types of data breaches and often leads to a ransomware attack. When ransomware hits your IT, all or substantial parts of your IT will stop functioning and your data becomes compromised. The only way to bring your systems back online is to restore from backup or to “pay the piper,” the cybercriminal, their ransom. While ransoms of the past were in the thousands, they are now typically hundreds of thousands or even millions! In a worst-case scenario, there will be operating losses due to interruption of services when restoring and rebuilding your systems. The other main results of phishing are the stealing of personal or confidential business information, as well as the hijacking of a person’s mailbox, to deliver false instructions to illicit a payment to the cybercriminal.

Podcast: Simplifying and Systematizing Your Remote Workspace

Our very own Darragh Fitzpatrick, Partner & Executive Vice President here at Tabush Group, was recently featured on the Systems Simplified podcast, discussing Simplifying and Systematizing Your Remote Workspace.

6 Reasons to Use Desktop as a Service

Desktop as a Service (DaaS) has been growing in popularity over the past several years, with an even greater focus since the start of the COVID-19 pandemic. DaaS moves desktops and servers to the cloud, providing easy, secure access to your company’s files and applications from any device that is connected to the internet.