<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

When Should a Firm Move to the Cloud?

Many firms are evaluating their technology to determine how to be even more productive, regardless of where they are working from. Employees need constant access to their network, applications, and files to work efficiently and best support their clients' needs; however, with increased accessibility comes increased security concerns. Cloud addresses these issues (and many more!), but we know that moving to the cloud is not a decision to be made lightly.  When is the best time for your firm to transition to the cloud?

Topics: Cloud IT IT Best Practices

Get Your Head in the Cloud

Cloud is increasingly becoming popular as more companies have noticed the benefits it offers, such as reliability and security. Cloud provides companies flexibility and, when implemented correctly, cloud can increase the efficiency of your business. However, while there are many benefits of the cloud, it also comes with a few risks.

Topics: IT Cybersecurity IT Best Practices Cyber Attacks Phishing Ransomware

What You Need To Know About Cyber Insurance

Cyberattacks are not a new phenomenon.  They have become an increasingly large problem for all organizations, and now, businesses are turning to cyber insurance as a means of protection against the aftermath of a cyberattack.

Topics: IT Cybersecurity IT Best Practices Cyber Attacks Phishing Ransomware

5 Ways to Prevent a Phishing Attack

The vast majority of data breaches today are phishing attacks, occurring when a cybercriminal casts a broad net in the hopes of catching a small percentage of unsuspecting victims.  In our last blog post, It’s Only Getting Worse, we describe both phishing and spear phishing tactics and why it is imperative for businesses to take precautions to protect themselves. 

Topics: Cybersecurity IT Best Practices Phishing

Your 5-Step Guide to Ensure Successful Cloud Implementation

We recently published a post, 6 Considerations When Moving Desktops to the Cloud, that discussed the most important factors to consider once a firm decides that cloud is the right decision.  The next step is ensuring that the implementation goes smoothly.

Topics: Cloud IT Best Practices Cloud for Business

Sitting Ducks: What You Can Do to Protect Yourself from the Next Cyberattack

Not long ago I read, “The Untold Story of NotPetya, the Most Devastating Cyberattack in History,” an eye-opening article on Wired about a massive cyberattack that happened roughly a year ago in 2017. If you have 15 minutes, I highly recommend reading it. If you don't, then allow me to summarize: In 2017, NotPetya malware infected large companies such as Merck, Maersk, and others (companies with huge IT teams and thousands of employees), and literally brought their entire operations to a grinding halt for days, if not weeks, costing them upwards of $300 million in damages per company.

Topics: Cybersecurity IT Best Practices Boxtop Cyber Attacks

10 Simple Ways to Protect Your Business from a Cyber Attack

Small businesses, especially law and accounting firms that deal with sensitive data and financial transactions need to be concerned about cybersecurity. Cyber attacks are becoming more sophisticated and more rampant every day. Luckily, there are some very important – and often inexpensive – things every organization can do to protect themselves.

Topics: Cybersecurity IT Best Practices Cyber Attacks

Top 5 Lies in IT Services

The IT business is loosely defined. If you surveyed 100 IT companies, you would learn just as many different ways of doing things. Every company needs the right IT resources for their business and making the right matches can be a challenge.

Topics: IT IT Services IT Best Practices