<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

The Tabush Cloud & Managed IT Blog

Security at Tabush Group

Every cloud provider says they’re secure, but how do you really know that they are? Well, here at Tabush Group, we know we are secure, and we’re proud to tell you why.

Topics: Cloud IT Security Cybersecurity

As Published in ABA’s Law Practice Magazine: Effectively Plan Your IT Budget

There is no one-size-fits-all answer for firms allocating resources for IT solutions.

Topics: Cloud IT Security Cybersecurity

Types of Protection to Consider When Returning to the Office

As the COVID-19 pandemic stay-at-home restrictions loosen, people have begun to venture back into offices, schools, and other public places.  The pandemic created many challenges for businesses as they begin to return, such as social distancing within the office, employee health, and cybersecurity.  Cybersecurity is very important to factor into your return because it is very easy for bad actors to take advantage of people who are distracted by these many changes brought about by the pandemic.

Topics: IT Security Protecting Your Business coronavirus

Is the Cloud Less Secure?

It comes as no surprise that firms are extremely concerned about the security of their data.  How do you prevent unauthorized access to your data and applications?  How do you protect your firm’s data assets from natural disasters or other scenarios that would prevent you from getting to your office?

Topics: Cloud IT Security Cybersecurity

Disaster Prevention Checklist

A disaster in the IT world comes in many forms – natural disasters, ransomware, a cyber breach, and acts of terrorism, just to name a few.  These disasters disrupt normal business and can ultimately have severe and expensive consequences on a company’s reputation and bottom line.

The bad news is many companies think these disasters can never happen to them and don’t take the proper precautions; the good news is that prevention of many disasters is attainable, and planning ensures that when there is a disaster, your company is prepared to get back to business as usual.

Topics: IT Security Business Continuity Planning Cybersecurity Disaster Recovery

5 Ways to Ensure Your Firm's Data is Secure

There is an increase in the frequency and efficacy of data breaches that can bring a firm’s operations to a standstill. Data breaches are often the result of vulnerable hardware and software where security measures may be weak or out of date, presenting an opportunity to hackers and ransomware. Far too often, businesses do not realize they are victims of breaches for days or even weeks, and by then, there is often nothing that can be done to repair the damage.

Topics: IT Security Cybersecurity Email Best Practices Encryption

Security Update: Office 365 Phishing Attempts

We recently sent a message to our clients warning them of an increase in phishing activity. We find it to be so rampant that we wanted to make this information available to the public as well.  For help with your business IT and security contact Tabush Group.

Over the past few weeks, we noticed an uptick in ‘phishing’ emails, which appear to be from Microsoft Office 365 or other popular cloud service providers, trying to get recipients to provide their log in credentials or other sensitive information. While we employ many layers of defense from top vendors for email filtering and content security for our clients, the bad guys are hard at work trying to beat the security systems; and sometimes, these things get through.

We want to provide you scenarios that you and your colleagues should be mindful of. Always be suspicious of anything that appears out of the ordinary, including:

Topics: IT Security Microsoft Office Email Best Practices Office 365 Phishing

Cyber Security Awareness Month

Did you know that October is National Cyber Security Awareness Month?

It's a great annual reminder for you to take a look at what you and your company are doing to protect your business and systems from potential cyber attacks that could cripple your operations and cost you thousands of dollars in lost revenue.

Topics: IT Security Cybersecurity Cyber Attacks