<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=259493914477262&amp;ev=PageView&amp;noscript=1">

Tabush Group's Cloud & Managed IT Blog

A Look Back on Our Top 2020 Articles and Videos

With everything that went on in 2020, we published a great deal of content, including blog posts, videos, and external articles. Here, we proudly present our greatest hits of 2020.

Topics: Cloud IT Security Boxtop Tabush Group Desktop as a Service (DaaS) remote access coronavirus

Your Inactive Accounts May Lead to Ransomware Attacks

Cybercriminals often use phishing emails and other security breaches to break into a business’s network but some companies overlook one area in a business when it comes to ransomware attacks: inactive accounts. Cybercriminals leverage inactive or ghost staff accounts to enter a company’s network when businesses do not maintain their databases.

Topics: IT Security Cybersecurity Cyber Attacks

Security at Tabush Group

Every cloud provider says they’re secure, but how do you really know that they are? Well, here at Tabush Group, we know we are secure, and we’re proud to tell you why.

Topics: Cloud IT Security Cybersecurity

As Published in ABA’s Law Practice Magazine: Effectively Plan Your IT Budget

There is no one-size-fits-all answer for firms allocating resources for IT solutions.

Topics: Cloud IT Security Cybersecurity

Types of Protection to Consider When Returning to the Office

As the COVID-19 pandemic stay-at-home restrictions loosen, people have begun to venture back into offices, schools, and other public places.  The pandemic created many challenges for businesses as they begin to return, such as social distancing within the office, employee health, and cybersecurity.  Cybersecurity is very important to factor into your return because it is very easy for bad actors to take advantage of people who are distracted by these many changes brought about by the pandemic.

Topics: IT Security Protecting Your Business coronavirus

Is the Cloud Less Secure?

It comes as no surprise that firms are extremely concerned about the security of their data.  How do you prevent unauthorized access to your data and applications?  How do you protect your firm’s data assets from natural disasters or other scenarios that would prevent you from getting to your office?

Topics: Cloud IT Security Cybersecurity

Disaster Prevention Checklist

A disaster in the IT world comes in many forms – natural disasters, ransomware, a cyber breach, and acts of terrorism, just to name a few.  These disasters disrupt normal business and can ultimately have severe and expensive consequences on a company’s reputation and bottom line.

The bad news is many companies think these disasters can never happen to them and don’t take the proper precautions; the good news is that prevention of many disasters is attainable, and planning ensures that when there is a disaster, your company is prepared to get back to business as usual.

Topics: IT Security Business Continuity Planning Cybersecurity Disaster Recovery

5 Ways to Ensure Your Firm's Data is Secure

There is an increase in the frequency and efficacy of data breaches that can bring a firm’s operations to a standstill. Data breaches are often the result of vulnerable hardware and software where security measures may be weak or out of date, presenting an opportunity to hackers and ransomware. Far too often, businesses do not realize they are victims of breaches for days or even weeks, and by then, there is often nothing that can be done to repair the damage.

Topics: IT Security Cybersecurity Email Best Practices Encryption