Blog

When Did You Last Discuss Your IT Security Program?

The costs associated with security breaches or failed policies is a hard hitting, costly percentage to the overall success of business. Preventative measures take time, and the programs need to be tailored to the types of interactions those employees will most often come in contact...

Installing Office 365 Mail on Mobile Devices

[vc_row row_type="row" use_row_as_full_screen_section="no" type="full_width" anchor="" in_content_menu="" content_menu_title="" icon_pack="font_awesome" content_menu_fa_icon="" content_menu_fe_icon="arrow_back" text_align="left" video="" video_overlay="" video_overlay_image="" video_webm="" video_mp4="" video_ogv="" video_image="" background_image="" pattern_background="" section_height="" parallax_speed="" background_color="" border_color="" side_padding="" padding_top="" padding_bottom="" color="" hover_color="" more_button_label="" less_button_label="" button_position="" css_animation="" transition_delay="" el_id=""][vc_column width="1/1"] [/vc_column][/vc_row][vc_row][vc_column width="1/1"][vc_column_text] We've heard from a few clients regarding the necessary...

Windows Users Should Uninstall QuickTime: US-CERT Recommends

The U.S. government has recommended that Windows PC users uninstall Apple Inc's QuickTime video player after security software maker Trend Micro Inc said on Thursday it had discovered two new bugs in the software. Trend Micro said it had uncovered two critical vulnerabilities in the version...

Supporting a Good Cause

  Team BONK Rides the Rockies for Kids   Our leadership at initialit.net values the importance of giving to community organizations that help those in need. Jack Smith, Principal of initialit.net, has taken his passion for cycling and an upcoming opportunity to participate in Ride the Rockies 2016 , as...

P@$$w0rd – Secure?

User Passwords -- especially those not supported by two-step verification -- are your last lines of defense against prying eyes. This guide will help you understand how those passwords are exposed, and what you can do to keep them locked down. How are passwords vulnerable to exposure? Before we...

Close Box

Please enter your username or email address.
You will receive a link to reset the password via email.