Information Technology Blog

Your Source for the Best Information Technology News & Updates

We write about technology and cyber security news for small and medium-sized businesses. Our goal is to provide information technology information and innovation to keep your business growing.

Join Our Information Technology Blog

Follow Us

Information Technology Blog Posts

Death By CHEAPNESS

Death By CHEAPNESS

Southwest Airlines’ recent fiasco caused them to cancel over 16,700 flights. This left people stranded across America. It was the epitome of what’s happening with so many businesses right now across the US. A total and complete meltdown in service due to cheapness....

read more

End Of Support for Microsoft Exchange Server 2013

In just a few weeks Exchange Server 2013 will reach its "end of support". This means that, as of April 11, 2023, Microsoft will no longer provide: Technical support for problems that may occur. Bug fixes for issues that may impact the stability and usability of the...

read more
Keys to a Successful Cloud Migration

Keys to a Successful Cloud Migration

Cloud migration offers a host of benefits for small and mid-sized businesses. Cloud solutions solve the challenges of remote and hybrid work forces, while providing unmatched levels of security and scalability. As with most endeavors, planning is critical when it...

read more
The Latest Cybersecurity Trends for SMBs

The Latest Cybersecurity Trends for SMBs

It’s 2023 and, if anything, the cybersecurity picture has grown bleaker. I just read that the US saw a 57% increase in overall cyberattacks in 2022. These increases are fueled by an ever-expanding pool of cybercriminals distributed around the world in small, nimble...

read more
LastPass Data Breach: What You Should Know

LastPass Data Breach: What You Should Know

LastPass, a popular password manager, recently announced that, “an unauthorized party gained access to a third-party cloud-based storage service, which LastPass uses to store archived backups of our production data.” The threat actor was able to copy a backup of...

read more