SPF, DKIM, and DMARC: What They Are and Why You Need Them

If your organization has its own domain for email addresses — [email protected] — set up email authentication to help ensure your email is delivered and your domain can’t be spoofed for phishing.

What Is a “Managed IT Services” Model and Why Is It Important for Your Business?

You’ve chosen Apple devices to run your business. That’s great, but are you still dealing with each of those devices individually? If you hire a new employee, do you go to the Apple Store to buy a new Mac, bring it back to the office, spend a few hours installing the right software, and then […]

The Importance of Staying Updated

Major upgrades aside, we recommend installing updates as soon as they’re available. The danger from unpatched security holes is just too great nowadays.

Loose Lips Sink Chips: Beware What You Say to AI Chatbots

Although it may feel like you’re having a private conversation with an AI chatbot, don’t share anything you wouldn’t tell a stranger.

You Should Almost Certainly Enable iOS 17.3’s Stolen Device Protection

We recommend everyone who uses Face ID and Touch ID turn on Stolen Device Protection.

Beware Executive Imposter Scams Aimed at New Employees

Please be aware of a common phishing scam targeting newly-hired employees.

Learn to Identify and Eliminate Phishing Notifications

Don’t let websites send you spammy and fraudulent notifications

Apple Starts Releasing Rapid Security Responses for the iPhone, iPad, and Mac

By now, you’ve probably seen a new form of update for iOS, iPadOS, and macOS: the Rapid Security Response. Early in May, Apple released the first instances of these updates, which the company had promised for iOS 16, iPadOS 16, and macOS 13 Ventura when those operating systems were first announced. Let’s answer some of the questions we’ve been hearing.

Understanding Apple’s First Rapid Security Response

Security Questions Your Organization Should Be Asking Itself

We’re increasingly hearing from organizations that need to establish that they have sufficient security policies in place, either to meet the requirements of a larger client or to qualify for cyber insurance that insures against breaches and similar losses. Details vary, and we’re happy to work with you on the specifics, but here are some of the kinds of questions you may be asked.