Blog

It’s Time for VoIP: Why WFH Makes it a Necessity

February 9th, 2021

In 2019, most people went into an office. Then Covid-19 forced everyone to stay home and work remotely. It’s not a temporary change. A year of lockdowns upended how, when, and where we work. Can your IT solutions support this new culture? Or will you fall behind on demands from clients, staff and business partners?

Work-From-Home is Here to Stay

For companies that had already been utilizing work-from-home (WFH) policies, they probably already had the tools and devices selected to make the transition from office to off-site thoroughly transparent.

The 2020 Verizon Data Breach Report – What You Need to Know

December 21st, 2020

2020 has been one heck of a year and, like everything else, cyberthreats have taxed small and large businesses alike. Verizon did a deep dive into this year’s data, and the 2020 Verizon Data Breach Investigations Report (DBIR) tells us what IT providers need for 2021.

There’s no doubt you need to protect your organization from cyberthreats.

Make 2021 the Year You Get IT Right: A Co-Managed IT Approach

November 6th, 2020

Worldwide, businesses spent approximately $4 trillion on IT in 2019. As organizations become increasingly digitally focused, they often struggle to stay on top of the latest technology and IT security. For SMBs, this struggle is particularly intense as the investments needed to maintain this level of service continues to grow.

Vendor Vulnerabilities: Taking a Closer Look at 3rd Party IT Risks

September 4th, 2020

In May of 2020, the University of Southern Mississippi (USM) experienced firsthand the threat of third-party IT risks. Cybercriminals attempted a ransomware attack on the university through their technology partner Blackbaud. Quick thinking on behalf of the Blackbaud security team, along with law enforcement, was able to stop the attack before the criminals could successfully encrypt and hold ransom valuable university data.

Take a Hurricane-Prep Approach to Cybersecurity

July 24th, 2020

Being on the Gulf Coast, we know a thing or two about prep. You might, like many of us, have a hurricane disaster kit and a plan for what you’d do should a hurricane hit.

In business, preparation and protection are imperative. Now that we’ve all settled into the new remote work normal, thanks to COVID-19, it’s time to not only focus on productivity, but also once again place more emphasis on protecting IT systems.

Defend against this new Office 365 threat

January 24th, 2020

Some hackers have become so skilled that they don’t even need you to give up your credentials to hack into your account. One recent cyberthreat is targeted towards users of Microsoft Office 365. You don’t want to be the next victim, so read up.
A phishing scam that harvests users’ credentials
The latest cyberattack on Microsoft Office 365 involves harvesting users’ credentials.

Recent phishing attack at Gulf Coast hospital raises the question – how can businesses forgo managed I.T. security?

March 14th, 2019

The recent data breach at Memorial Hospital at Gulfport is the latest reminder of how imperative I.T. security really is. The phishing attack put about 30,000 Gulfport, Mississippi patient’s data at risk when the hacker gained access to a hospital employee’s email account which gave patient names, dates of birth, health insurance, type of medical care delivered and some Social Security numbers.

Meet Jerry

July 7th, 2016

AGJ is pleased to welcome Jerry Klos to our team as a Network Administrator. Jerry is a Cisco Certified Network Administrator and has had a life-long passion for technology with a focus on networking.

Jerry is originally from Orlando, FL where he spent seven years with Disney.

Windows 10 – What’s The Word?

June 10th, 2016

The Windows 10 “free upgrade” deadline has been set for July 29, 2016. What does this mean for you?

As AGJ has tested Windows 10 over the past year, we’ve generally been pleased with the results. While we’re not a fan of the new browser and some of the user-interface features, performance is good and security has been improved.

Team Viewer Hacked

June 8th, 2016

Do you login remotely to your PC or server? If so, take a minute and check the program that you’re using. If you use Team Viewer to login remotely, we strongly suggest finding another remote access program (give us a call if you need assistance).

Last week, it was reported that many Team Viewer users were experiencing strange behavior.

Email Newsletter

Enter your email address to receive monthly updates about our latest news, events and free technology resources!