Blog

Phishing Attacks – What to Know

Phishing attacks are on the rise and can result in company breaches if not identified properly by users.  The best way to prevent a phishing attack is to know how to identify a potential attack.  We have some telltale ways to identify if an email may be phishing. 6 Ways ...
How To Keep Remote Employees Engaged

How to keep remote employees engaged

Having the privilege to be able to work with remote employees for the past decade, I've learned a few lessons over the years on how to keep remote employees engaged and embedded in our culture. Lesson #1 is be intentional If hiring a remote employee, when possible within their first ...
Downtime Costs Money

Downtime Costs Money

“Downtime costs money.” That’s no secret, but it doesn’t quite capture the whole experience: you arrive to work in the morning, grab your coffee knowing you’ve got a hectic day ahead, and are ready to dive in. For some reason your computer can’t access the database and neither can anyone ...
a COUPLE of GURUS Top IT Managed Services Provider MSP 501 2021

a COUPLE of GURUS Named as one of the World’s Premier Managed Service Providers

a COUPLE of GURUS is happy to announce that we were ranked among the world's top 501 IT managed service providers on Channel Futures MSP 501—Tech Industry’s Most Prestigious List of Global Managed Service Providers! Annual MSP 501 Identifies Industry’s Best-in-Class Businesses Growing Via Recurring Revenue and Innovation JULY 2, ...

Small business data breach response checklist

Not all data breaches are sensational, highly-publicized events. In fact, smaller and lower profile companies are frequently targeted by hackers due to their less robust cybersecurity defenses. And breaches are not always caused by cyber attacks: They can be inadvertently caused by careless or poorly trained employees. Regardless of the ...

My IT guy quit, now what?

Receiving a resignation letter from your IT manager can set off the panic alarm – and for good reason. Most organizations rely heavily on their IT people to keep their business secure and operational, and picking up where they left off isn’t easy – especially if you don’t gather the ...