Get Ready To Maximize Efficiency With Help From Co-Managed IT Services

By Byron Martin | September 14, 2023
IT services are necessary for every business in the country – IT companies help businesses protect their data, ensure day-to-day operations run..

From the Top Down: The Importance of Cybersecurity Leadership in Mitigating Business Risks

By Byron Martin | July 26, 2023
The days when cybersecurity was solely the concern of IT departments are long gone.

Inside OneDrive and SharePoint: The Limitations and Restrictions You Need to Know

By Byron Martin | July 13, 2023
OneDrive and SharePoint in Microsoft 365 are popular cloud-based collaboration, productivity, and file storage solutions to help organizations share..

Tek Video: Top 5 Cybersecurity Musts

By Katrina Wahlbrink | May 25, 2023
Top 5 Cybersecurity Musts. So, what can you do?

The Cybersecurity Divide: Understanding the Cybersecurity Poverty Line

By Byron Martin | May 22, 2023
In today's digital age, cybersecurity has become a critical aspect of every organization's operations. Cyber-attacks can lead to financial losses,..

Tek Video: Myth - My Data is Safe in the Cloud

By Byron Martin | May 4, 2023
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and ..

Tek Video: Social Engineering - Hacking People not Technology

By Byron Martin | March 28, 2023
Hacking people, not technology.

What is a Cybersecurity Tabletop Exercise?

By Byron Martin | March 23, 2023
Have you heard of a cybersecurity tabletop exercise or tabletop drill?

Tek Video: Microsoft 365 Security is a Shared Responsibility

By Byron Martin | March 14, 2023
Microsoft works off what is called a shared responsibility model. The message is simple, Microsoft is responsible for its cloud, and end-users and..

Tek Video: Ransomware as a Service (RaaS)

By Byron Martin | February 28, 2023
Another big, game-changing element of ransomware is that you don't have to be a hacker. You don't even have to have any technical expertise.

Break Free From the Break-fix IT Model

By Byron Martin | February 23, 2023
“If it ain’t broke, don’t fix it.” But is this approach harming your business?

Tek Video: Endpoint Security vs. Antivirus

By Byron Martin | February 15, 2023
Tek Video: Endpoint Security vs. Antivirus

10 Considerations for Hiring In-house IT vs Partnering with an MSP

By Byron Martin | February 13, 2023
10 Considerations for Hiring In-house IT vs Partnering with an MSP Does your business’s IT management need an upgrade?Are you wondering why your..

Why Your IT Provider Should be SOC 2 Accredited

By Byron Martin | January 20, 2023
Why Your IT Provider Should be SOC 2 Accredited A SOC 2 audit isn’t just a one-time exercise. The audit must be completed yearly, inspecting..

Six Ways to Build Cyber Resilience

By Byron Martin | October 10, 2022
83% of small and medium-sized businesses are not financially prepared to recover from a cyberattack.

How to Send an Encrypted Email in Microsoft Outlook

By Byron Martin | July 28, 2022
You’ve probably heard about email encryption and maybe you’ve even wondered when it’s necessary.

How to Transfer Microsoft Authenticator to a New Phone

By Byron Martin | June 2, 2022
Using multi-factor authentication (MFA) is one of the easiest and most successful ways to increase the security for your accounts. This can prevent..

Small Businesses are More Likely to be Targets of Cyber Attacks

By Byron Martin | April 19, 2022
Researchers at Barracuda Networks analyzed millions of emails across thousands of companies in 2021 and found that on average, an employee of a small..

Microsoft 365 Price Increase March 15th

By Byron Martin | February 25, 2022
Prices are going up. Are you prepared? Update: Microsoft just extended the grace period to lock in Feb 2022 pricing. March 14th is the last day to..

Why SOC 2 Certification is Valuable

By Byron Martin | February 16, 2022
Let’s face it, our world is filled with regularly occurring data breaches and cybersecurity events. Organizations need assurances that the companies..

How to Move Google Authenticator to a New Phone Without Losing Access

By Byron Martin | February 9, 2022
If you use Google Authenticator for multi-factor authentication the authenticator settings are not transferred across devices for security purposes...

The Future of Cyber Insurance

By Byron Martin | December 7, 2021
The FBI’s Internet Crime Complaint Center (IC3) saw a 69% increase in the number of cybercrime reports it received in 2020 compared to 2019. On..

Connect Magazine - Technology

By Byron Martin | October 15, 2021
By Byron Martin | HFG Trust Connect Magazine - October 2021 | View Article When the COVID-19 pandemic hit, in some ways the timing was a blessing.

Benefits of Using Microsoft SharePoint

By Byron Martin | August 26, 2021
Microsoft SharePoint celebrated its 20th birthday on March 27th, 2021! And it’s come a long way over the past 20 years.

Benefits of Partnering with a Microsoft CSP

By Byron Martin | August 11, 2021
We’ve witnessed a shift in how we work to that of a hybrid workforce, a blended workforce comprising of both remote and in-office work. As such,..

OneDrive vs. SharePoint. What’s the Difference?

By Byron Martin | July 20, 2021
Microsoft announced in its latest quarterly earnings release that the number of Microsoft 365 subscribers has increased to 50.2 million from January..

Cybersecurity is not Information Technology (IT)

By Byron Martin | June 23, 2021
Your cybersecurity has to win every time, but the attacker only needs to win once.

Must Have Google Workspace Security Configurations

By Byron Martin | June 8, 2021
Migrations to the cloud are moving faster than ever. 78% of businesses will be run almost entirely on SaaS Applications.

Must Have Microsoft 365 Security Configurations

By Byron Martin | June 2, 2021
1 in 4 businesses reported ransomware attacks on cloud data.

5 Cybersecurity Questions to Ask Your IT Company

By Byron Martin | April 15, 2021
60 percent of small businesses that are victims of a cyber-attack go out of business within six months.

Microsoft Exchange Hack. Patch Now!

By Byron Martin | March 10, 2021
Urgent patching necessary. Microsoft continues to see increased attacks targeting unpatched systems by multiple malicious actors beyond Hafnium..

Technology Doesn't Have to be Frustrating

By Byron Martin | February 12, 2021
54 percent of SMBs report the increasing complexity of IT as the main reason for outsourcing their IT. 1 in 4 SMBs lost revenue due to IT-related..

Business Continuity: How to Be Prepared for Downtime or an IT Disaster

By Byron Martin | January 28, 2021
Flood. Power outage. Cyberattack. Supply chain failure or a disgruntled employee. Disruptions to your business can happen at any moment causing..

Affordable Fiber Internet for Business Available Locally

By Byron Martin | January 13, 2021
Fiber Internet is Available in the Tri-Cities, WA Did you know that there is fiber-optic Internet available in Benton and Franklin Counties? Our..

Reasons to Use a Managed Service Provider (MSP) for IT Support

By Byron Martin | January 7, 2021
66 Percent of Small Businesses Worldwide Have Faced Cyberattacks in The Past Year. For the third year in a row, SMBs are reporting big increases in..

What's all the Hype? A Quick Glance at Microsoft Teams

By Byron Martin | December 15, 2020
Curious about what all the hype is around Microsoft Teams? Microsoft Teams is the ultimate chat-based collaboration app for your organization. A..