General Informatics formerly Unicom
  • Our Proven Process
  • Our Core Services
    • Managed IT
    • Cybersecurity
    • Virtual CIO and CISO Services
    • Banking-IT
    • IT Compliance
  • Our Team
  • Blog
  • (281) 496-3606
Talk To An Expert

Cybersecurity in a Day of Heightened Awareness

by Joshua Jones | Feb 5, 2022 | Cyber Security, Dual Factor Authentication, Multi Factor Authentication, vCIO, vCISO

World News reveals a lot Especially when dealing in security. When countries fight, bad actors will show up and this shouldn’t surprise anyone. In the past month, the statement has proven itself true with the sheer increase of alerts about cyber attacks coming out of...

Log4J and Scaling your response to 0 Days

by Aaron Smith | Dec 20, 2021 | Cyber Security, Dual Factor Authentication, Multi Factor Authentication, vCISO

There are always 0 days. There are some though, where the tendency is to eat your life and take over the news cycle. All of them are important and some (due to a combination of media, reach, and impact criticality) are significantly urgent. When the news of Log4J...
Top 7 Ways To Get Hacked

Top 7 Ways To Get Hacked

by Aaron Smith | Oct 15, 2021 | Compliance, Cyber Security, Dark Web Monitoring, Digital Transformation, Multi Factor Authentication, On Premise Software, Password Policies, SAAS, vCIO, vCISO, vCTO

Would you like to know the simplest and most effective ways to get hacked? OK – this post is obviously sarcasm (please don’t take this advice!). However, sometimes a little humor helps the issue really sink in. So in that spirit, here are the best ways our...

How To Avoid Excessive IT Audit Findings

by Aaron Smith | Aug 13, 2021 | Compliance, Cyber Security, Governance, Password Policies, vCIO, vCISO, vCTO

We’ll be straight with you. It’s not hard to find a dozen other IT companies aka Managed Service Providers (MSP) that will manage your hardware, network and email. That’s the core of what a MSP will do for a client. What makes Unicom unique is our...

What’s The Point of Microsoft 365 Backups?

by Aaron Smith | Jul 22, 2021 | Cloud Software, Cloud Transformation, Cyber Security, Digital Transformation, Microsoft 365, On Premise Software, SAAS

One of the best things an organization can do to streamline and simplify their business systems is to ditch their on premise Exchange server and migrate to Microsoft 365 (formerly Office 365). This frees the organization from having to manage the Exchange environment...
Password Policies and Dual Factor Authentication

Password Policies and Dual Factor Authentication

by Aaron Smith | Dec 30, 2020 | Cyber Security, Dark Web Monitoring, Dual Factor Authentication, Password Policies

If you were to poll the general population, you may find most people believe their passwords get hacked from a virus or malware running on their machine. They’ll want to switch to a Mac or Chromebook because those are deemed ‘safer’ with regard to viruses. However,...
« Older Entries

Don’t miss the benefits of great IT.
We’ll build it together.

One quick call is all it takes.

Let's Get Started!
General Informatics formerly Unicom

© 2022 General Informatics, LLC | All Rights Reserved

  • Our Proven Process
  • Our Core Services
  • Our Team
  • Blog
  • Privacy Policy
  • Follow
  • Follow
  • Follow