by Joshua Jones | Feb 5, 2022 | Cyber Security, Dual Factor Authentication, Multi Factor Authentication, vCIO, vCISO
World News reveals a lot Especially when dealing in security. When countries fight, bad actors will show up and this shouldn’t surprise anyone. In the past month, the statement has proven itself true with the sheer increase of alerts about cyber attacks coming out of...
by Aaron Smith | Dec 20, 2021 | Cyber Security, Dual Factor Authentication, Multi Factor Authentication, vCISO
There are always 0 days. There are some though, where the tendency is to eat your life and take over the news cycle. All of them are important and some (due to a combination of media, reach, and impact criticality) are significantly urgent. When the news of Log4J...
by Aaron Smith | Oct 15, 2021 | Compliance, Cyber Security, Dark Web Monitoring, Digital Transformation, Multi Factor Authentication, On Premise Software, Password Policies, SAAS, vCIO, vCISO, vCTO
Would you like to know the simplest and most effective ways to get hacked? OK – this post is obviously sarcasm (please don’t take this advice!). However, sometimes a little humor helps the issue really sink in. So in that spirit, here are the best ways our...
by Aaron Smith | Aug 13, 2021 | Compliance, Cyber Security, Governance, Password Policies, vCIO, vCISO, vCTO
We’ll be straight with you. It’s not hard to find a dozen other IT companies aka Managed Service Providers (MSP) that will manage your hardware, network and email. That’s the core of what a MSP will do for a client. What makes Unicom unique is our...
by Aaron Smith | Jul 22, 2021 | Cloud Software, Cloud Transformation, Cyber Security, Digital Transformation, Microsoft 365, On Premise Software, SAAS
One of the best things an organization can do to streamline and simplify their business systems is to ditch their on premise Exchange server and migrate to Microsoft 365 (formerly Office 365). This frees the organization from having to manage the Exchange environment...
by Aaron Smith | Dec 30, 2020 | Cyber Security, Dark Web Monitoring, Dual Factor Authentication, Password Policies
If you were to poll the general population, you may find most people believe their passwords get hacked from a virus or malware running on their machine. They’ll want to switch to a Mac or Chromebook because those are deemed ‘safer’ with regard to viruses. However,...