Legacy IT Systems

The Challenge: “Our long-term tech expert left the business. This individual had been responsible for managing many of the company’s IT systems.” The employee left behind many complicated [...]

IT Policy

The Challenge: “Our company was faced with a range of IT risks. We knew about these risks and we saw them as necessary evils that were tied to our line of work. We knew that we must face them if [...]

Cloud Security

The Challenge: “We stored our data with one of the big cloud providers, which provided us with the basic services, including regular backups. However, we were surprised to learn that the cloud [...]

Phishing & Monitoring

The Challenge: “As we were about to make a large electronic fund transfer, we received an email that looked like it came from a co-worker. The email asked for the money to be wired to a new [...]