Skip to the main content.
Support
Support

From the Blog

Managed security services

3 min read

The Tech Imperative: Embracing the Trends Shaping Small Business Success

As technology progresses, small businesses are going to be forced to make some decisions. Artificial Intelligence (AI), the Internet of Things (IoT),...

Read More

3 min read

5 Questions You Should Ask Your MSP Before 2025

Small businesses are feeling the heat of technology’s fast-paced evolution. As we approach 2025, it's more important than ever to have a solid IT...

Read More
MSPs Are Essential for Navigating the Evolving Technological Landscape

2 min read

Why MSPs Are Essential for Navigating the Technological Landscape

The relentless pace of technological advancement presents a significant challenge for SMBs. AI is just the latest example, but new solutions emerge...

Read More
Think before you click

1 min read

Think before you click

People often look to sophisticated tools for security solutions.

Read More
Fractional CIO

2 min read

Is a fractional CIO a good fit for your business?

Businesses have an endless list of needs but may not have the resources to satisfy all their needs in-house. That's why many businesses outsource...

Read More
MSP vs MSSP - What are the differences?

1 min read

MSP vs MSSP - What are the differences?

The masses are often confused by the terms "MSP" and "MSSP". They may think there's no difference because the two are differentiated only by an extra...

Read More
Security is a team effort

6 min read

Security is a team effort

Security is a team effort. In decades past, job responsibilities were reserved for specific departments. One department had one type of people who...

Read More
Security dos and don'ts

1 min read

Security dos and don'ts

Solid security is, in many ways, complicated. Fortunately, there are a few basics you can follow to tighten up your security right away and get high...

Read More
What is threatware?

6 min read

What is threatware?

What Is Threatware? This question is increasingly relevant as cyber threats continue to evolve and pose significant risks to both individuals and...

Read More
Microsoft end-of-life survival kit

2 min read

Microsoft end-of-life survival kit

Nothing good lasts forever. Even Microsoft products.

Read More
Internal policies

3 min read

Why internal policies are crucial for managed security success

Once upon a time, good security amounted to little more than protecting your perimeter to keep threat actors out of your networks. But now, with the...

Read More
What is the cost of a data breach

4 min read

What is the cost of a data breach?

Year after year, data breaches are getting more expensive.

Read More
Pros and cons of BYOD

2 min read

Pros and cons of BYOD

Businesses are always looking for ways to save money. Rather than buy more devices for their employees, some businesses implement BYOD programs.

Read More
What is emotet?

2 min read

What is emotet?

Emotet, one of the worst security threats ever created, originated in 2014 as malware that intercepted internet traffic and harvested sensitive...

Read More
Security red flags

4 min read

10 security red flags to avoid

Sometimes you hear a piece of advice so harmful that it grates your ears like nails on a chalkboard. You might call such advice "red flags."

Read More
NTLM

1 min read

Disabling NTLM, The Sagiss Way

To increase security, we are disabling NTLM (NT LAN Manager) for our clients.

Read More
Security concerns for the modern web

7 min read

8 security concerns for the modern web [Updated]

Just a couple decades ago, a trusty antivirus program was all you needed for healthy security. But so much has changed in recent years.

Read More
Certified MSP

5 min read

Why your business needs a certified MSP

A managed service provider (MSP) is an outsourced IT department that handles all your company's IT support needs and is available in an instant. That...

Read More
web content filtering screenshot

2 min read

Why businesses need web content filtering

Web content filtering is a service that prevents users from accessing unwanted sites and services from company devices.

Read More
The pillars of end user security training

3 min read

Why your company needs end user security training

The vast majority of security breaches are directly related to human error. After a phishing or emotet attack, the employee who enabled the attack...

Read More
Threat actors are targeting MSPs

3 min read

Threat actors are targeting MSPs. Are you ready?

On May 11, 2022, authorities from the United Kingdom, Australia, Canada, New Zealand, and the United States issued a joint cybersecurity advisory for...

Read More
Network firewall security

1 min read

Why businesses still need network firewall security

When working in an office was the only option most of us had, making the case for a network firewall was an easy sale.

Read More
How do password managers work?

10 min read

How do password managers work?

How do password managers work? This is a question that many people ask as they navigate the complexities of online security. Password managers have...

Read More
Vulnerability management

2 min read

What is vulnerability management?

Threat actors are tirelessly testing your network for easy access to your crucial data and files. By the time you've identified a breach, it's...

Read More
next-generation antivirus

3 min read

What is next-generation antivirus?

While "next-generation" may sound new and revolutionary, next-generation antivirus actually has roots in technology most of us are already familiar...

Read More
Cyber liability insurance

3 min read

What is cyber liability insurance and why is it so important?

The increase of cyber attacks has made cyber liability insurance a necessity for nearly every business. Yet many businesses still don't understand...

Read More
Cybersecurity essentials

7 min read

Cybersecurity essentials for businesses

We routinely hear about the cyberattacks that bring down the Goliaths of the business world: Facebook, Equifax, and NVIDIA come to mind. Taking down...

Read More
Sagiss background

2 min read

Sagiss leads discussion panel at 2019 MSPWorld Conference

Hosted by the International Association of Cloud & Managed Service Providers (MSPAlliance), the MSPWorld conference attracts managed IT support...

Read More
AICPA SOC logo

2 min read

Sagiss completes MSP Verify certification with SOC 2 Type 2 audit

We're proud to announce Sagiss has earned its Soc 2 Type 2 Certification from the MSP Alliance!

Read More
Multi-factor authentication

1 min read

Multi-factor authentication: Why you need it

Multi-factor authentication (MFA) adds another layer of protection to your online accounts and is one of the simplest ways to improve your digital...

Read More
Laptops downloading software patches

2 min read

3 reasons to install software patches

Software patches are much more than pesky reminders to update and restart your computer. These often-ignored acts of regular PC maintenance...

Read More