October Newsletter – 2022
Download October 2022 Newsletter Now
RJ2 Perspective Written by: Jeff Dann, President of RJ2 Technologies Cybersecurity: What is it and why do you need it? Cybersecurity is a complex area of computer security that focuses on protecting systems, data and networks from attacks. A cyberattack is any attempt to gain access to a system or network with malicious intent. Cybersecurity…
How to secure your passwords Generate random passwords using a password manager To make the most of your password manager, you’ll want to use a strong and unique password for each account. That’s because if someone gets access to one of your accounts and can then log into another account (which often happens when people…
Introduction If you haven’t developed a data backup and disaster recovery plan, now is the time to do so. As we’ve seen in recent years, natural disasters like Hurricane Harvey, tornadoes in Oklahoma, earthquakes in Mexico City and more have left businesses without access to critical information. These events can be devastating—but they don’t have…
Introduction Endpoint security is a topic that’s rapidly gaining in popularity. With the increasing number of cyberattacks, it’s now more important than ever to ensure that your company’s data is safe from hackers and malware. Let’s take a look at some of the most important things you need to know about endpoint protection: What is…
Introduction What is a cybersecurity risk assessment? A cybersecurity risk assessment can help you identify potential cybersecurity threats and prioritize where to focus your security efforts. A well-designed risk assessment process can also help you understand the potential impact of a cyberattack, which is important when determining how much of your budget should be allocated…
RJ2 Perspective Written by: Jeff Dann, President of RJ2 Technologies It’s Time to use Automation to Improve Performance Levels Workflow process can often be a critical element to improve efficiency but often overlooked by new business owners or small to medium-sized businesses. Most companies will focus on certain buzzwords like productivity and efficiency, but how…
Introduction Spam is defined as unsolicited commercial email. It’s the number one complaint for most internet users, and that’s why many companies have started to develop anti-spam solutions. However, if you’re wondering what exactly these solutions are and how they work, this article might help answer some of your questions! What Are Anti-Spam Solutions Anti-spam…
Companies traditionally use on-premises servers to host and manage their email platform. However, this can be costly and time-consuming, especially if you don’t have an in-house IT team to manage everything. That’s why many companies are now using Microsoft Exchange Online for all their email needs. What is Microsoft Exchange Online? Microsoft Exchange Online is…
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |