IT Solutions Blog

Should You Pay a Ransom to Cybercriminals? My Take on the Legality Issue
Should you pay a ransom to cybercriminals? Is this action illegal? Before I answer that question, I will say that—legal or not—paying the bad guys is not normally a good idea. For starters, can we really trust them to keep their word? Who says they will decrypt your...

How to Make Password Management Easy and Secure
Do you know what proper password management looks like? In a nutshell, there are four best practices for keeping your passwords secure: Each account should have a unique password. Each password should be randomly generated. Each password should be regularly...

Meeting Your Billable Hours Goal Post-COVID-19: How Technology Can Help
Is your law firm on track to meet its billable hours goal? Or has working from home (WFH) begun to negatively affect profitability? As the president of an IT company that serves law firms, I understand the high value placed on productivity. While work ethic,...

How to Efficiently Search for an Email in Outlook
Do you know how to search for an email in Outlook efficiently? Or does this scenario sound familiar... It’s a busy Monday, and you need to find an email that John Doe sent a month ago. You type “John Doe” in the mailbox search...

Do Your At-Home Attorneys Use this WFH Setup? If So, Your Data Is at Risk
When working from home (WFH) became a necessity, our legal clients quickly went remote. I suspect many other Charlotte law firms did the same. But I also suspect that—in the hasty transition to WFH—some firms allowed attorneys to directly access corporate data...

10 Ways Microsoft Teams Can Make Your Remote Workforce More Productive
Back in March, Mecklenburg County issued a COVID-19 stay-at-home order, and my whole team started working remotely. While I wasn’t exactly thrilled to lead our company from a bedroom desk, the past months have been pivotal for our team. Not only did we transition our...

Implement Multi-factor Authentication (MFA) for Microsoft 365 ASAP
What if I told you there’s a cybersecurity solution that “can block over 99.9 percent of account compromise attacks”? Don’t take my word for it. Read this Microsoft article on multi-factor authentication (MFA). If you’re not familiar with MFA, in short, it is a way to...

The Coronavirus Forced Us to Pivot, and I See Opportunity for Us All
This pandemic is taking lives, disrupting society, and taking an axe to our economy. It would be so easy to focus on the bad, the negative, and the depressing. But that stuff is obvious. We are living it. Personally, I see opportunity ahead! I see...

Our COVID-19 Update: Simple Guidance If Your Employees Are Working from Home
We can’t predict how bad the coronavirus (COVID-19) is going to get. The medical professionals I’ve communicated with indicate that it’s going to depend on what happens in the next two to three weeks. Right now,...

The Ransomware Data Breach Phenomenon
I came across a chilling article recently—an article that announces a new type of attack, the ransomware data breach. This piece talks about how cybercriminals have been accessing networks on the sly to determine how ransomware might cripple an organization...
Sign Up to Receive our Blog
Look No Further
Let's start a conversation today
Contact Us
6211 Carmel Rd
Suite 201
Charlotte, NC 28226
Phone: 704-464-3075
Email: info@weareproactive.com