IT Solutions Blog

Implement Multi-factor Authentication (MFA) for Microsoft 365 ASAP
What if I told you there’s a cybersecurity solution that “can block over 99.9 percent of account compromise attacks”? Don’t take my word for it. Read this Microsoft article on multi-factor authentication (MFA). If you’re not familiar with MFA, in short, it is a way to...

The Coronavirus Forced Us to Pivot, and I See Opportunity for Us All
This pandemic is taking lives, disrupting society, and taking an axe to our economy. It would be so easy to focus on the bad, the negative, and the depressing. But that stuff is obvious. We are living it. Personally, I see opportunity ahead! I see...

Our COVID-19 Update: Simple Guidance If Your Employees Are Working from Home
We can’t predict how bad the coronavirus (COVID-19) is going to get. The medical professionals I’ve communicated with indicate that it’s going to depend on what happens in the next two to three weeks. Right now,...

The Ransomware Data Breach Phenomenon
I came across a chilling article recently—an article that announces a new type of attack, the ransomware data breach. This piece talks about how cybercriminals have been accessing networks on the sly to determine how ransomware might cripple an organization...

9 North Carolina Cybersecurity Incidents That Happened in 2019
In 2019, our state saw its share of cybercrime. From ransomware to malicious code, I can document at least 9 North Carolina cybersecurity incidents that happened last year. And here’s what’s sobering. This is probably the tip of the iceberg as CSO reports the...

An Open Letter to My Clients and Colleagues: Sweating the Details Means Caring about Cybersecurity in 2020
Dear Clients and Colleagues, I’ve been talking about cybersecurity. A lot. If you thought we turned up the volume on cybersecurity-focused content and education in 2019, your observation was correct—we did. In 2020, our message isn’t changing....

I Got an Email about Something Called a Microsoft SAM Engagement. What Should I Do?
You got an email from Microsoft. It’s assertive. It’s confident. And it’s talking about your business getting something called a Software Asset Management (SAM) engagement. What is a Microsoft SAM engagement? And how should you respond to the...

Why Your Business Needs a Cyber Breach Response Plan
71 days. This is the median time that a cybersecurity breach went undetected by organizations in North, Central, and South America according to FireEye. This is known as dwell time, which FireEye defines as the following: Dwell time is calculated as the...

The North Carolina State Bar Ransomware Attack: 5 Lessons in the Aftermath
It should be surprising, but it’s not. If you haven’t heard yet, the North Carolina State Bar was hit by a ransomware attack. Our State Bar announced on Thursday, October 3 that (on September 30) ransomware had infected the Bar’s servers. According to the...

Your Data Security Plan: The CPA’s Guide to the FTC’s Safeguards Rule
Every tax preparer needs a data security plan. That isn’t just my opinion. According to a July 2019 IRS announcement, “all ‘professional tax preparers’ must create a written data security plan.” The IRS cites the Safeguards Rule of the Federal Trade Commission (FTC)...
Sign Up to Receive our Blog
Look No Further
Let's start a conversation today
Contact Us
6211 Carmel Rd
Suite 201
Charlotte, NC 28226
Phone: 704-464-3075
Email: info@weareproactive.com