Skip to main content
Four Key Components of Successful Network Security
When securing your network, it pays to focus on a few areas. Let’s go over these areas to help optimize your efforts.
JTT's Weekly IT Tips
Join JTT's Director of Client Services, Nic Cofield, as he covers Ransomware Threats In Healthcare, Industry Templates in Microsoft Teams and Security Updates.
When the People You Trust Phish You
Display name spoofing is getting very specific. Today, we take a look at the prevalent problem and talk about ways you can mitigate your organization’s exposure to it.
Paying a Ransom Demand Could Get Even More Expensive
The United States Treasury Department says that ransomware payments may violate economic sanctions. Let’s dig into the issue.
Three Seldom Considered Elements of a Backup Strategy
Simply having a backup device doesn’t guarantee that your business will be ready for a data-loss event.
Mobility is Crucial
Is your business mobile-ready? Like it or not, your employees have mobile devices—it’s your job to make sure your infrastructure can securely handle them.