Blog

Blog

Four Key Components of Successful Network Security

When securing your network, it pays to focus on a few areas. Let’s go over these areas to help optimize your efforts.

Read More

JTT's Weekly IT Tips

Join JTT's Director of Client Services, Nic Cofield, as he covers Ransomware Threats In Healthcare, Industry Templates in Microsoft Teams and Security Updates.

Read More

When the People You Trust Phish You

Display name spoofing is getting very specific. Today, we take a look at the prevalent problem and talk about ways you can mitigate your organization’s exposure to it.

Read More

Paying a Ransom Demand Could Get Even More Expensive

The United States Treasury Department says that ransomware payments may violate economic sanctions. Let’s dig into the issue.

Read More

Three Seldom Considered Elements of a Backup Strategy

Simply having a backup device doesn’t guarantee that your business will be ready for a data-loss event.

Read More

Mobility is Crucial

Is your business mobile-ready? Like it or not, your employees have mobile devices—it’s your job to make sure your infrastructure can securely handle them.

Read More