Blog

Windows Hello simplifies logging in

You can now log in faster and more securely to your laptop, tablet, websites, or apps with Microsoft’s Windows Hello. You only have to use your camera to recognize your face or a fingerprint reader. Say hello to fingerprint, iris, and facial scans Windows Hello is an advanced biometric identity and access control feature in […]

Security Risk Assessment

As part of your organization’s Business Continuity Plan process, a Security Risk Assessment should be performed every year or two. Knowledge is power, and if you don’t know where your org’s security posture stands, how will you know what to remediate? How will you know what you are aiming at? How do you know what you don’t know?

A Security Risk Assessment will clearly lay out your strengths and deficiencies, and recommend remediation steps.

Mitigating cybersecurity insider threats

Did you know that in some industries the biggest cybersecurity threats come from inside a breached organization? Sometimes it’s motivated by financial gain and sometimes it’s plain-old ignorance. So how can you protect your organization from insider threats? #1 Educate You must teach your team to recognize personally identifiable information (PII) and understand the financial […]

AI is transforming healthcare — here’s how

In recent years, advances in technology have had a profound impact on the healthcare industry. For instance, artificial intelligence (AI) is helping medical professionals streamline service delivery to patients. Here are some of the ways that AI is transforming the healthcare sector. Virtual personal health assistants At the helm of the AI revolution are virtual […]

Office 365 productivity add-ons you must use

Microsoft Office 365 is one of the most successful and popular apps in the world, currently with 180 million users and counting. To enhance the user experience, it also offers these time-saving, productivity-boosting add-ons. #1. Teams Teams is ideal for organizations that collaborate frequently. It’s an instant messaging and document-sharing platform which seamlessly integrates with […]

6 Firefox features your business needs

Firefox may not be as ubiquitous as it used to be, but it remains a powerful browser. Make sure you’re taking full advantage of its capabilities by using these tools: Firefox’s secret tweak interface Catering to the more tech-savvy users, Firefox’s secret interface gives you a peek behind the curtain into the world of coding. […]

Taking business continuity to the cloud

Business continuity is often overlooked until it’s too late. But with the cloud on their side, IT departments and business owners can more easily adopt this strategy to help avert the next outage. Here’s how the cloud benefits implementations of business continuity. Better uptime Backing up to an internal drive or an external hard drive […]

HIRING GREAT PEOPLE

"Hello world – seeking fabulous team members!"

Does this ring true for you, like it does for us here at Imagine IT? Hiring great people is a key, and continual, process for us. We are always up for a conversation with people who are looking for their next career assignment or who are just plain curious about what it might look like to work for an IT company that puts culture at the forefront of the employee experience.

Nasty malware can bypass Windows 10 security

Researchers have discovered a type of malware that can easily bypass the security protocols of Windows 10. This malware is a new variation of ransomware called Snatch, and it comes with an added data stealer component. Designed to target corporate networks rather than consumers, Snatch has been modified to reboot your PC in Safe Mode […]