(402) 817-2630 help@fivenines.com

IT Blogs & Articles

Five Nines experts sharing actionable IT advice.

Telework 202: What We Know Now

Telework 202: What We Know Now

To view the recording of our Tuesday Tech Talk, click HERE.  A large majority of workers around the country have been remote since March of 2020 when the COVID-19 global pandemic hit. Due to the quick nature of moving business operations out of corporate offices and...

read more
Endpoint Detection and Response

Endpoint Detection and Response

Five Nines will be implementing an Endpoint Detection and Response (EDR) tool for all partners.   How Does This Impact You: Your price per-user will increase by $4 per month and you will benefit from increased security, detection, and response. Five Nines will...

read more
How to Effectively Report a Tech Issue

How to Effectively Report a Tech Issue

When reporting a tech issue, the better the communication, the more effective the problem-solving. We want to provide you with what IT professionals look for when addressing a new request so that you can effectively report your future technology issues or questions....

read more
It’s Officially 2021: Set Your IT Goals

It’s Officially 2021: Set Your IT Goals

2020 was the year we were all forced to use technology to keep business going as usual. 2021 is the year to make your technology even more of a business asset if it isn't already.  Sometimes, that can be easier said than done. Just like you set new year's resolutions,...

read more
The Importance of IT Documentation

The Importance of IT Documentation

In all aspects of business, there is typically some form of documentation. You could be tracking certain numbers for goal completion, documenting budgets, or analyzing metrics for performance purposes. Just like anything else in your business, documentation of your IT...

read more
How Secure Is Your Manufacturing Operation?

How Secure Is Your Manufacturing Operation?

After the public and finance sectors, the manufacturing industry is the third most targeted by cyber-attacks, as the threat from malicious hackers, cybercriminals and corporate espionage escalate. The fact that industrial processes are increasingly connected - via the...

read more