IT Blogs & Articles
Five Nines experts sharing actionable IT advice.
The Ins and Outs of a Managed Service Agreement
Change is hard. Ask any business owner and they’ll tell you that the slightest change can cause ripple effects throughout an organization if not properly administered. Changing the way you manage and maintain your IT is no different, which is why it’s important to...
Ensuring HIPAA Compliance with a Risk Analysis
While you hear about the occasional breach of Protected Health Information (PHI) from large organizations, smaller medical offices often believe they are safe from a breach due to their size. When it comes to cybercrime, that is no longer the case. In fact, over three...
What is the Future of Software as a Service (SaaS)?
It’s all too easy to forget how integral and pervasive software-as-a-service (SaaS) has become to modern business operations, given the efficiencies and flexibility benefits it provides users. But like any sector, SaaS is constantly evolving as it incorporates new...
Secure Your Data & Devices With These Password Tips
In 2018, billions of people were affected by data breaches and cyberattacks and not only did people lose money, but they also lost their confidence in security. 52% of us use the same passwords for different online services. This means that half of us have decided...
Backups vs. Disaster Recovery: The Differences and How to Plan for Both
As business owners, we typically prefer not to think about what would happen if we suddenly lost all of our company’s data and crucial information through a breach or accident. With client trust on the line and a possible lack of compliance with regulation, there’s a...
Cyber-Insurance: How it Can Save You Long-Term
It's likely you have insurance plans for all of the unforeseen circumstances in life: apartment fires, cell phone accidents, and even getting sick. You may think of these plans as no-brainers, but have you considered whether you need a similar insurance policy for...
You Can’t Depend On Anti-Virus to Stay Secure. Here’s Why:
As technology continues to change, the number of ways your company can be targeted in a malware attack grows. At Five Nines, we emphasize educating our clients about potential attacks and what they could do to their operational systems. As their dedicated IT provider,...
How to Prepare Your Team for a Cyber-Attack: KnowBe4
As we close out the end of the year and look ahead, it’s important to keep cybersecurity top of mind in 2021. As a business, taking the time to educate your team about cybersecurity can help create a security-conscious culture, where people are not only aware of the...
Tools to Get The Most Out of Office 365
Cloud services have modernized the way companies work and allow for collaboration in any place, with any device. At Five Nines, we’re big fans of Office 365 applications, but there are so many features within the platform, that it can get confusing to understand which...
IT Asset Management: What It Is and Why It’s Important
It’s likely your company depends on several pieces of technology to consistently deliver a seamless product or service to your customers. When you consider that, protecting your technology assets and the IT environment that supports them for day-to-day business should...
Multi-Factor Authentication: What It Is & Why It Matters
We’ve talked a lot about the importance of changing your password and making sure you create ones that aren’t easily guessed. And while you should always beef up your password game, no matter how strong it is, there’s still potential for attackers to gain access...
3 Reasons Why Companies Consider Outsourcing IT
Technology unites us all. From banks to hospitals, we’re living in a period where technology is not only evolving but so is the experience you need to maintain your daily technology operations and innovations. Where technology gains in efficiency and security, so do...
5 Cybersecurity Tips to Keep You Safe at Home & Work
#1 - Practice Good Password Hygiene To practice good password hygiene, you will want to use strong and unique passwords and enable two-factor or multi-factor authentication. If you’re worried about having to remember a large number of unique passwords for all your...
Website Maintenance: Improving Security and Performance
Website breaches can cost millions of dollars and thousands of hours to remediate. Joe Brown, Five Nines Director of Marketing Operations, knows firsthand. In his career, he has worked with businesses to remediate breaches where a small WordPress vulnerability was the...
Unplug Over the Holidays – Leave “IT” to an MSP
The truth is, you can never really unplug from business if your IT infrastructure is not fully supported. With the holiday season right around the corner, we encourage you to unplug over the holidays and leave your technology in the hands of a capable Managed Services...
IT Strategic Planning for 2021 and Beyond
Strategic IT Planning is a collaborative process taken with clients to understand their business needs and goals, that ultimately allows the IT budget to appropriately align with the organizational priorities. As 2021 is quickly approaching, it’s time to...
Breach. Theft. Disaster. Preventing a Threat Before It Happens.
No matter the industry, cybersecurity will be critical to your organization’s long-term success. In our first Tuesday Tech Talk of the year, Jarrod Daake, our Director of Operations, and Cindy Beach, our Healthcare Consultant, explained the most common causes of...