New FTC Safeguards Rule: What Insurance Agencies Need To Know
Is your insurance agency required to be in compliance with the new FTC Safeguards Rule? Learn what’s involved and if it applies to you.
Is your insurance agency required to be in compliance with the new FTC Safeguards Rule? Learn what’s involved and if it applies to you.
Effective management of security groups is a critical aspect of ensuring the security and integrity of your data in Applied Epic. Security groups are a
As you may have recently heard, LastPass (a popular password management software used by millions and recommended by KiteTech) was the recent target of a
As the world around us becomes increasingly digital, it has never been more crucial to know the threats that we face and how to avoid
So far in our Digital Hygiene Series, we have focused on keeping your systems neat and orderly. However, the most important part of digital hygiene
Digital hygiene doesn’t just apply to your computer. It’s also important for your mobile devices. Follow these five recommendations concerning your phones and tablets to
KiteTech Webinar Recording A Front-End User’s Guide to Transactions in Applied Epic You can watch the on-demand webinar below at any time https://youtu.be/AwRUiM7L0Ws Kite Technology’s
Authenticate: au-then-tic-cate; /ôˈTHen(t)əˌkāt/ – a computer user or process having one’s identity verified. Why Basic Authentication is Being Retired Nearly 3 years ago, Microsoft indicated
Email is an invaluable tool for both personal and professional communication. Still, an excessive volume of emails can accumulate in your inbox, making it difficult
If you have any experience working with a horribly messy file cabinet room, you know how important it is to practice good hygiene when storing
Over the past several years, cybersecurity awareness has become much more prevalent in mainstream media, and for a good reason. In this article, I want
We all love working on a brand-new computer because it is fast and responsive. However, over time, our new computers seem to slow down until
The world is filled to the brim with technology. Our day-to-day consists of constantly logging in and out of devices, applications, and websites. However, the
Zero-Day vulnerabilities are vulnerabilities in software actively being exploited in the wild but have not yet been disclosed to the software developer, or a patch
Insurance carriers have significantly increased the underwriting requirements of coverage this year beyond what has been previously in place. Though requirements vary somewhat depending on
Cyber Liability Policy Requirementsare Changing. Is Your Business Prepared? What your business needs to know About New Cyber Insurance Requirements Cyber crime is now one
Equipping your company with the right IT solution is critical to your success. For some companies, this may mean outsourcing their IT needs entirely, while
As news of Russian forces launching an attack on Ukraine hit the headlines on February 24th, it is vital that you keep security top-of-mind as
KiteTech Webinar Recording Implementing Applied Epic’s Renewals Manager in Your Agency You can watch the on-demand webinar below at any time https://youtu.be/85yzChi8qiA Kite Technology’s Managed
With the wide variety of phones on the market today and new ones coming out every year, it can be challenging to choose the right
KiteTech Webinar Recording Growing your Insurance Agency with Microsoft 365 You can watch the on-demand webinar below at any time https://youtu.be/M5VpwZETluw Kite Technology’s Managed IT
As smartphones and tablets become increasingly common in the workplace, hackers aren’t necessarily just using your device to infect it with malware, but also to
Microsoft has made us aware of a new threat against Windows operating systems and Office products. Known as CVE-2021-40444 this vulnerability is being actively exploited
We’ve all been there. You sit down at your computer to get some work done when you receive a notification alerting you that Microsoft updates
The benefits of “cutting the cord” on local IT infrastructure and going “all in” on Microsoft 365 are substantial. These benefits fall in three categories:
With so many businesses still having a distributed workforce, it is important to prioritize computer and network security. While there are various security threats associated
At KiteTech, we have always taken our responsibility for the security of our clients’ data seriously. But the stakes have continued to grow. As the
Every now and then, an email with a catchy subject line appears in your inbox and you end up clicking on it, either because you’re
Businesses and users today have more options than ever when selecting the right computer software for their needs. Fifteen years ago, perpetual software licenses were
Within all types of businesses, payment frauds pose a serious risk to your bottom line. Attacks related to wire transfer or email and invoice phishing
Meeting compliance is often burdensome for insurance agencies. Requirements constantly change, and many are technical – like making alterations to ensure your server and configurations
Change is inevitable. With the rapidly growing and ever-changing field of technology, many businesses are finding it difficult to keep up which is putting them
We’re going to let you in on a secret. For years, we’ve applied the NIST Cybersecurity Framework in our work to secure clients’ networks. We’ve
It’s not always hackers that create dangerous situations for your organization. Threats can come from even unforeseen locations, such as your business’s network. No matter
On January 14th of 2020, after a 10-year run, Microsoft’s support of Windows 7 and Server 2008 R2 will be ending. Many of you are
As an IT professional, I constantly stress the importance of training staff how to recognize security threats. The response I most often receive is “We
World Backup Day is a time when every business should contemplate whether or not they have proper data backup strategies in place. Considering it was
Sometimes threats come to light only after they’ve been around for long enough to cause concern for the public. This was the case with a
Did you know that almost 90 percent of small business owners feel they are completely safe from attack? It’s unfortunate, but the truth of the
Antivirus is a crucial component to any network security platform, but do you know how it works? Below, we’ll go over how your security is
While you may not consider it at first, your mobile device has a sizeable amount of personally identifiable data on it – far more than
Hacking is big business. It’s been estimated that cybercrime will cost the global economy $600 billion this year[i]. While some attacks will happen behind the
What’s a smartphone without some apps to download to it? With millions of apps to choose from, developers might often have less-than-virtuous motives that put
When discussing the practice of monitoring solutions to prevent threats, it isn’t uncommon for many businesses to put these concerns on the back burner. However,
Did you know that almost 90 percent of small business owners feel they are completely safe from attack? The truth of the matter is that
Let's talk!
We would love the opportunity to learn more about your business and how we can help.
Cloud solutions architect
Adam is passionate about consulting with organizations across the country to help them develop and execute a cloud adoption strategy that meets their business needs and future objectives. Adam oversees and manages our company strategy for Microsoft 365 adoption and is responsible for future growth and development inside Microsoft 365 and other cloud technologies.