AllConnected Blog

AllConnected and Kosh Partner Photo Covid-19 Safety: Koert Council, Travis Alsup, Alan McDonald, Gavin Zimmer
AllConnected News
Mariah Prendergast

Growing a Trusted Partnership: AllConnected and Kosh Solutions

Through the Trust X Alliance, AllConnected has partnered with Kosh Solutions to improve recovery operations for Kosh clients. A new Veeam-powered capability has been added for Kosh through AllConnected, allowing the two companies to work together to provide Kosh clients with disaster recovery planning, deliver backup and DRaaS for those clients with quarterly or annual validation, and address additional layers within the NIST cybersecurity framework by working with a Recovery Operations Center.

Read More »
4 Ways to Boost Productivity and Security in Your Remote Workforce: Security, Comliance, Collaboration Tools, Other WFH Solutions - Microsoft 365, Citrix, Webex
AllConnected News
Mariah Prendergast

Top 5 WFH Security Policies You Need to Implement

We’ve all been figuring out how to effectively work from home for almost a year. Now it’s time to think about how to keep your remote workforce as secure as possible so your organization can remain productive. Join our webinar to learn how.

Read More »
man working on laptop computer with global network graphic and server
AllConnected News
Mariah Prendergast

The Way We Work in 2021: Stay Secure, Build Success

The onset of the Covid-19 pandemic triggered mass transitions to work-from-home setups, rather than on-premise offices and conference rooms. Working remotely became the new normal for many businesses, and those that were prepared to make the adjustment thrived during the unprecedented circumstances; those that were unprepared spent a lot of time and resources coming up with a way to continue operations remotely. It may have been easier for them and their entire team if they had a business continuity plan already in place for just that kind of disaster.

Read More »
Cisco Umbrella GIF with rain falling on umbrella
Managed Services
Mariah Prendergast

Cisco Umbrella: Your Cybersecurity Shield

Just as cybercriminals become more advanced with email spoofing, malware, and ransomware, your organization’s IT security must advance to defeat them.

You wouldn’t leave your business PC without Anti-virus software, but many businesses leave their email communications and Internet use to unsecured wi-fi and legacy firewalls.

Don’t be one of them.

Read More »
fire rescue
Disaster Recovery
Mariah Prendergast

DRaaS: Misconceptions of Data Backup and Data Recovery

There are many players in the data protection, backup and recovery space, many who claim to provide a “DRaaS” service, but not many provide for all aspects you should expect in a Disaster Recovery Solution.

AllConnected believes you should have the facts so you can make an informed decision.

Regardless of what business you run, your Disaster Recovery plan begins with backup.

Read More »
Security Services
Mariah Prendergast

Secure and Stabilize the #WFH experience for the Long Term

Your employees need executive leadership whether you’re in-office, on-the-road, or working-from-home. As you adapt to the new business environment and implement effective WFH communication, consider how a comprehensive WFH solution will drive productivity and satisfaction.

Read More »
woman wfh on laptop in bubble
Security Services
Mariah Prendergast

Employee Cyber Attack Readiness – WFH 8 Tips for Zero Trust

From an IT Security perspective, the term “social engineering” refers to cybercriminals using any number of psychological tricks to get users to perform actions (click on an email or link) or divulge personal or confidential information.

While technical hackers seek vulnerabilities in the networks or software, social engineering cybercriminals exploit an end user’s tendency to trust…

Read More »
Multi-factor authentication: something you know, something you are, something you have
AllConnected News
Mariah Prendergast

How Secure Is Your Multi-Factor Authentication?

Thanks to organizations like FIDO Alliance, authentication has become more sophisticated. Now, instead of yet another piece of information (like a pin or social security number), authentication is determined by the use of more than one factor, simply classified as “what you know”, “what you have,” or “what you are.

Read More »