Five for Five: 5 Updates You Can Read in 5 Minutes

By
2 Minutes Read
Check out these 5 highlights from December!

Happy New Year From The IT Company

As we look ahead into the New Year, we want to take a moment to say thank you. We are so grateful for your partnership with us. We hope you

We loved spending time together as a team, reflecting and celebrating 2021 and looking ahead to 2022.

Screen Shot 2022-01-07 at 12.06.08 PM

 

Can I.T. Give You a Competitive Advantage?

If you believe you can’t leverage technology to improve your business, then you are right.

There is an extreme competitive advantage to businesses who see, understand and believe the value of IT and the outcomes it can bring their business.

IT is one of the best opportunities for leverage to accelerate business growth, expansion, profit, sales, efficiency, and effectiveness. You have the opportunity right now to gain an edge by understanding how technology can accelerate your goals.

Mid-market companies have been leveraging technology by bringing IT to the leadership table so they can align business objectives with their technology. As a small business, it is time to do the same.  But unfortunately we hear small business leaders say statements such as, “IT is just a necessary evil.”

While they’re right- IT is necessary in today’s world, it doesn’t have to be a negative. It’s when you choose to see IT as evil and just a necessity, you fail to get the full value out of your technology.

Read the Full Blog

10 Major Security Holes in Almost every Law Firm

If you are a law firm, there's a good chance your security is critical to your success. It is equally likely that there are holes in your security you may not realize or be thinking about.

The security holes in most law firms, make their organization a hackers dream. If cyber criminals can take this security holes and use them as a way to get in-  they have a party on their hands. We know that is something you want to avoid.

Here are 10 major security holes we see in almost every law firm:

  1. No defined security permissions on file shares.
  2. Users have local admin rights without separation of privileged accounts.
  3. No two-factor authentication (2FA) for M365 and VPN.
  4. No conditional access on M365.
  5. No email logging and security event management.
  6. No security event management on the VPN and firewall.
  7. No end-point detection system.
  8. No ongoing security awareness testing and training.
  9. Lack of Internet Content Control and DNS Level Filtering.
  10. Lack of policies and procedure, and the requisite testing of those P&P is an issue.

Read more about this list and identify how many of them apply to your firm. If you have even one of these security holes, it is time to take action. 

Read the Full Blog!

Catch Up on our Made Right Here Podcast!

Catch up on the latests episodes of #MRH!

Neil Koonce of  Healthcare Receivables

J Retinger of BioPet Labs

Stay tuned for upcoming episodes featuring part two with J Retinger of BioPet Labs, Terry Turner of All Occasions Party Rentals and Jim Caughorn of Graphic Creations.

New to Made Right Here? We're bringing you the stories of East Tennessee founders, builders and creators! From the idea behind it, to the impact it had on their employees, the community and their personal lives, we are taking you behind the scenes of the movements they built. Made Right Here is available on Apple, Pandora, Simplecast, Spotify and Google Podcasts, as well as YouTube. Be sure to follow Made Right Here on LinkedIn, Facebook, Instagram, and Twitter for updates and links to the episodes!

Newly Renovated East Tennessee Children's Emergency Department

The East Tennessee Children’s hospital is housing a newly renovated emergency department- and we could not be more excited for the people behind the project- Johnson and Galyon Construction and BarberMcMurry Architects.

Read the Full Blog