blog

This Month in Cyber Security: March 2022
2021 has taught us that cyber threats await us around every corner. Even though every threat may not be relevant to you, it's crucial to understand them. Every month, we host a 30-minute webinar to break down each threat to help you understand its applicability to...

Disaster Recovery with Azure Site Recovery Service
Businesses rely on solid disaster recovery (DRP) and business continuity (BCP) plans. Typically, strategies for fail-over and recovery can be a manual process that is time-consuming. Utilizing Azure Site Recovery Service (ASR) allows IT teams to automate and to...

P@ssw0rd is not a good Password
Let’s face it, we use personal identification numbers (PINs), passwords, and passphrases for everyday life: grabbing some cash at the ATM, online shopping, and of course logging into the domain at work. As frustrating as it can be to maintain all of these passwords,...

This Month in Cyber Security: February 2022
2021 has taught us that cyber threats await us around every corner. Even though every threat may not be relevant to you, it's crucial to understand them. Every month, we host a 30-minute webinar to break down each threat to help you understand its applicability to...

Enhance Collaboration with Teams Devices
Hopefully, everyone knows what a video conference room is, and how with the right hardware properly configured you can see and hear everyone on the screen, in the room, and remotely. What you probably don’t know is that now there are options to have the same...

What are the changes with CMMC 2.0 and how will they affect you?
In early November, the Department of Defense announced that there would already be changes to the relatively new CMMC security framework. The primary goal of the updated CMMC version is to make certification more simplified and obtainable for the supply chain. So,...

How to Implement Zero Trust in 5 Steps
Peters & Associates has recently partnered with Net at Work, a full-service technology and business consultancy. Our partnership empowers us to act as the trusted advisor for all our clients’ information technology needs. By leveraging the Net at Work MSP Alliance...

M365 Security: Immersion Experience – Recap
Thank you to all those who were able to attend. We are working with a partner to facilitate Customer Immersion Experiences (CIE) to facilitate learning these topics hands-on. We hope you liked it. As a recap, here were some of the things we discussed: Data Loss...

This Month in Cyber Security: January 2022
2020 has taught us that cyber threats await us around every corner. Even though every threat may not be relevant to you, it's crucial to understand them. Every month, we host a 30-minute webinar to break down each threat to help you understand its applicability to...

Jumpstarting CMMC in 2022
For all suppliers to the Department of Defense, this past month the Pentagon disclosed significant changes to the CMMC technical standard, most notably by removing two levels (former CMMC Levels 2 and 4) from the maturity model framework and designating CMMC Level 1...