blog

This Month in Cyber Security: March 2022

This Month in Cyber Security: March 2022

2021 has taught us that cyber threats await us around every corner. Even though every threat may not be relevant to you, it's crucial to understand them. Every month, we host a 30-minute webinar to break down each threat to help you understand its applicability to...

Disaster Recovery with Azure Site Recovery Service 

Disaster Recovery with Azure Site Recovery Service 

Businesses rely on solid disaster recovery (DRP) and business continuity (BCP) plans.  Typically, strategies for fail-over and recovery can be a manual process that is time-consuming. Utilizing Azure Site Recovery Service (ASR) allows IT teams to automate and to...

P@ssw0rd is not a good Password

P@ssw0rd is not a good Password

Let’s face it, we use personal identification numbers (PINs), passwords, and passphrases for everyday life: grabbing some cash at the ATM, online shopping, and of course logging into the domain at work. As frustrating as it can be to maintain all of these passwords,...

This Month in Cyber Security: February 2022

This Month in Cyber Security: February 2022

2021 has taught us that cyber threats await us around every corner. Even though every threat may not be relevant to you, it's crucial to understand them. Every month, we host a 30-minute webinar to break down each threat to help you understand its applicability to...

Enhance Collaboration with Teams Devices

Enhance Collaboration with Teams Devices

Hopefully, everyone knows what a video conference room is, and how with the right hardware properly configured you can see and hear everyone on the screen, in the room, and remotely. What you probably don’t know is that now there are options to have the same...

How to Implement Zero Trust in 5 Steps

How to Implement Zero Trust in 5 Steps

Peters & Associates has recently partnered with Net at Work, a full-service technology and business consultancy. Our partnership empowers us to act as the trusted advisor for all our clients’ information technology needs. By leveraging the Net at Work MSP Alliance...

M365 Security: Immersion Experience – Recap

M365 Security: Immersion Experience – Recap

Thank you to all those who were able to attend.  We are working with a partner to facilitate Customer Immersion Experiences (CIE) to facilitate learning these topics hands-on.  We hope you liked it.  As a recap, here were some of the things we discussed: Data Loss...

This Month in Cyber Security: January 2022

This Month in Cyber Security: January 2022

2020 has taught us that cyber threats await us around every corner. Even though every threat may not be relevant to you, it's crucial to understand them. Every month, we host a 30-minute webinar to break down each threat to help you understand its applicability to...

Jumpstarting CMMC in 2022

Jumpstarting CMMC in 2022

For all suppliers to the Department of Defense, this past month the Pentagon disclosed significant changes to the CMMC technical standard, most notably by removing two levels (former CMMC Levels 2 and 4) from the maturity model framework and designating CMMC Level 1...