sitemap
Website info.
Pages
- About
- Are you prepared in the event of a breach?
- Are you prepared in the event of a breach? – Thank You
- AV
- Blog
- Camera
- Case Studies
- Cloud and Hybrid Data Centers
- Compliance
- Contact
- Coronavirus Latest News/Tips
- Cybersecurity Reference Guide
- Data Center Management
- Data Management
- Disaster Recovery
- Education
- End Of Support
- End of Support Is Approaching for Six Key Microsoft Products. Are You Ready?
- Events
- Firewall
- Get Started with Power BI
- GUIDE – Cloud Network Management
- GUIDE – Cloud Network Management – Thank You
- GUIDE – eBook Defending Your Data
- GUIDE – eBook Thank You Page
- GUIDE – Microsoft EOS Guide – Thank You
- GUIDE – Ransomware Guide
- GUIDE – Ransomware Guide – Thank You
- GUIDE – Small Business Guide to Simple IT Security Management
- GUIDE – Small Business Guide to Simple IT Security Management – Thank You
- Guides
- Help Center
- HIPPA
- Home
- Industries
- IRP Checklist for Financial Institutions
- IRP Checklist for Financial Institutions – Thank You
- Is Your School Secure? | Peters & Associates – Chicago, IL
- IT for Financial Institutions
- IT for Manufacturing
- IT Security and Compliance For Community Banks
- IT Security and Compliance For Community Banks – Thank You
- IT Security and Compliance For Financial Insitutions
- IT Security and Compliance For Financial Institutions – Thank You
- IT Solutions & Services
- Licensing
- Managed IT Security Services – Oak Brook, IL | Peters & Associates
- Managed IT Security Services – Chicago, Illinois | Peters & Associates
- Managed Security – Cisco Umbrella | Peters & Associates
- Maximize Your E-Rate Funding With Meraki
- Maximize Your E-Rate Funding With Meraki – Thank You
- Merger & Acquisition
- Microsoft Dynamics 365
- Microsoft Partner – Chicago, IL | Peters & Associates
- Microsoft Partners – Oak Brook, Illinois | Peters & Associates
- Microsoft Power BI
- Microsoft Windows 10
- Network Connectivity
- Newsletters
- Office 365 Security
- OneDrive
- Peters Interactive Assessment
- Phishing Test Free Trial
- Press Releases
- Privacy Policy
- Request Pricing
- Resources
- SAN
- Security Framework
- Security Review For Remote Workers
- Server & Storage Infrastructure Page
- Sharepoint
- Sitemap
- Special Offerings
- Teams
- Weekly Security Audit Free Trial
- Windows 7 End of Support
- Wireless
- Workstations and Mobile Devices
Posts by category
- Category: Business Intelligence
- 5 Ways Microsoft Power BI Boosts Efficiency
- Using Artificial Intelligence to simplify operations—unlocking your data’s potential
- Power BI: Actionable Insights Recap
- PowerApps
- Into the Weeds of PowerApps Licensing
- Microsoft’s PowerApps: The Basics
- Transform your Business with PowerBI (Overview 1:10)
- BI QuickStart
- Illinois ASBO Conference – Leverage Data for Effective Business Decisions
- Overcoming Business Challenges of IoT with Microsoft Solutions
- Decisions without Data – what we can learn from Punxsutawney Phil
- Let’s Talk Turkey – Overstuffed with Too Much Data?
- How can you drive Business Intelligence Adoption?
- Back to School – BI Solutions Rule!
- Leveraging Business Intelligence to Enhance Organizational Agility
- Why Change Management is Critical for a Successful BI Project
- Power BI Apps – A Roadmap to Improved Deployments and Enterprise Scalability
- Using Data to Succeed in a Competitive Industry
- What’s (v)Next on SQL Server for Business Intelligence and Analytics
- Time to Spring Clean (your Business Intelligence solution!)
- Power BI Manufacturing Demo – Vendor Management
- Power BI Manufacturing Demo – Inventory Management
- Securing the Internet of Things (IoT)
- Transform your organization with the Internet of Things (IoT) Recap
- Internet of Things (IoT) Simplified
- Top 5 BI Resolutions for 2017
- Azure Analysis Services: The Missing Piece to a Complete BI Solution in Azure
- Strategically Approach your Business Intelligence Initiatives
- ISACA Women’s Forum Recap
- What’s New in Reporting Services and R?
- 5 Keys to Successful Data Analytics Projects
- Category: Cloud
- The Basics of Azure Site Recovery
- Cisco Umbrella – Protecting your Users in a Remote World
- 6 Big Benefits of Cloud Computing for Small Businesses
- 5 Ways to Maximize Data Security in the Cloud
- The Benefits of Cloud-Hosted Email
- What is your cloud strategy?
- Pizza as a Service
- Enhance Productivity with Cloud Managed IT Services
- 3 Ways Cloud Computing Impacts Your Small Business
- Transitioning to the Cloud: Transforming Workflow, Efficiency, and Innovation in Small to Mid-Sized Businesses
- Cloud Readiness Assessment
- Lighten the Load with Azure as a Secondary Data Center Recap (3:00)
- Cisco Meraki – Small Business Networking Solution
- Cloud Workshop for Azure
- Considerations for Cloud Backup Storage
- Azure Site Recovery
- Is the Cloud Ready for Your Voice? You Decide.
- Multiple Office 365 Tenant Considerations
- Migrating Mailboxes to Office 365
- Office 365 In-Place Hold
- Category: Collaboration
- Opinion – Are SharePoint Spaces Worth the Business Effort?
- Teams Updates – Top 10 notable features from Ignite 2020
- Overview of SharePoint On Premise Zero Downtime Patching
- VMware Multiple-NIC vMotion
- Enable New Users – Remotely – Using Windows Autopilot over VPN!
- Incorporating the Right Tech Into Your Digital Learning Environment
- Federal Funding for Technology in Schools
- Microsoft Teams: Top 5 Features You’re Not Using
- Keep Your Hybrid Exchange Server Environment Supported
- Getting Ready for an Office 365 Mail & File Migration
- Microsoft Teams Customer Success Story
- Microsoft Teams: Stay Connected with Voice & Conferencing (3:03)
- Microsoft Teams: Top 10 Use Cases for Effective Collaboration (3:01)
- New Features in Microsoft Teams
- Microsoft Teams – Bringing Organizations Together, While Remote (Recap)
- Using a VPN for Your Remote Setup
- SharePoint Online – The Workflow Task Ribbon Is Suddenly Missing In The Documents
- Benefits of Microsoft DirectAccess
- Teams 203: Protect Teamwork with Governance & Security (Recap)
- Weekly Workshops Begin April 1st!
- Teams Collaboration Solution vs Zoom Conferencing Solution
- 3 Essential Tips for Working From Home Efficiently
- Teams 202: Improve Teamwork with Voice & Conferencing (2:22)
- Tips for Working Remotely with Microsoft Teams
- Collaboration Tips for Remote Teams
- Does your company suddenly need to work remotely due to COVID-19? Use O365!
- Teams 201: Optimize Teamwork with Top 10 Practical Use Cases (4:15)
- Zoom vs. Microsoft Teams Security
- Microsoft Teams 101: Why You Need Teams, How to Secure Teams, and Getting Started
- Where to start with Microsoft Teams?
- Is My Organization Ready to Implement Microsoft Teams?
- Is My Organization Ready for Adoption Planning for Microsoft Teams?
- What is the best way I can introduce SharePoint Online into my organization?
- Highlights of upcoming Microsoft Teams Features
- How Search and the Filter Pane work together in SharePoint Online Libraries
- Is My Organization Ready to Deploy Microsoft Teams?
- Shared Mailboxes in Office 365
- Reports, Reports, Get Your Office 365 Reports Here!!!
- Actions, Alerts, and Notifications, O365 My!
- How to Find a Deleted SharePoint Online Site in the Recycle Bin and Restore It
- SharePoint Framework (SPFX) Extensions Custom Action Cleanup
- Teams – The Hub for Teamwork in Office 365
- HREmployee Self-Service Center Demo (2:08)
- 4 Integration Possibilities for PowerApps in Office 365
- Boosting Efficiency with Microsoft Virtual Windows Desktop in Azure
- How To: Back out of SharePoint Online “Turn off sharing for non-owners on all sites in this site collection”
- HREmployee Self-Service Center
- Create a SharePoint Site Collection from the Site Template
- How should we use Office 365 applications?
- Moving to Microsoft Teams
- Office 365 Encryption Button
- Switching between Classic and Modern experiences in SharePoint Online
- Keep An Eye On Your Business Security: Making IT Your Company’s 6th Man
- My 10 Favorite Features in Microsoft Office 2016
- Teams: A Pillar of Solid Project Management
- Microsoft 365 Recap (2:30)
- Office 365 – to backup or not backup?
- Microsoft 365
- Oh no, my Office 365 trial tenant was deprovisioned! What can I do?
- Power Apps: Adapt to Big Data Recap
- PowerApps: Adapt to Big Data (4:43)
- Beware the Auto-Save!
- Get Started with HR Portal Recap
- Office 365: Modern Workplace Preview (1:58)
- Microsoft’s Surface Event: What has changed?
- O365 Security Group Rename
- Modern Workplace
- SharePoint Online Modern Pages – Custom CSS
- Analyzing Content with AI and ML in OneDrive and SharePoint
- Migration to Office 365 from SharePoint On-Premises
- What are SharePoint Hub Sites?
- 3 Takeaways from Microsoft Inspire 2018
- The New Office 365 Email Encryption
- The State of “Modern” Pages in SharePoint Online
- 5 Migration Approaches for SharePoint Online
- SharePoint Online Access Denied Error
- Innovating Collaboration
- SharePoint HR Portal
- SharePoint Online – When Timing on the Recurring Events is Incorrect
- Using Compliance Manager to strengthen your Office 365 tenant data protection and compliance
- Unifying Communication with Microsoft Teams
- Microsoft Teams – Data Storage Diagram
- Microsoft 365: A Complete IT Solution?
- O365 Retention Policies and SharePoint Online Information Management Policies – Is there peaceful coexistence?
- SharePoint List Column Formatting – Part I
- BUT…I own this domain, Office 365!!!
- How do I Resolve the HTTP Unauthorized Error in SharePoint 2013 Designer Workflow?
- Lotus Notes to Exchange Online – It’s Time
- Exposing SQL Data in SharePoint Online
- Upgrade Distribution Lists to Groups in Office 365
- SameTime to Skype Migration: 1, 2, 3
- SharePoint – Manage “Hidden” User Access from “Get a Link” Sharing
- Similarities between Skype and Teams
- End of Life = Beginning of Loss
- Can you resolve the column limitation of Microsoft Flow in SharePoint Online?
- Office 365 Organizations: Think Twice Before You Upgrade to iOS 11
- PowerApps – Filter SharePoint List Items
- Sharing Documents Externally via OneDrive
- Missed Connections: Web Conferencing Edition
- Extending SharePoint Online Capabilities with Azure Functions
- Designing Dynamic SharePoint Workflows
- Information Architecture Design – Improving the SharePoint Experience
- The Four Corners of SharePoint Design – Part 4, Business Workflow
- Office 365 & Deep Dish Pizza – Saving your Organization from a Food Coma
- Making Sense of the Collaboration Tools Available in Microsoft O365
- Site Provisioning in SharePoint
- The Four Corners of SharePoint Design – Part 3, Collaboration
- The Four Corners of SharePoint Design – Part 2, Document Management
- Email Enabled lists in Office 365 & SharePoint Online
- Untapped Office 365 Features
- Introducing the Peters & Associates HRPortal!
- The Four Corners of SharePoint Design – Part 1
- Microsoft Pass-Through Authentication and Seamless SSO
- 5 reasons you’ll want to use Microsoft Stream
- Office 365 – The Next Evolution for Educators
- Office 365 Updates & SharePoint Online
- What’s New in Hyper-V 2016
- Securing Emails with Office 365 Message Encryption (OME)
- SharePoint, Security & Records Retention Enforcement
- Why you should brand Office 365/Azure sign-in pages
- Safari and SharePoint – How Safari REALLY works
- Get More out of SharePoint Search
- Automating Business Processes with SharePoint Workflow
- Category: COVID-19 News
- Category: Infrastructure
- Why Your Warehouse Security Camera System Should Integrate With Your Network
- Infrastructure Upgrades Where Do I Start?
- Why Funding Should Go Towards Providing Internet Access for All Students
- Addressing Common IT Challenges of Implementing Digital Learning Solutions
- 5 Ways to Bolster Your IT With Network Security Assessments
- Using Azure Site Recovery to Reduce Monetary and Time Loss in a Ransomware Compromise
- Disaster Preparedness for IT: Information Critical for Recovery
- Is my Wireless Infrastructure fast enough? Navigating the waters of 802.11
- Cisco Meraki Cameras
- Meraki Infrastructure – from the Small Business up to the Enterprise
- Windows 10 Out-of-Box Experience Customization
- 4 Ways To Reduce Energy Costs in Your Data Center
- Branch Network Management: Tips for Small Businesses
- Small Business Wi-Fi Solutions – Ease of Management is Key
- Migrating a DHCP Database between Cisco Switches
- Meraki Security
- Using the GPU on an Azure NVIDIA enabled virtual machine
- Meraki Guest Wireless Access Made (REALLY) Easy
- Today’s Data Center: Modern Infrastructure for the Modern Worker Event Recap
- Safely add credentials to automate your scripts
- System Center Configuration Manager Intune Co-management for Windows 10
- Having an Active Directory Migration Error? Maybe it isn’t what you think…
- Troubleshooting DHCP when users can’t connect
- Exchange Server 2019
- Site-Aware Clustering
- Missing DMARC reports? You might be missing a DNS record.
- SD-WAN or MPLS? Trick Question . . .
- How do I monitor redundancy?
- Having issues with your Citrix UPM Upgrade?
- Configure Workstation BIOS with SCCM to Take Advantage of Windows 10 Security Features – Part 2
- Configure Workstation BIOS with SCCM to Take Advantage of Windows 10 Security Features – Part 1
- Configure eDiscovery Permissions Filtering for Content Search
- Server Message Block 3.0 and Firewalls
- Documenting a Network 101
- Microsoft Cloud Administration on the Go
- Microsoft Exchange Online Auditing
- Which Filter Came First – the Malware or SPAM?
- Importance of periodically validating your Sender Policy Framework record
- Citrix StoreFront HTTPS Redirection in a Load Balanced Environment
- Chrome will no longer trust older Symantec Certificates
- Simple Offsite File Storage
- Still have ADFS? Time to reconsider.
- Testing Windows 10 Enrollment in AutoPilot
- File Restore on StorSimple
- Are you staying current? Some Windows 10 builds don’t receive updates. Keep up!
- Lagged Copy Database: A Story of the Tortoise and the Hare
- Office 365 Tenant Migrations
- Product Review – Meraki MV21/71
- How Do I Keep Citrix StoreFront Server Groups in Sync?
- Glad you’re embracing Azure IaaS….but did you forget something? (Part 2 of the 2 part series)
- Glad you’re embracing Azure IaaS….but did you forget something? (Part 1 of a 2 part series)
- Why are My Services Not Starting When Rebooting?
- Leveraging Windows AutoPilot for Device Provisioning
- No “miracle supplements” required – addressing wireless performance issues
- E-Rate 2018 – Funding Opportunities for all Schools and Libraries
- Slow Disk-to-Disk backups? It might be a simple fix!
- Thick or Thin: Choosing the right provisioning method for your virtual machines
- When was the last time you tested your Disaster Recovery plan?
- Narrowing down where intermittent network issues exist
- Manage Windows Local Administrator Passwords with LAPS
- Are Power Settings Holding Back Your Virtual Machines?
- Designing a loop-free, redundant network
- Ignorance is NOT Bliss
- Cluster Patching – It’s easier than you remember
- Using AD LDS with a Cisco VPN and leveraging dynamic access lists
- There’s an App for that…in Office?
- Cloud-y with a Chance of Control
- Preventing and Correcting Image Cleanup Errors During Citrix Machine Creation Services (MCS)
- Windows Server 2016 Active Directory
- Am I utilizing and securing my network devices to the fullest extent? – Guidelines to the low hanging fruit of your network.
- Windows 10 Creators Upgrade with Microsoft SCCM
- Modern Authentication Part 2 – How the Modern Authentication Protocol Works
- Some forgotten team features in Outlook & Skype for Business
- Citrix Receiver for Windows: Domain Pass-Through Authentication
- Deploying the Click-to-Run version of Microsoft Office 365 Pro Plus Using SCCM
- Modern Authentication – Part 1
- Windows Server 2016 DNS Improvements
- Is my Wireless Infrastructure fast enough? – Navigating the waters of 802.11
- Hyper-V Snapshots – Who, What, When & Why
- Spoiled Milk – Avoiding Expired Certificates
- Nano Server! One of the best new features of Windows Server 2016
- Hyper-V Replica & Guest Configuration Synchronization
- Encrypting your backups, why and when?
- Windows Server 2016 – What are we excited about?
- Got Storage? Azure StorSimple can increase file storage while simplifying backup & DR
- Configuring MAPI/HTTP in Exchange Server 2016
- Azure File Storage
- So your Microsoft Windows Update won’t start? Here’s what you can do.
- Search Service Tuning on a Remote Desktop Services (RDS) Server
- Category: Managed Services
- Microsoft Funding Opportunities
- 7 Benefits of Co-Managed IT Services
- E-Rate 2021 Explained: Setting Up Schools for Success Recap (5:00)
- How Co-Managed IT Services Work?
- 3 Principles of Community Bank Security Management
- Every School Needs Wireless Tech:
Pay 10 Cents on the Dollar for IT With E-Rate - Establishing Ongoing Community Bank IT Security
- How IT Outsourcing Works in the Banking Industry
- We’ve Got This: Security Monitoring with a SIEM
- 6 Critical Elements in an Information Security Policy for Community Banks
- We’ve Got This: Security Awareness Training
- What’s New with Autopilot Hybrid Azure AD Join Over VPN?
- 4 Questions You’ll Get Asked in Internal and External Vulnerability Assessments
- Data Breach Best Practices for Financial Institutions
- We’ve Got This: Securing Office 365
- In-House, Outsource, and Hybrid IT
- How to Improve Your Community Bank’s Risk Assessment Methodology
- How to Conduct an Internal Cybersecurity Assessment for Your Bank
- We’ve Got This: Backup & Recovery
- We’ve Got This: Endpoint Protection
- We’ve Got This: Patch Management
- We’ve Got This: Essential Managed Services
- 5 Advantages of Managed Patching
- 5 Advantages of Managed Endpoints
- Advantages of Managed Security Service Providers
- Advantages of Going With a Full Managed Services Provider
- How IT Managed Services Providers Enhance Customer Support
- Safeguarding Company Laptops: 5 Ways to Protect Your Business
- Vendor Promotions: Primary Customer Resource to Solve Business Continuity Challenges due to COVID-19
- Microsoft Teams – Office 365 E1 Trial
- PULSE Alarm Managed SIEM Service
- What is SIEM as a Service?
- Planning for SQL 2008 End of Support
- How to Prepare for Exchange 2010 End of Support
- Is Upgrading Windows Server 2008 Before End of Support Worth It?
- Using Cisco Umbrella to Protect Your Mobile Workforce and Company Assets
- Security Risks of Using Windows 7 After End of Support
- Improve Cybersecurity in Schools with a Managed Security Services Provider
- Ransomware and Your Backups: Why Your School May Be At More Risk Than You Think
- Security Awareness
- Managing iPhone Security in Your BYOD Policy
- Are Your Data Backup Methods Secure?
- How are you celebrating National Preparedness Month?
- Planning for End of Support
- Back to School Physicals
- Back to School Checklist – Check your Backups
- Cloud by the Slice: Chef-Inspired Solutions Delivered
- Transition Your IT Department with a Strategic MSP
- 3 Things to Consider When Choosing an IT Provider
- Managed End User Security
- 5 Ways Managed Security Services Keep Your Business Protected
- Nothing But Net: The Brain (AI), The Brawn (Nimble), The 6th Man (Peters)
- Who has your back?
- Ransomware Defense for Small Businesses – Are You Prepared?
- Benefits of Outsourcing IT Security Services for Small Businesses
- Small Business Cyber Security Best Practices
- Too busy fighting fires? Let us take the call!
- Spring Cleaning: Out with the old (Windows) and in with the new!
- Backup and Managed Backup
- We’re On IT: Managed Security Recap (3:00)
- Advantages of a Cloud Managed Wireless Network
- We’re On It: Managed Services & Security
- Managed Back-up Recovery
- Windows 7 EOS
- PULSE Alarm
- PULSE Complete (Cubed)
- “I Need Computer Help”
- VMware Health Analyzer
- When, Why, and How to Encrypt Your Veeam Backups
- Peters & Associates named one of top MSPs worldwide
- PULSE Complete Network Management
- PULSE Complete Server Management
- Manual Log Review
- Microsoft’s GitHub Purchase Ushers in New Era of Open-Source
- Process versus People: When to Invest in Tech
- PULSE Complete Remote End User Management
- Peters & Associates Honored for Excellence in Managed IT Services
- 2017 in Review
- The Value of Volume Shadow Copy
- Make Those New Habits Stick!
- Where should I backup my data?
- Halloween Candy! – and some advice for selecting a technology partner
- Migrating Off of IBM Notes: 1, 2, 3
- School IT Support – By the Numbers
- The Benefits of Performance and Health Monitoring
- Do you have a Patch Management Strategy?
- Am I backing up everything I need?
- Managed Firewall Services – Reasons to have it
- Do you backup everything you will need in case of a disaster?
- Cloud Economics: A Managed Services Provider is the missing link
- Remote Monitoring and Management (RMM) vs. Security Information Event Management SIEM)
- Your Information Technology Portfolio is Evolving
- Are you ready for these changes from Microsoft?
- Strategies for IT staffing
- Category: Security
- What the Solarwinds Orion Breach Reminds Us About Security as a Service
- How Veeam and ExaGrid Integrate to Protect Against Ransomware
- The Importance of Limiting Domain Admin Groups
- Proactive Protection: VMware Health Assessment
- This Month in Cyber Security: November 2020 (2:00)
- Securing IoT Devices in a Manufacturing Environment
- Don’t Take the Bait
- Manufacturing Meets Security
- This Month in Cyber Security: October 2020 (1:55)
- Veeam: Your Secret Weapon to Defeating Ransomware
- Everything You Need to Know About Incident Response Plans
- 3 Free Ways to Check and Enforce Your
Team’s Cybersecurity - This Month in Cyber Security: September 2020 (2:25)
- What’s the difference between Azure ATP, O365 ATP, and Defender ATP?
- This Month in Cyber Security: August 2020 (2:08)
- Identity Access Management: How It Works
- This Month in Cyber Security: July 2020 (2:00)
- Traditional Antivirus Versus Next-Gen Antivirus
- Traditional Firewall Versus NextGen Firewall
- HPE MSA Firmware Update
- 10 Steps of Ransomware Readiness: Prescriptive Guidance
- This Month in Cyber Security: June 2020 (2:45)
- Backup Server as a non-domain-member
- Proactive Protection: Uncover Unauthorized Access to Your Organization!
- This Month in Cyber Security: May 2020 (2:22)
- Securing SMTP AUTH in Exchange Online
- Ransomware and Cybersecurity
- This Month in Cyber Security: April 2020 (1:31)
- Cisco ASA SSLVPN/AnyConnect Configuration – Integrating with MS MFA
- MFA in a Day: Turn it ON, Lock it DOWN (Recap)
- Prepping For A Returning Workforce
- This Month in Cyber Security: March 2020 (2:12)
- Managing a Remote Workforce
- Catch the Bad Guys Red-Handed with SIEM (2:43)
- Is My Organization Ready to Manage the Rules and Security for Microsoft Teams?
- 5 Questions to Ask Before a Breach Occurs
- The Recent Citrix Breach
- Are you ready for 802.11ax (Wi-Fi 6)?
- This Month in Cyber Security: Jan 2020 (1:43)
- VMware ESXi Host Issues with a Full /var Partition
- This Month in Cyber Security: November 2019 (1:42)
- Cyber Security and Education: Who You Gonna Call?
- What keeps you awake at night….
- This Month in Cyber Security: October 2019 (2:08)
- Cyber Security and Education: The Grim Reality of Phishing
- Cyber Security and Education: The Ransomware Curse
- 3 Easy Ways for Faculty and Staff to Identify Phishing Scams
- Sources of Account Lockouts
- 6 Common Cyberattacks That Threaten Your SMB
- Phishing
- This Month in Cyber Security: September 2019 (2:18)
- Taste of Technology 2019: Event Recap
- How Cisco Meraki Cameras Boost Business Security
- Securing company data on personal devices
- Football Season is Back – How are you Defending your Endzone?
- How Webroot’s Secure Anywhere Endpoint Protection Works
- Disaster Recovery & Business Continuity Plans
- This Month in Cyber Security: August 2019 (2:28)
- Five Core Principles of Password Security
- Least Privilege and Risk Management
- This Month in Cyber Security: July 2019 (2:13)
- The Benefits of Integration: Why Your Business Needs an Integrated Approach to IT Security
- Wake-up Call on Security
- This Month in Cyber Security: June 2019 (2:33)
- Cyber Security for the SMB
- This Month in Cyber Security: May 2019 (2:20)
- Integrated Backup and Security: Your IT Grand Slam
- Network Security Common Mistakes for Fast Growing SMBs
- Peters and Associates’ PULSE Assure Security Services…Your one stop shop to navigate a complex security threat landscape for your organization
- Data Classification – What are your crown jewels?
- This Month in Cyber Security: April 2019 (1:54)
- Small Business Network Security Recommendations
- Meraki MV Series Product Update and Comparison
- Advanced Threat Protection
- This Month in Cyber Security : March 2019 (2:10)
- Meraki Cameras in the Enterprise
- This Month in Cyber Security: February 2019 (2:38)
- Vulnerability Scanning vs. Penetration Testing
- This Month in Cyber Security: January 2019 (2:00)
- Enterprise Mobility + Security (3:16)
- 2018 in Review
- Understanding Email Retention
- Enterprise Mobility + Security
- What do you own, but aren’t using?
- Business Email Compromise
- This Month in Cyber Security: November 2018 (2:25)
- This Month in Cyber Security October Preview (2:39)
- Windows 10: Modern Workplace Preview (1:53)
- Enterprise Mobility + Security: Modern Workplace Preview (2:05)
- The Changing Role of CISOs
- This Month in Cyber Security September Preview (1:56)
- I have MFA enabled…but I never get prompted on my PC
- Auditing firewalls – Tips for wading through the swamp
- Cryptojacking the Internet-of-Things
- This Month in Cyber-Security August Preview (Video 2:03)
- Microsoft Uncovers Large Scale Spoofing Scheme
- Business Email Compromise: Are you at Risk? (Video Preview 1:49)
- Business Email Compromise is Rampant – How to Protect Yourself
- This Month in Cyber-Security – July 2018 Video (Preview 2:59)
- Reviewing your Office 365 Security Periodically
- Office 365 Multi-Factor Authentication
- Taste of Technology: Event De-Brief
- This Month in Cyber-Security June 2018 (Overview 1:30)
- Cryptojacking: Concealed Crypto-Mining Could be Costly
- Office 365: Complete Security (Overview 1:54)
- GDPR: Reasonable Plans & Readiness (Overview 1:47)
- Are you DFARS Compliant? (Overview 2:15)
- Data Security and Privacy Compliance
- Cybersecurity Forum Breakdown
- Controlled Unclassified Information: DFARS in Manufacturing
- The Business of Hacking your Business
- New Tactics in Social Engineering
- O365 Custom Sensitive Information Types – A Business-Person’s Guide
- The Identity Perimeter and How to Strengthen It
- Protecting Your Office 365 Environment
- This Month in Cyber Security – 4.24.2018
- Azure Cloud: Is it Secure?
- Azure Backup and the Evolving Threat of Ransomware
- Cisco Lunch Seminar Review
- Hunting for Phishing in Office 365
- Meraki MV21/71 Product Review – UPDATE!
- 2018 Winter Security Summit Review
- Firmware Frustrations
- The Castle’s Security Spend Shift
- Using Secure Score to harden your Office 365 tenant security
- Security Traditions
- Office 365 Security – Keep improving your security posture
- Be the Jedi Master for Your Organization
- Windows Defender Application Guard
- Parachute Testing
- Customizing Your Office 365 Portal
- GDPR – Is it a Sheep in Wolf’s Clothing, or a Big Bad Wolf?
- Insurance may not cover your losses from Funds Transfer Fraud and Business Email Compromise
- An Ode to Equifax
- Cybersecurity Awareness: The Process Problem
- Are your employees click-happy?
- Configuring Office 365 to help in the battle against phishing and spam
- The Importance of Culture in Security Awareness Programs
- Illinois CPA Society’s 2017 Midwest Accounting & Finance Showcase Event Recap
- Cyber Security & the RACI Factor
- Great Goalie, Great Save!
- Cyber Security Threats to Watch For
- Is your Business Ready for these New Regulations?
- A Data Classification Project
- Are You Maximizing Your Cyber Security Investments?
- Microsoft 365 and Peters & Associates: Secure Cloud Productivity, the Experts to Make it Real
- Cyber Disaster & Recovery – Is Your Organization Ready or Just Your IT Staff?
- Reduce Ransomware by 70%
- Starting the Azure Information Protection Conversation
- Is your organization throwing spaghetti at the wall?
- Peters & Associates Security Summit – Spring 2017
- Migrating email to the cloud as a security strategy
- Cyber security, it’s the culture . . .
- Managed Mobility Management + Cloud + Security
- The Ransomware Saga Continues
- Microsoft EM+S – Two Flavors of Mobile Device Management
- Have you established your security baseline?
- Do you own EMS? Get more out of it!
- Ransomware + SIEM = Pre-detection
- Guardians of Your Galaxy Recap
- Have you checked out our Defending Your Data eBook?
- May the Fourth be with You – Happy Star Wars Day!
- Don’t Click That! Oops, too late.
- Can You Make the PIPA Compliance Cut?
- Anatomy of a Cyber Attack: Risks and Threat Mitigation
- Azure – the Aspen of security
- How to Prepare your End Users to Fight Against Cyber Hackers – Ransomware Series Part 8
- Ransomware – Is there a Silver Bullet?
- The Evolution Continues – Ransomware Series Part 7
- Cyber Security: What Does It Mean for My Business?
- What does a Cyber Hacker really want? – Ransomware Series Part 6
- The evolution is here. Are you worried yet? – Ransomware Series Part 5
- Ransomware – Should I pay?
- You probably shouldn’t open that email!
- Hackers Known Targets and Entry – Ransomware Series Part 4
- Are you prepared to respond?
- Chicago IMA Chapter – January 2017 Educational Event
- Is your Security Information Event Management (SIEM) Tool the same as having User & Entity Behavior Analytics (UEBA)?
- I’m infected with Ransomware. What do I do? – Ransomware Series Part 3
- SEC Examinations – Are you prepared?
- Peters Goes Rogue: A Security Story
- Ransomware is real, so why not start preventing it? – Ransomware Series Part 2
- Is my network security good enough? The case for Next-Generation Firewalls
- This Month in Cyber Security: November 2016
- Ransomware: there isn’t just one kind to be concerned about – Ransomware Series Part 1
- Disaster Recovery/Business Continuity
- Third Party Risk/Avoiding Business Disruption
- Email Encryption – Is it really necessary?
- Data Classification – Who needs it?!
- This Month in Cyber Security: October 2016
- Protecting revenue with your backup strategy
- 5 Steps to Take Control of Your Data Now!
- You are losing company data without knowing it – Shadow IT
- Hiring a Cybersecurity Expert? 3 Key Considerations
- Category: Uncategorized
- ChickTech High School Conference 2019
- Peters & Associates Builds, Manages and Protects Their Customers IT Grid with Unparalleled Knowledge and Support
- Peters & Associates Ranked Among Top 501 Global Managed Service Providers by Channel Futures
- ChickTech Event Recap
- Peters & Associates Recognized for Excellence in Managed IT Services
- Peters & Associates Earns CompTIA Security Trustmark – Award-Winning Technology Service Provider Receives a Highly Respected Security Credential
Events
- The Best Duo Since PB&J: Exagrid & Veeam Simplify Backup & Security for SMBs
- This Month in Cyber Security 2021
- This Month in Cyber Security 2021
- This Month in Cyber Security 2021
- This Month in Microsoft Teams
- This Month in Microsoft Teams
- This Month in Microsoft Teams: Features & Functions
- Erate 2021 Explained: Setting Schools Up For Success
- Veeam: Your Secret Weapon for Defeating Ransomware
- Essential Services: Security Monitoring with a SIEM
- Essential Services: Security Awareness Training
- Essential Services: Securing Office 365
- Essential Services: Backup & Recovery
- Essential Services: Endpoint Security
- Essential Services: Patch Management
- Microsoft Teams: How to Stop Team Sprawl & Control Access
- Microsoft Teams: Staying Connected with Voice & Conferencing
- Microsoft Teams: Top 10 Use Cases for Effective Collaboration
- This Month in Cyber Security
- This Month in Cyber Security
- This Month in Cyber Security
- This Month in Cyber Security
- This Month in Cyber Security
- This Month in Cyber Security
- This Month in Cyber Security
- Weekly Workshop – Technology Challenges & Solutions due to Coronavirus
- Weekly Workshop – Technology Challenges & Solutions due to Coronavirus
- Weekly Workshop – Technology Challenges & Solutions due to Coronavirus
- Weekly Workshops - Technology Challenges & Solutions due to COVID-19
- Microsoft Teams: Bring Your Organization Together, Apart
- MFA-in-a-Day: Turn it ON, Lock it DOWN
- Weekly Workshop – Technology Challenges and Solutions arising due to Coronavirus
- Weekly Workshop – Technology Challenges and Solutions arising due to Coronavirus
- Weekly Workshop – Technology Challenges and Solutions arising due to Coronavirus
- Weekly Workshop – Technology Challenges and Solutions arising due to Coronavirus
- Weekly Workshop – Technology Challenges and Solutions arising due to Coronavirus
- Office Hours: Remote Access Community Challenges
- Office Hours: Remote Access Community Challenges
- Office Hours: Remote Access Community Challenges
- Teams 203: Protect Teamwork with Governance & Security
- Teams 202: Increase Teamwork with Voice & Conferencing
- Teams 201: Optimize Teamwork with Top 10 Practical Use Cases
- Catch the Bad Guys Red-Handed with SIEM
- Why You Need Teams, How to Secure Teams, and Getting Started
- This Month in Cyber Security
- This Month in Cyber Security
- This Month in Cyber Security
- This Month in Cyber Security
- Get Prepared for Microsoft EOS
- This Month in Cyber Security
- Who you gonna call?
- The Grim Reality of Phishing
- The Ransomware Curse
- This Month in Cybersecurity
- Get Started with HREmployee Self-Service Center
- Taste of Technology Tour
- Cloud by the Slice: Chef-Inspired Solutions Delivered
- Nothing But Net: The Brain (AI), The Brawn (Nimble) and The 6th Man (Peters)
- This Month in Cyber Security: What are the New Risks, How Do They Impact You, and How Can You Protect Yourself
- This Month in Cyber Security: What are the New Risks, How Do They Impact You, and How Can You Protect Yourself?
- Integrated Backup & Security
- This Month in Cyber Security: What are the New Risks, How Do They Impact You, and How Can You Protect Yourself?