Best Practices in Technology

A blog for understanding best practices in technology

Corserva Launches Premium Access Control for the Hospitality Industry, Powered by Amadeo

Corserva Adds Wiley Corbett III to Head New Apple Practice as VP Business Development

NIST 800-171 versus CMMC

NIST Compliant File Sharing

What is CMMC Compliance?

Microsoft Renames Office 365 Plans

Work from Home Securely During the Coronavirus Outbreak

The Benefits of Microsoft 365 Security Features

Revision 2 of NIST SP 800-171 is Released

CMMC Version 1.0 is Released

Using a SIEM to Detect BEC & Other Cyber Attacks

Microsoft 365 vs Office 365

Cybersecurity Maturity Model Certification & NIST Compliance

Why Smart Hoteliers Use Hospitality Managed Security Services

How to Improve Your Firewall Security with a Vulnerability Assessment

WiFi Challenges for Hotels

Gain Business Disaster Recovery with Corserva's PC Backup Service

The Easiest Ways to Improve Elder Care with Technology

How to Select a Provider for Business IT Support Services

Best Practices in Virtual CIO (vCIO) Services

Corserva Recognized for Innovative Technology by HospitalityNet

Hotel WiFi – How to Stop the Negative Guest Reviews

Meet Corserva at HITEC Minneapolis

What is a managed firewall?

What is IT consulting (and how does it work)?

How to Make IT Outsourcing Work for Your Business

SIEM vs. Firewall: Why do I need a SIEM if I already have a firewall?

How much do managed IT services cost?

How can an IT network assessment benefit my business?

The Benefits of Electronic Hotel Locks

How does Microsoft Office 365 help your business?

5 Ways to Protect Your Business from Hackers

Should You Use One IT Provider for Both Managed Services and Security?

SIEM Optimization: Tuning Your SIEM

How to Secure Your Business from Cyber Attack

10 Questions to Ask Before Selecting a Technology Provider

Test Your Cybersecurity Knowledge

Data Privacy and Securing Confidential Information

Why We Align Our Practice with the NIST Cybersecurity Framework

Preparing for Disasters with Disaster Recovery Services

How Risk Management Can Improve Your Company's IT

Using Managed SIEM for Compliance

Get Your Free Trial of Managed Security Services

Using Virtualization for Disaster Recovery

SSAE 18 SOC 2 Type II Attestation

Using Business Continuity Plans to Prepare for Disasters

Access Control Integration: Leveraging the IoT in Hospitality

The Benefits of Outsourced IT Support

The Definitive Guide to NIST Compliance

20 Ways to Improve Your Security Posture

Leveraging Microsoft Office 365 to Comply with NIST 800-171

Why We Love IT Asset Recovery Services (and you should too!)

3 Myths About NIST 800-171 and NIST Compliance

Which Backup Option is Best for You?

Why You Should Consider Outsourcing IT Help Desk Services

10 Questions to Ask When Evaluating Hotel Access Control Systems

Why use an MSP if I already have internal IT staff?

What is a managed services SLA (Service Level Agreement)?

Learn the Truth About NIST Compliance in the Next 90 Seconds

5 Questions to Ask About Managed Backup

What is managed IT security?

What No One Tells You About Computer Network Support

8 Factors Hoteliers Should Consider for Cloud vs. On-Premise Software

Corserva Expands Its Configuration and Integration Services

3 Essential Steps in Virtualization Design (from an Industry Veteran)

Leveraging NIST Assessments to Become NIST Compliant

Gain Email Security with Managed Services for Microsoft Office 365

What is managed services?

How to Prevent Business Email Compromise or Imposter Email Threats

5 Reasons to Outsource Office 365 Migration Services

Protecting Your Business from the WannaCry Ransomware Attack

Selecting an IT Service Provider with Its Own Data Centers

The Evolution of a Managed Service Provider

How to Protect Against Phishing Attacks

Corserva Installs New 911 Video Wall System for Orlando Police

What Can You Expect When Engaging with an MSP?

The Biggest Cybersecurity Trends Impacting Business Owners

10 Questions to Ask Before Selecting an MSP

Why “Between” is the Most Important Word in Cybersecurity

PCNet Changes Name to Corserva

8 Arguments Against Business Continuity Management

Cybersecurity - Will You Be a Victim or Survivor?

Subscribe to Email Updates