IT Managed Services

A blog for understanding best practices in technology

The Benefits of Microsoft 365 Security Features

Microsoft 365 is an integrated solution that includes Office 365 and Windows 10 Enterprise, plus enterprise-level mobility and security features. Because of the included security features of Microsoft 365, you can save money by upgrading from Office 365 to Microsoft 365.
Read More

Revision 2 of NIST SP 800-171 is Released

As of December 31, 2017, companies that provide parts and services for suppliers serving federal and local governments must comply with the NIST 800-171 mandate. There have been some recent changes in how compliance is managed for this mandate.
Read More

CMMC Version 1.0 is Released

To increase the cybersecurity posture of companies operating in government supply chains, the Department of Defense announced the creation of the Cybersecurity Maturity Model Certification (CMMC) in 2019, and a draft was made available. On January 30, 2020, the DoD released Version 1.0 to the public.
Read More

Using a SIEM to Detect BEC & Other Cyber Attacks

Business email compromise (BEC), or imposter email, continues to plague businesses. In these scenarios, criminals gain access to an email account. Then, using the compromised account, they attempt to trick someone into sending money or sensitive information.
Read More

Microsoft 365 vs Office 365

Microsoft 365 and Office 365 are available in two sets of plans – one set for companies with up to 300 employees and another set for enterprise companies. Microsoft 365 includes the Office applications and business productivity tools of Office 365, but with lots more added in. What's even better is that the business plan includes a lot of security features you would expect to find only in enterprise plans.
Read More

Cybersecurity Maturity Model Certification & NIST Compliance

As of December 31, 2017, companies that provide parts and services for suppliers serving the government were required to be compliant with the NIST 800-171 mandate. Starting in 2020, a new certification will be required: Cybersecurity Maturity Model Certification.
Read More

How to Improve Your Firewall Security with a Vulnerability Assessment

Your network firewall serves as the first line of defense between your network and the untrusted Internet. The configuration of the firewall is equally as important as the firewall itself. And since networks evolve over time, you need to check the configuration on a regular basis and make changes as warranted.
Read More

Gain Business Disaster Recovery with Corserva's PC Backup Service

Everyone knows how important it is to back up your data to ensure business continuity. But that's not always easy in today's world where employees are working remotely or taking their laptop to multiple locations.
Read More

How to Select a Provider for Business IT Support Services

No matter the size of your business, you need technical support for any technology used in the workplace. At some point in your company's growth, it is likely you will consider outsourcing at least some of your IT functions. IT related tasks can become burdensome for staff when IT is not their primary function.
Read More

Best Practices in Virtual CIO (vCIO) Services

Recently, Corserva's VP of Technical Services, Sean McCloat, CISSP, was interviewed by Xaas Journal for an article on best practices that managed service providers (MSP) should follow when delivering virtual CIO services to clients.  Read the complete article here: "How to Build the Best vCIO Offering."
Read More

Subscribe to Email Updates