Skip to content
Corserva Blog

Best Practices in Technology

Lisa DeVotoSeptember 12, 20178 min read

What is managed IT security?

Cybersecurity is near the top of everyone’s list of key business concerns and challenges. ...
Start Reading
Lisa DeVotoJuly 6, 20174 min read

Gain Email Security with Managed Services for Microsoft Office 365

Complex targeted attacks and malware are no longer reserved purely for big business. All ...
Start Reading
Joe Grzybowski, GSEC, CEHMay 31, 20172 min read

How to Prevent Business Email Compromise or Imposter Email Threats

Business email compromise (BEC), also known as imposter email, is an emerging global ...
Start Reading
Joe Grzybowski, GSEC, CEHMay 19, 20172 min read

Protecting Your Business from the WannaCry Ransomware Attack

Undoubtedly you've seen the news about the spread of the WannaCry / WannaCrypt ransomware ...
Start Reading
Sean McCloat, CISSPMay 2, 20175 min read

The Evolution of a Managed Service Provider

Many IT service providers that started out in the break/fix model have simply slapped on ...
Start Reading
Joe Grzybowski, GSEC, CEHApril 25, 20173 min read

How to Protect Against Phishing Attacks

"Nation State Level Attacks" or "Zero Days" grab people’s attention (the hook), but if ...
Start Reading
Sean McCloat, CISSPJanuary 18, 20175 min read

The Biggest Cybersecurity Trends Impacting Business Owners

From discussions with new customers over the past 30+ years, we know that confusion over ...
Start Reading
Sean McCloat, CISSPJanuary 5, 20171 min read

Why “Between” is the Most Important Word in Cybersecurity

In our cybersecurity practice we are constantly evaluating new technologies. And there ...
Start Reading
Sean McCloat, CISSPDecember 20, 20161 min read

Cybersecurity - Will You Be a Victim or Survivor?

While most mid-market company executives believe that they will make it through a ...
Start Reading