Email Authentication Protocols to Protect Your Business

Email Authentication Protocols to Protect Your Business By Peter Summers, vCIO IN THIS ARTICLE:  Email Authentication Protocols: DKIM, DMARC, and SPF DKIM, or DomainKeys Identified Mail SPF, or Sender Policy Framework DMARC, or Domain-Based Message Authentication, Reporting, and Conformance A Dynamic Trio- Summary Email is an essential tool for businesses and individuals alike, making it… Read more »

A vCIO’s Perspective on MFA: Importance and Implementation

A vCIO’s Perspective on MFA: Importance and Implementation By Joseph King, vCIO IN THIS ARTICLE:  Resistance to MFA Implementation The Pitfalls of Resistance: A vCIO’s Perspective How to Move Forward with MFA Implementation Conduct a Security Assessment Educate Stakeholders Align with Business Objectives Select the Right MFA Solution Develop a Phased Implementation Plan Provide Training… Read more »

How To: Log in with MFA Number Matching

Number matching is a verification method in which users enter their password as normal and are then provided with a verification number. That verification number must be entered into the Microsoft Authenticator app on their mobile device to grant access. This is a slightly different login process than you may be used to! How to… Read more »

Top close view of a household surge protector on a wood table top.

How To: Properly Power your Electronics

How To: Properly Power your Electronics By Mike Shinn, Support Manager IN THIS ARTICLE:  Power Distribution Considerations About Battery Backups Be Choosy With Your Power For years California has hoped for more rain – we certainly could use the water. Unfortunately, with each storm comes additional problems in the form of power glitches. California is… Read more »

3d render of laptop with email notification icon for your mockup

Why Blacklisting Spam May Not Work

Why Blacklisting Spam May Not Work  From CIO Support IN THIS ARTICLE:  What does it mean to “blacklist spam”? Blacklisting spam: a losing battle Alternatives to Blacklisting Imagine this scenario: you’re sitting at your desk and an email pings. It’s an invite to a business conference from a name that looks familiar. Glancing over it,… Read more »

AdobeStock_285881213-resized

Email Safety | 5 Ways to Spot a “Phishy” Email

Email Safety | 5 Ways to Spot a “Phishy” Email Quick Tips & Best Practices We rely on email for many functions of business today. This makes it an excellent tool for bad actors to exploit. Email is one of the quickest and easiest opportunities threat actors have at their disposal. Threat actors have gotten… Read more »

Office 365 Unlicensed Product Error

Office 365 Unlicensed Product Error Issue: Logging in/using any Microsoft product gives you an “Unlicensed Product” error. Usually, this is in the form of a red or yellow warning bar and/or a yellow warning triangle next to your login name. The warning bar tells you that your license is expired or that you cannot use… Read more »

Microsoft Exchange 0-Day Vulnerability Incident

Microsoft Exchange 0-Day Vulnerability Incident As you have likely seen in the news, Microsoft Exchange servers were the target of a 0-day vulnerability attack that resulted in (and continues to produce) thousands of compromised accounts and ransomware infections. What happened in this attack and what steps did CIO Solutions take to protect our clients? Incident… Read more »

Zoom for Cloud Desktops

Zoom for Cloud Desktops As work from home has become the new standard and we rely on video more than ever, we would like to ensure all of CIO Cloud clients have the best experience possible when joining Zoom meetings. To enhance the video and audio quality in your cloud desktop to HD level, please… Read more »

Holiday Tech Refresh Guide

Recommendations- Tech Refreshes & Holiday Upgrades Why would CIO Solutions, a managed service provider for business, be giving suggestions for personal technology devices? WFH has put consumer devices into corporate environments. Although we would love for all WFH environments to have business class devices we recognize that this isn't always possible. Accordingly, we can help... Read more »