Skip to content

Endsight Blog: Leadership, Productivity, Technology

These articles are published by Endsight, a local managed IT services and technical support firm with offices in Berkeley and Napa, serving the Greater San Francisco Bay Area and beyond.
We believe that your computer systems help your people and organization thrive. Because a great IT support experience goes deeper than best practices in technology, we also cover topics such as leadership and employee productivity.

This is an abstract image with a circuit-board background. Over the background are skulls and crossbones, and the words, data leak, exploit found, security breach, and virus detected. In the center of the image is a lock with a keyhole, and the lock is open.

Law Firm Data Breaches Are Rising: Is Your Firm Protected?

If your law firm has fewer than 50 attorneys, you’re exactly the kind of target cybercriminals are looking for.

The image displays the front of a Microsoft office building with glass windows.

Is Microsoft 365 Security Sufficient for Your Business?

Are you wondering if Microsoft 365 has the effective security your business needs? In this age of threats, ransomware,..

A red warning with an exclamation point appears over the fingers of a person typing on a Mac laptop.

Are Macs More Secure? It Depends.

Macs have plenty of built-in security, but it is often not enough. Key Takeaways: Macs have a reputation for being more..

Understanding Phish Testing and Its Importance

Phish Testing: Why It’s a Must for Your Cybersecurity Strategy Phish testing and training are essential components of..

Hackers Are Watching and Waiting… Don’t Risk Your Business and Future

Hackers Are Watching and Waiting… Don’t Risk Your Business and Future In today’s rapidly evolving digital landscape,..

password-security-best-practices

Unlocking Cybersecurity Excellence: The Ultimate Guide to Password Security

Out-of-date password policies are putting your company at risk If you haven’t updated your company’s password policy in..