Skip to content

Endsight Blog: Leadership, Productivity, Technology

These articles are published by Endsight, a local managed IT services and technical support firm with offices in Berkeley and Napa, serving the Greater San Francisco Bay Area and beyond.
We believe that your computer systems help your people and organization thrive. Because a great IT support experience goes deeper than best practices in technology, we also cover topics such as leadership and employee productivity.

password-security-best-practices

Unlocking Cybersecurity Excellence: The Ultimate Guide to Password Security

Out-of-date password policies are putting your company at risk If you haven’t updated your company’s password policy in..

3D Isometric Flat Vector Conceptual Illustration of Social Engineering, Cyber Crime

Social Engineering Attacks: How to Protect Yourself and Your Winery

You likely own a desktop or laptop computer, a mobile phone, or a tablet, or are a fan of online gaming. Each of these..

On the left, a robot hand. On the right is a human hand. Both are touching a glowing orb.

Is Your Sales Team Under Attack? Here are 3 Common Attacks Your Sales Team Might Encounter

Tech is great, but your first and best defense is cybersecurity awareness training. Key takeaways: When thinking about..

A person works on a laptop. Superimposed over the user are images of a cloud and icons representing files and folders to be sent there as well as retrieved.

Worried You Don’t Have a Good Backup System for Your Data?

Built-in backup for Windows and IOS Are Not Enough to Protect You. Key Takeaways: With legacy systems, only 57% of..

The image displays the front of a Microsoft office building with glass windows.

Is Microsoft 365 Security Sufficient for Your Business?

Are you wondering if Microsoft 365 has the effective security your business needs? In this age of threats, ransomware,..

The image displays a red envelope on a large steel hook skirting the top of a body of water.

Are Phishing & Ransomware Connected?

Time for phishing prevention? How phishing attacks have become the primary vector for ransomware delivery. Not quite..