Phish Testing: Why It’s a Must for Your Cybersecurity Strategy Phish testing and training are essential components of..
We Hosted a Webinar—Here’s What You Missed On October 17th, we hosted an insightful webinar titled Optimizing Your..
Planning and budgeting for technology can be tricky. Everyone is feeling pressure to reduce costs, and while there are..
You did it! Your hard work, vision, and relentless pursuit of growth have earned you a spot among the nation’s..
Main Points: How much IT support does your law firm really need? How can you identify the right level of IT support?..
With the 2024 award season kicking off, we're proud to announce that we won some amazing awards! These newest accolades..
Hackers Are Watching and Waiting… Don’t Risk Your Business and Future In today’s rapidly evolving digital landscape,..
Dealing with IT Frustrations? You’re Not Alone. As a business leader, it’s essential to recognize the limitations of..
For outsourced IT, meeting customers' rising expectations means profoundly understanding them. Possessing a “servant’s..
Often, partnering with an MSP is the best solution to save time, money, and prevent frustration. Key takeaways:..
Optimizing IT support: Why less is sometimes more for your law firm Key takeaways: You may pay for hours you don’t use...
Out-of-date password policies are putting your company at risk If you haven’t updated your company’s password policy in..
Every IT Support provider faces challenges - How they are solved is what counts. Key takeaways: What happens when you..
Technology & Wine: A Perfect Pair In these technological times, all wineries need digital transformation. Most..
When It Comes to Managed IT Services in the Bay Area, We Got You Covered The San Francisco Bay Area is home to many..
Partner with the IT professionals who are invested in your success. Key takeaways: We know the true meaning of customer..
MSP is an acronym for Managed Services Provider. But what does that mean in the world of IT? An MSP relieves businesses..
Good vendor relationships can go bad. Here’s how to know it’s time to make a change for the better. Key Takeaways:..
You likely own a desktop or laptop computer, a mobile phone, or a tablet, or are a fan of online gaming. Each of these..
Tech is great, but your first and best defense is cybersecurity awareness training. Key takeaways: When thinking about..
Although many employees have returned to an office setting, almost 13% of full-time employees continue to work..
Understanding the Common Woes Behind a Sluggish Help Desk Running any type of service desk, especially one that deals..
Conquer IT Uncertainty with Strategy Regarding IT support, the number one thing that people worry about is not what you..
Exposing the Incompatibility of Exponential Growth with Human Understanding and Network Survival Cognitive bias isn’t..
Is Your Law Firm Safer with Strategic IT Solutions? Having a well-functioning IT system is crucial for the productivity..
Should I do nothing and wait to see if my current IT provider gets its act together? Ask yourself if it’s worth it for..
You’re under attack! Get insights from the Sophos State of Cybersecurity 2023 report. Key Takeaways: Cybersecurity at..
Built-in backup for Windows and IOS Are Not Enough to Protect You. Key Takeaways: With legacy systems, only 57% of..
Macs have plenty of built-in security, but it is often not enough. Key Takeaways: Macs have a reputation for being more..
Are you wondering if Microsoft 365 has the effective security your business needs? In this age of threats, ransomware,..
The B17 Bomber became legendary during WWII. But it didn’t start that way: The planes were crashing because the landing..
Time for phishing prevention? How phishing attacks have become the primary vector for ransomware delivery. Not quite..
Summary: Attorneys have a Duty of Confidentiality and of competence to clients. Information accessed by unauthorized..
What cloud storage solutions got to do with your business? Box vs. Microsoft OneDrive Cloud-based file management and..
Share, communicate, and collaborate internally and externally – seamlessly. Key Takeaways: Eliminate errors and improve..
Why should SMBs reallocate their cybersecurity spending to fight ransomware? A strong cybersecurity strategy is..
I spend a lot of time talking with clients and in the natural course of those conversations, recommendations for..
How can you verify your IT managed services? Business owners and leaders are responsible for ensuring efficient and..
Is strategic IT planning necessary? No, it’s unnecessary unless you want to flounder around and guess what technology..
Choosing the right IT provider is one of the most critical business decisions you’ll make Key Takeaways: You can't..
Is my IT provider slacking off? Signs your IT provider is slacking off and how to fix that. Slacking IT services is no..
Are you spending hours organizing an endless barrage of emails? Microsoft 365 is packed with features to help you and a..
By partnering with an MSP, your business can move confidently into the future Key Takeaways: Choosing the right tech..
Tech not doing what you need it to do? Is your tech stack a mess? Strategic IT planning can help. Time to call the..
Is my law firm getting the best IT advice on implementing Microsoft 365? Key Takeaways: Microsoft 365 is a..
Troubleshooting Wireless Networks: Can an MSP Help? Wireless (Wi-Fi) network management is a pervasive and complex part..
It feels like my law firm is getting a new consultant every week from the MSP – Is this normal? Is your law firm facing..
How good is your MSP relationship for business? What are the signs you’ve outgrown your MSP? Businesses rely on strong..
Learn what wat to do if your law firm is not getting good IT advice? You wouldn't tolerate a paralegal who can't draft..
Ready to unlock the benefits of using an MSP? The last seven benefits of using an MSP for proactive IT management are..
Ready to experience 7 more key benefits of MSP? The right keys open the right doors for business success. Finding the..
For a busy law firm, streamlining processes and increasing productivity is key. And while many tools are available,..
Open new doors and experience the many benefits of an MSP. Here is part 1 of the top 21 benefits of the IT providers..
What are the 5 Cs of cyber security? Discover the power of these indispensable cybersecurity elements, known as the 5..
Responses in minutes rather than hours. Plus expertise, availability, and efficiency. Key Takeaways: Slow internal help..
Establishing basic cyber hygiene is critical in today’s world of increased numbers of bad actors and cyber threats...
Good IT support is crucial for businesses to reach goals and operate smoothly. Key Takeaways: What defines “good” IT..
More than ever, SMBs need the expertise of IT managed service providers. Key Takeaways: Last year, there was a 424%..
Navigating through the ever-evolving landscape of cybersecurity can be a daunting task for businesses. Today, we're..
Understanding the basics of IT support and cost for law firms is critical to choosing the best for your law firm. Key..
Find your perfect pairing when choosing an IT vendor. Key Takeaways: Some winemaking challenges can’t be predicted. But..
Your technology investments have a huge Impact. Choose wisely and reap the benefits. Key Takeaways: The risks to your..
Boost productivity, increase acquisitions, build industry authority, and more with Microsoft Office 365. Key Takeaways:..
Cloud service comparisons for your unique business. Key Takeaways: Who are the top cloud service providers? Which..
Key Takeaways: What does the onboarding process look like? How is end-user training done? What are some common..
Key Takeaways: What are common IT challenges organizations face when moving to a managed service? How can a..
Wineries are prime targets for cybercriminals, who can cork your whole business. Key Takeaways: It’s no secret that..
Key Takeaways: What are IT-managed services? What are the top ten benefits of using managed IT services in law firms?..
It’s not if, but when – breaches in law firms with under 50 attorneys have doubled in recent years. Key Takeaways:..
14 months into its merger, the combined company’s retention rate for both clients and employees remain high. San Diego,..
As an IT decision-maker, you understand the importance of being prepared for any potential cybersecurity threats...
It’s critical to budget realistically for you annual IT expenses including regular maintenance, system replacement..
Let's face it, it is nearly impossible to function as a business without employing a variety of cloud services. Your..
Current economic pressures pose significant challenges to law firms just as they do to many businesses around the..
Mobile device security is a growing topic among businesses with employees who rely on mobile technology for company..
Dwight Eisenhower is credited with saying “Plans are worthless, but planning is everything.” No cybersecurity plan,..
If you are concerned about data security in your company, that’s a good thing. Protecting your company’s data, and..
The starting point for an effective cybersecurity plan is so simple, it’s often overlooked. You must develop a..
How long should IT support tickets take to resolve? This is a common question that we get from potential buyers of IT..
Most Managed Service Providers (MSPs) have a fixed monthly fee as part of the contractual agreement. This monthly fee..
NAPA, CALIFORNIA, January 21, 2022 ---- Endsight has a NEW headquarters, Napa: Specifically, 1144 Jordan Lane, Napa, CA..
In technical presentations, you often need to highlight to the audience something on a computer screen. Sometimes you..
We are reminded again what an amazing, caring, and loving community we live in. Thanks to our clients, community..
Do you sometimes notice your connection slowing down and then speeding up again? Do you have trouble opening large..
Did you know you can create a custom slideshow background in Windows 10? This customization makes it easy for you to..
When a mass email requires individualization, it is easy to feel overwhelmed. In the past, this would have required..
What a strange year we've had. But we made it to the end! And that is something to be grateful for. This time eight..
Each time you add a user to your network, it can also open your network to potential risk if you do not have a set plan..
Technology is being implemented in pretty much every aspect of the business world to optimize employee productivity...
Wildfires have once again devastated portions of the Napa Valley. This year it’s happened in one of the most..
Severing a professional relationship is difficult, especially when it is an employee termination. No matter the..
With all the mayhem happening on the West Coast, businesses continue to push forward with the technology resources..
Imagine a world where you don't have to remember passwords anymore. It's here. And you can access it today. How? With a..
There have been whispers through the Napa Valley, that The Joy Luck House on Jordan Lane, has not only been sold but is..
Businesses have quickly switched to allowing employees to work from home. Making their networks more vulnerable now..
The IT support function comes in a variety of shapes and sizes. From full-time employees to IT consultants to managed..
We listened to our clients and have some exciting news that has come out of it. Through a variety of ways, from surveys..
With video conferencing at its all-time high in the history of the Internet, many people are setting up video..
In October of 2017, Northern California was set ablaze, creating chaos and confusion for the communities in the..
Retaining IT professionals is extremely hard when the tech industry has the highest turnover rate among any other..
With one click of a button, you can share photos with family members, renew your passport, or even send documents..
The following blog post is an open letter to every Endsight customer, sent recently. We are providing this for public..
Now that your professional identity is temporarily confined to a small square of video, how can you ensure that you..
Growing interest in up-to-date news on the COVID-19 (Coronavirus) is making many vulnerable to online cyber scams...
Even though the IT field is full of capable, ambitious individuals looking to leave their mark, being capable isn’t..
The most overlooked cybersecurity threat is our own psychology. With network security policies, spam filters, and..
Every interaction you have with someone is either building trust or tarnishing trust. A great way to look at it is..
We are excited to highlight Endsight’s very own John Grover. He answers questions related to corporate culture,..
We live in a very busy and increasingly complex world. We are constantly rushing around, trying to get things done...
Our personalities are malleable. We can reshape ourselves. We can change our beliefs and create new habits. We can even..
When I worked on a high ropes course in college, my job was straightforward, simple, and fun! I knew exactly what I..
In the twenty-plus years since the concept of Emotional Intelligence was introduced in by Daniel Goleman, the world has..
Want more success as a leader in your organization? Set more specific intentions. Intentions are a fancy way to..
Many business leaders are caught unaware when the need for new technology or processes catches up with their business..
The Chrome build 68 went live earlier this month, which brings an anticipated change to HTTPS browser address bar..
If you've been following security news over this weekend, you may have heard of WannaCry. Here is the latest update..
Should I keep my servers internally and back them up to the public cloud? Should I host them in a private cloud with..
Damages from a computer virus can be boiled down to how many people are affected, amount of downtime, and how long it..
When prospective customers call us in to discuss the problems they are having with computers, the issues are..
Last year, I read Pat Lencioni’s book, The Advantage. The Advantage is my favorite thus far of the nine Lencioni books..
Printers continue to be a serious cause for frustration. There is a reason the scene in Office Space, where they tear..
When a company decides to change to their IT support, it is often for the same reasons. Typically it’s because IT..
Most of us probably feel like we have more work to do than available hours in our work week. I'll be the first to admit..
For years, small businesses only had one real choice for business productivity software: Microsoft Office. But that may..
Reliable, high-bandwidth Internet connectivity used to be a “nice to have”, but this is quickly changing...
I’ve used Microsoft Excel for years as a way to analyze a sales pipeline or as a way to clean up customer lists. I’ve..
Generally, we do not recommend that our clients spend their valuable time attempting to solve minor computer issues...
The key insight to glean from Pete Heles's article is that your data is probably worth WAY more than you think. In..
WannaCry Ransomware - Should You Be Concerned?
Risk Is for Gambling, Not IT. Beat Uncertainty With Strategy
Private Cloud vs. Public Cloud vs. Internal Hosting
Relationships Might Be Your Biggest IT Problem
When Was the Last Time You Updated Password Security Policies?
WannaCry Ransomware - Should You Be Concerned?
Risk Is for Gambling, Not IT. Beat Uncertainty With Strategy
Private Cloud vs. Public Cloud vs. Internal Hosting
Relationships Might Be Your Biggest IT Problem
When Was the Last Time You Updated Password Security Policies?