How Businesses Can Securely Work From Home

How can your business manage IT support with firewalls, VPNs, and Wifi security when your workers are remote? With the rise of remote work, businesses need to prepare in a variety of ways to avoid cybersecurity threats and business interruptions. Our partners at Datto share best practices and cyber security VPN guidance in the following […]
Passwords are dead. It’s time for Passphrases.

Remembering difficult passwords can be such a headache, and many of us are guilty of using the same one for everything. It’s not only a big danger if it’s discovered, but it’s also an old practice. Passwords aren’t going away, but how they’re used has evolved just as hackers have evolved, and you need to […]
CMMC Compliance Checklist

Whether DoD contractors decide to prepare for CMMC in-house or outsource to an MSSP, there are a few important tasks you need complete to stay ahead of the curve. We’ve put together a CMMC Compliance Checklist to make sure you’re planning ahead as the compliance regulations are ever changing. LTS is a registered provider for […]
How to Navigate the IT Supply Chain Shortage

With the unpredictable supply chain shortages, it’s time to reevaluate how your organization plans and budgets for hardware replacement. Here are some tips to deal with the IT supply chain shortage and keeping your business operating efficiently.
Microsoft News: What is the New Commerce Experience (NCE)?

Starting in March, Microsoft rolled out two significant changes to their cloud per-seat licensing, like Microsoft 365 and Dynamics 365. There was a considerable price increase that took place in March on selected services, and there now is a new subscription model, New Commerce Experience (NCE), with three vastly different payment and cancellation terms. The […]
What is Biometrics? How is it used in security?

If you want to keep your data secure, you’ll need more than just a password to log in. Multi-factor Authentication (MFA) is an authentication system that validates a user’s identity using two or more distinct procedures rather than just a username and password combination. Many personal and commercial security solutions are incorporating biometrics as an […]
Move to a Zero Trust Security Model

By Milad Aslaner and Jeremy Goldstein It’s time to make the move to follow the principle of “never trust, always verify.” Zero Trust security is a journey every modern business needs to take. Recent cyberattacks like those on Colonial Pipeline and Kaseya, along with trends like the shift towards remote work have made many organizations realize the need to modernize […]
How Your Business Can Recover Quickly from Any Disaster

You’ve seen disasters in the news that could be fatal to your business. They range from unforeseen natural disasters — like severe weather, flooding, wildfires, or an earthquake — to man-made disasters like ransomware and simple human error. You hope it doesn’t happen to you, but hope is not enough. In the event of a […]
The ‘most serious’ security breach ever. Here’s what you need to know about the recent log4j vulnerability.

On Dec. 9, 2021, word of a new computer bug in a very popular piece of computer code started spreading around the cybersecurity community. By the next day, practically every major software business was in crisis mode, attempting to determine how its products had been impacted and how to patch the hole. “The log4j vulnerability […]
Stay Safe From Cybercrime During Tax Time

Tax season is upon us, and with love in the air for Valentine’s Day, cybercriminals are salivating at the prospect of stealing your identity. Tax season can be a stressful time for many and one small mistake can leave you vulnerable to scammers. It’s extremely important to stay alert and prepare your devices during this […]