Configured properly, and then monitored and adjusted over time, DMARC can reduce cybersecurity risks and increase deliverability for legitimate email. (Configured improperly, however, DMARC instructions could result in all of your outgoing email getting rejected — so you need to know what is going on under the hood.)
Blog
Las Vegas ransomware incident highlights need for cybervigilance
A ransomware incident ensnaring two of Las Vegas’s largest casinos made national headlines last month and inspired a lot of questions about ransomware, multi-factor authentication, single-sign on, access management, and vishing. What happened? What went wrong?
Fast, Cheap, and Good: Cases for local storage in an age of cloud
Our first event at our new office was a conversation about the best circumstances for local storage at time when most organizations are moving file storage to the cloud.
The new era of access management
An identity and access management (IAM) solution is the padlock or firewall for the work-from-anywhere era. Before you give users access to any business resources, assets, or information, you should implement IAM as a critical component of your organization’s security program.
Recognizing and avoiding phishing scams
Phishing emails and text messages attempt to trick you into clicking on a link, opening an attachment, or sending proprietary information. Often the return address is the name of a person or company you recognize, leading you to believe the message is legitimate. But there are many ways for you to recognize phishing and to avoid falling for scams.
Business phone services now require registration for text messaging
If you are using a mobile app for your business phone service (like RingCentral, Zoom, or Dialpad), you might be used to using SMS text messaging to connect with your contacts. But now, due to new regulations, SMS through business phone services will be restricted until your organization is approved to send business-related SMS.
Is a to-do list really the best to-do list?
Do you ever reach the end of your day and feel like you haven’t accomplished what you wanted to? You can fix that. At Macktez, our favorite to-do list is not a list at all — it’s a calendar. A calendar’s visual blocks of time show you exactly what you can and cannot get done in one day — it’s a to-do list with limits.
Electronics recycling
Macktez has partnered for over a decade with 4th Bin for e-waste recycling and certified data destruction. To help clients avoid the high minimums required to schedule a pick-up, we can hold equipment securely until we have a full load to turn over to 4th Bin.