April 5th, 2023 by admin
Desktop-as-a-Service (DaaS) is a cloud computing service model that enables organizations to run desktop software and applications from the cloud, rather than running them on local computers. With DaaS, users can access their desktops from anywhere...
Read Full Story »
Tags: Cloud, Collaboration, cybersecurity, desktop-as-a-service (DaaS), Security
Posted in: Solutions
November 2nd, 2022 by admin
As the 21st century dawned, the world witnessed the emergence of a new technology that would revolutionize communication and information sharing – the computer cloud. No longer did information have to be stored on a physical computer – it...
Read Full Story »
Tags: Cloud, cybersecurity, Data, IT services, managed services
Posted in: Solutions
October 20th, 2021 by admin
With an abundance of new and existing technologies available, it's become clear that the cybersecurity industry has no shortage of tools. Unfortunately, the same can't be said for the availability of skilled experts who can effectively use those tools...
Read Full Story »
Tags: Cloud, cybersecurity, News, partners
Posted in: IT, Security, ICX
October 6th, 2021 by admin
Technology can make our lives easy and convenient, but you need to be at least a little savvy. Here are
some smart simple tech tips for the fall:
Make relevant updates. Smart phone and PC operating systems update every few months, and updating can...
Read Full Story »
Tags: cybersecurity, Data Backup, Data, IT consulting, IT management, IT services, IT strategy, network, Security, Solutions
Posted in: Managed IT Services, ICX, Solutions
September 22nd, 2021 by admin
We are excited to share a new cybersecurity partner for our managed services clients – SKOUT Cybersecurity! With this partnership we are able to provide a variety of new or improved cybersecurity options for clients big and small....
Read Full Story »
Tags: cybersecurity, managed services, partners, remote monitoring
Posted in: Solutions
September 1st, 2021 by admin
Classrooms have never been more connected, and because of that, they've never been more vulnerable to internet-powered threats. Many students are issued laptops or tablets instead of textbooks, while teachers and administrators rely on dozens of apps...
Read Full Story »
Tags: coronavirus, cybersecurity, malware, phishing, Ransomware, Remote, Security, Solutions
Posted in: Security, Solutions
July 28th, 2021 by admin
You may recall that in January 2021 we posted a blog called 'Think Your SaaS Data is Automatically Secured? Think Again.' In that post we made the case for having a strong backup solution for any of your cloud-hosted business applications, even Microsoft...
Read Full Story »
Tags: Cloud, cybersecurity, Data Backup, Data, Disaster Recovery, SaaS, Security, Solutions
Posted in: Security, Solutions
June 23rd, 2021 by admin
We wanted to share a great webinar that took place recently which was hosted by two partners of ICX. Bates Security focuses on physical security including fire, burglar, access control and camera systems and Heron Managed Services is a fellow IT managed...
Read Full Story »
Tags: cybersecurity, Data Backup, Disaster Recovery, IT management, managed services, Security, Solutions
Posted in: Security, Solutions
June 2nd, 2021 by admin
If you've recovered from the excitement after our first two articles on the Jacksonville Business Journal that published online in May, hold onto your hats because we have two NEW articles just published for June! This month we covered:
How to unlock...
Read Full Story »
Tags: Cloud, Collaboration, communications, cybersecurity, Data Backup, Disaster Recovery, Solutions
Posted in: Managed IT Services, Security, Solutions
May 12th, 2021 by admin
While we love blogging to share knowledge and news, we are thrilled to contribute some articles over the next few months to the Jacksonville Business Journal to reach a wider audience. Under the Thought Leadership section of the Jax Business Journal website,...
Read Full Story »
Tags: cybersecurity, malware, managed services, phishing, Ransomware, Security, Solutions, TaaS, technologies
Posted in: Managed IT Services, Security, Solutions
April 14th, 2021 by admin
A war cannot be won on one front with a single arsenal–you need a well-trained army, navy, and air force. Likewise, fending off criminal hackers requires a diverse pool of technologies, trained security experts, and tried and tested practices...
Read Full Story »
Tags: Cloud, cybersecurity, Endpoint, evaluation, IT services, IT strategy, network, phishing, Ransomware, Security, Solutions
Posted in: Security, Solutions
January 13th, 2021 by admin
Not be alarmist, but ransomware wreaked havoc in 2020. It may be even worse this year. The average ransom payment jumped 31% to $233,817 in the third quarter from the second quarter, according to a report from Coveware. Average ransom payment? Up to...
Read Full Story »
Tags: Cloud, cybersecurity, Data Backup, Data, Disaster Recovery, malware, phishing, Ransomware, Security, Solutions
Posted in: Managed IT Services, Security, Solutions
January 6th, 2021 by admin
This is a news flash for all Microsoft 365 users. Microsoft 365 is not automatically protected. But it's hosted, in the 'cloud,' it must be secure, right? As organizations increasingly move data into cloud-based applications, many believe that traditional...
Read Full Story »
Tags: Cloud, cybersecurity, Data Backup, IT services, Security, Solutions
Posted in: Security, Solutions
November 18th, 2020 by admin
While the world is excited to focus on the cheer and goodwill that accompanies the holiday season,
cybersecurity criminals will use the good mood to wreak havoc. And the fact is, this year, more than ever
before, Santa must go digital, so online shopping...
Read Full Story »
Tags: cybersecurity, Data, evaluation, network
Posted in: Security
November 11th, 2020 by admin
In 2019, ransomware attacks impacted 89 college, universities, and school districts, 113 state, and municipal governments and agencies, and 764 healthcare providers - and those are heavily protected organizations! There are countless tools that managed...
Read Full Story »
Tags: coronavirus, cybersecurity, Disaster Recovery, IT services, malware, Security, Solutions
Posted in: Security, Solutions
October 28th, 2020 by admin
Cybersecurity is a business decision. Just like you would ensure your equipment or buy worker’s comp to protect your employees, cyber liability insurance is a critical piece of your business protection and continuity strategy. Cyber liability insurance...
Read Full Story »
Tags: cybersecurity, malware, phishing, scams, Security, technology consulting
Posted in: Security, ICX
September 30th, 2020 by admin
Cybersecurity is important. On that point, we all agree. But maintaining focus on your cybersecurity
protocols throughout doing business is where most companies fail. On average, Websites are attacked
94 times per day. Taking your attention off cybersecurity...
Read Full Story »
Tags: cybersecurity, internal threat protection, managed services, Solutions
Posted in: Security
September 16th, 2020 by admin
At the outset of enterprise computing, information technology services and management were focused on a break/fix basis, meaning computer systems were only managed by an expert when they did not work, necessitating a technician to come out to fix it....
Read Full Story »
Tags: cybersecurity, IT consulting, IT management, IT services, IT strategy, malware, managed services, Security, Solutions
Posted in: Security, Solutions
September 9th, 2020 by admin
We talk about cybersecurity all the time because it's the #1 concern of our clients. That's why we partner with smart cybersecurity solution firms like Arctic Wolf to deploy the best tools available for our clients. Our Arctic Wolf offerings for managed...
Read Full Story »
Tags: cybersecurity, Data Backup, Data, malware, network, Solutions
Posted in: Security, Solutions
September 1st, 2020 by admin
We always recommend our client partners setup and maintain 2-factor authentication for their
organizations. And the basis of that strong recommendation is simple, and it's the only fool-proof secure
way to ensure passwords are not compromised. Two-factor...
Read Full Story »
Tags: cybersecurity, technologies, technology experts
Posted in: Security, ICX
July 1st, 2020 by admin
We are excited to announce we have partnered with Datto to bring you an info-packed webinar on July
28 that 10 am EST called Your Secret Weapon Against Cybercrime. Hosts Desraie Thomas, Channel
Development Manager from Datto, and COO Justin Kane from...
Read Full Story »
Tags: cybersecurity, Disaster Recovery, webinar
Posted in: Managed IT Services, Security, ICX
June 24th, 2020 by admin
Having issues with your network? No need to worry, our support team has got your back! The quality of our service is unmatched in Florida. We employ a tailored approach by studying the framework of your IT setup and leveraging our knowledge and expertise...
Read Full Story »
Tags: cybersecurity, Data Backup, Disaster Recovery, IT management, IT services, IT strategy, network
Posted in: Managed IT Services
May 27th, 2020 by admin
June 16, 2020
11:30 a.m ET | 12:30 p.m. Central
Jaysin Nguyen
Sr. Staff Engineer, Security
RingCentral
Dean Young
RVP Partner Sales - East
RingCentral
Please join RingCentral for a quick 30-minute discussion on how I.T. departments are addressing...
Read Full Story »
Tags: communications, cybersecurity, IT strategy, technologies
Posted in: Webinar
May 11th, 2020 by admin
While most businesses are focused on external security threats, there are two kinds of internal threats that deserve equal consideration and mitigation. Both accidental and intentional threats come in a lot of shapes and sizes, but there are some simple...
Read Full Story »
Tags: cybersecurity, internal threat protection, phishing, Remote
Posted in: Security
April 15th, 2020 by admin
Working remotely has suddenly become a necessity, but personal devices and unsecured internet connections
can leave employees vulnerable to a variety of cyber threats. Fortunately, there are a few simple steps you can
take to safeguard you and your customer's...
Read Full Story »
Tags: communications, coronavirus, cybersecurity, working remotely
Posted in: Security
April 8th, 2020 by admin
While everyone scrambled over the last few weeks to get laptops and send in-office employees to work from home, a few essential tools may have been overlooked in the process. Many small business owners
may not realize that the network and PC monitoring...
Read Full Story »
Tags: cybersecurity, Disaster Recovery, IT management, IT services, remote monitoring, Remote, Solutions
Posted in: Managed IT Services, Solutions, Support
March 25th, 2020 by admin
We are closely monitoring the impacts to our customers of COVID-19. One that has come to our attention is that cybercrime has dramatically increased over the last few days, and hackers are using COVID-19 to disguise emails to gain access to company...
Read Full Story »
Tags: cybersecurity, help, ICX, scams, technology consulting
Posted in: Security, ICX, Support
February 19th, 2020 by admin
Today’s workplaces have changed – workers are mobile and they want around-the-clock access to networks from a myriad of devices of their choosing from locations around the world. This evolution has changed the way businesses need to think about...
Read Full Story »
Tags: assessment, cybersecurity, malware, Solutions
Posted in: Security
January 27th, 2020 by admin
Comprehensive cybersecurity sounds like an impossible-to-achieve oxymoron in today’s highly digital
and vulnerable world. But it’s not. We partner with Arctic Wolf to provide comprehensive managed
detection and response for your business with 24x7...
Read Full Story »
Tags: cybersecurity, managed services, remote monitoring
Posted in: Security
January 8th, 2020 by admin
This is an important alert for all our Microsoft Office 365 users. This scam originally came up
last summer but it has been making the rounds again so we wanted to bring it back up. If you
have received an email with a subject line something like, "Office...
Read Full Story »
Tags: cybersecurity, malware, Microsoft, Office 365, scams
Posted in: Security
December 18th, 2019 by admin
The Department of Homeland Security’s Cyber Infrastructure (CISA) division released an alert on currently circulating online browsing/shopping scams and malware campaigns you should be aware of. The alert warns about fake ads or shipping notifications,...
Read Full Story »
Tags: cybersecurity, malware, scams
Posted in: Security
November 26th, 2019 by admin
Teaching your employees how to be cyber-conscious and take precautions is an important part of
your company's overall security awareness training. That's why we felt it was important to share
this e-book from our partner Arctic Wolf that breaks down...
Read Full Story »
Tags: cybersecurity, partners, technology experts
Posted in: Security
November 6th, 2019 by admin
As discussed in last week’s blog, Why All Networks Require Maintenance, it is clear how important consistent on-going network maintenance is to your businesses’ security and productivity. Good network maintenance doesn’t have to cost an arm and a leg...
Read Full Story »
Tags: cybersecurity, evaluation, infrastructure, IT consulting, IT management, IT services, managed services, network, Solutions, technologies, technology consulting, technology experts
Posted in: Solutions
October 23rd, 2019 by admin
Modern businesses are all struggling with the growing threat of ransomware attacks. We deal with them all the time here at ICX, often spotting them and stopping them before our clients even become aware they are happening. The consensus on the best...
Read Full Story »
Tags: cybersecurity, managed services, remote monitoring, Solutions, technology consulting
Posted in: Security
October 9th, 2019 by admin
We recently dealt with a very sneaky phishing attack and wanted to share it so you don’t fall victim to
this too! A client looked up what they thought was the customer service team for the software they
were having issues with. However, what they found...
Read Full Story »
Tags: cybersecurity, managed services, remote monitoring
Posted in: Security, ICX
September 18th, 2019 by admin
As time marches on, cyberattacks grow more sophisticated, more malicious, and more widespread. And with advanced cybercriminals finding new ways into organizations, businesses of every size risk being attacked. So, today’s companies need to understand...
Read Full Story »
Tags: cybersecurity, IT services, managed services, technologies
Posted in: Security, Solutions, Support
September 11th, 2019 by admin
Cybersecurity is an important topic for our clients, but it encompasses a lot of different things. Managing
cyber risk entails dealing with sprawling networks, endpoints ranging from work PCs to personal
smartphones, and cybercriminals using increasingly...
Read Full Story »
Tags: cybersecurity, evaluation, managed services
Posted in: Security
August 21st, 2019 by admin
One of the important services we provide clients here at ICX is patch management. But what does that even mean? A patch is a change to a computer program that is designed to update, fix, or improve it by securing vulnerable areas.
Patches aim to:
Fix...
Read Full Story »
Tags: cybersecurity, ICX, IT services, managed services, Solutions, technologies, technology consulting, technology experts
Posted in: Security, Solutions, Support
August 7th, 2019 by admin
Spoofing is a sneaky type of online fraud that tricks users and networks into believing that information is
real when it’s actually fake. Typically, a cybercriminal will pose as a known, trusted person in your
network (office typically) and they will...
Read Full Story »
Tags: cybersecurity, help, network
Posted in: Security
July 3rd, 2019 by admin
The value of ‘managed’ or ‘outsourced IT services’ are many, but it comes down to risk vs. reward. Businesses are always trying to cut overhead while gaining revenue. It’s that delicate balance between output and earnings...
Read Full Story »
Tags: cybersecurity, infrastructure, IT management, IT services, service desk, technology consulting, technology experts
Posted in: IT, Managed IT Services, Security, Solutions