Skip to the main content.
Support
Support

Jake LaCaze

Jake LaCaze is a marketing specialist at Sagiss.

Security is a team effort

2 min read

Security is a team effort

In decades past, job responsibilities were reserved for specific departments. One department had one type of people who performed one type of task.

Read More
Security dos and don'ts

1 min read

Security dos and don'ts

Solid security is, in many ways, complicated. Fortunately, there are a few basics you can follow to tighten up your security right away and get high...

Read More
What is threatware?

1 min read

What is threatware?

Threatware is not a common term, so you may think it's a new class of cyber threat. But threatware is an umbrella term including many common security...

Read More
Types of data storage

5 min read

The 4 most common types of data storage

The world runs on data. And businesses now have access to more data than ever before.

Read More
Co-managed IT

1 min read

The benefits of co-managed IT

When most people think of outsourced or managed IT, they likely think of fully-managed IT. With fully-managed IT, you rely on a managed service...

Read More
Microsoft Edge is the best web browser for business

3 min read

Why Microsoft Edge is the best web browser for business

Microsoft Edge recently passed Safari as second place in the desktop browser wars. But Edge should hold the top spot as the web browser for business.

Read More
Microsoft end-of-life survival kit

2 min read

Microsoft end-of-life survival kit

Nothing good lasts forever. Even Microsoft products.

Read More
Internal policies

3 min read

Why internal policies are crucial for managed security success

Once upon a time, good security amounted to little more than protecting your perimeter to keep threat actors out of your networks. But now, with the...

Read More
What is the cost of a data breach?

4 min read

What is the cost of a data breach?

Year after year, data breaches are getting more expensive.

Read More
Pros and cons of BYOD

2 min read

Pros and cons of BYOD

Businesses are always looking for ways to save money. Rather than buy more devices for their employees, some businesses implement BYOD programs.

Read More
What is emotet?

2 min read

What is emotet?

Emotet, one of the worst security threats ever created, originated in 2014 as malware that intercepted internet traffic and harvested sensitive...

Read More
IT troubleshooting basics

3 min read

IT troubleshooting basics

Any time you have an issue, you may be tempted to jump to the most dire conclusions. It's easy to do with technology: Your device isn't working as...

Read More
NTLM

1 min read

Disabling NTLM, The Sagiss Way

To increase security, we are disabling NTLM (NT LAN Manager) for our clients.

Read More
Certified MSP

5 min read

Why your business needs a certified MSP

A managed service provider (MSP) is an outsourced IT department that handles all your company's IT support needs and is available in an instant. That...

Read More
Managed IT support services

2 min read

Managed IT support services, The Sagiss Way

Managed IT support services are the backbone of the value we provide for our clients. Two crucial individuals enable our managed IT support services:

Read More
web content filtering screenshot

2 min read

Why businesses need web content filtering

Web content filtering is a service that prevents users from accessing unwanted sites and services from company devices.

Read More
The pillars of end user security training

3 min read

Why your company needs end user security training

The vast majority of security breaches are directly related to human error. After a phishing or emotet attack, the employee who enabled the attack...

Read More
Threat actors are targeting MSPs

3 min read

Threat actors are targeting MSPs. Are you ready?

On May 11, 2022, authorities from the United Kingdom, Australia, Canada, New Zealand, and the United States issued a joint cybersecurity advisory for...

Read More
Network firewall security

1 min read

Why businesses still need network firewall security

When working in an office was the only option most of us had, making the case for a network firewall was an easy sale.

Read More
password manager

2 min read

How do password managers work?

Every day, more people are falling victim to cybercrime. The good news: It doesn't have to be this way. Not when we have so many simple and...

Read More
Vulnerability management

2 min read

What is vulnerability management?

Threat actors are tirelessly testing your network for easy access to your crucial data and files. By the time you've identified a breach, it's...

Read More
next-generation antivirus

3 min read

What is next-generation antivirus?

While "next-generation" may sound new and revolutionary, next-generation antivirus actually has roots in technology most of us are already familiar...

Read More
Cyber liability insurance

3 min read

What is cyber liability insurance and why is it so important?

The increase of cyber attacks has made cyber liability insurance a necessity for nearly every business. Yet many businesses still don't understand...

Read More