Unified Communications—Ready for it?

Leave a comment / Posted By Eric Dykes on Fri, Feb 5, 2016

“Unified communication refers to a technology whereby a number of different communication media or platforms are connected and accessed as if they were a single entity,” as described by  ITProPortal. In practical terms, this enables businesses to employ a “unified” approach to communication rather than the default approach, which is rather fragmented with disparate tools...

Read More

The True Cost of a Data Breach

Leave a comment / Posted By John Dolan on Fri, Jan 22, 2016

Cyber attacks vary—some are targeted attacks seeking confidential information such as bank account details, credit card numbers, client lists, emails, or any other data they may be able to leverage. Others are non-targeted attacks intended to compromise your network so that the hackers can leverage your network to send spam, spread malware and further their disruptive practices.

Read More

Get Your Head in the Cloud with Cisco on Jan 19th! [webinar]

Leave a comment / Posted By Eric Dykes on Thu, Jan 14, 2016

Cloud. Everyone is talking about it. Are you struggling to determine how (and whether) to leverage cloud services like disaster recovery, collaboration or cloud infrastructure as a service in your business? Join us for this event to better understand what UTG and Cisco are doing from a cloud perspective, what it can mean for your business and how you can capitalize on Cisco’s cloud services and applications in your business.

Read More

12 Questions to ask a prospective MSP

Leave a comment / Posted By Brian Miller on Fri, Jan 8, 2016

As 2016 begins, it’s time for business owners and IT managers to begin reviewing their current partnerships and planning for the year ahead. Perhaps the most basic and relevant question to ask is:  do our current partners help achieve our high-level organizational goals?

Read More

Juniper Releases Security Bulletin Regarding Unauthorized Code

Leave a comment / Posted By John Dolan on Fri, Dec 18, 2015

An operating system used to manage firewalls from Juniper Networks contains unauthorized code that poses multiple security issues with any product or platform running on ScreenOS 6.2.0r15 through 6.2.0r18 and 6.3.0r12 through 6.3.0r20. According to a security bulletin released by the company, the unauthorized code in ScreenOS, whose origins have yet to be determined, “could allow...

Read More

FBI Warns About Unprecedented Rise of Targeted Email (BEC) Scams 

Leave a comment / Posted By John Dolan on Fri, Dec 11, 2015

A new rash of socially engineered security threats are using emails to trick victims into sending money to attackers by posing as vendors, clients or anyone you might know asking for payment for an invoice via wire transfer.  The FBI has dubbed these attacks “Business Email Compromise” (BEC) scams. According to the FBI, BEC scams have been running...

Read More

Aligned IT support is happening right now for these companies:

UTG Client Logo UTG Client Logo UTG Client Logo UTG Client Logo UTG Client Logo UTG Client Logo UTG Client Logo