OUR BLOG

OUR BLOG

Are you tired of hearing about ransomware?

Are you tired of hearing about ransomware?

Are you tired of hearing about ransomware?   We are too, but unfortunately, ransomware protection is still a necessary thing, and will be into the foreseeable future. Ransomware attacks can affect anyone at any time. There is no industry discrimination. It does not...

A Refresher: Be Cyber Smart!

Cybercrime is expected to cost companies $6 TRILLION worldwide by 2021.*  Among those at risk of being targeted by cybercriminals, small and medium businesses (SMBs) are particularly vulnerable. In fact, 43% of all data breaches target SMBs.  The state of SMB security...

What you should expect from a vCIO

If you’ve worked with us (or another MSP (Managed Service Provider) as a managed client, you’ve probably heard the term Client Strategist or vCIO. “What does that mean?” you may have  wondered.  You might’ve been told the “v” stands for “virtual,” and CIO stands for...

The Risk of “Shadow IT”

Shadow IT refers to the practice of using software and other systems outside of, and without the knowledge of, the IT department or management. As the use of cloud applications grows exponentially, so has Shadow IT.  Employees now have the ability to bypass IT with...

The Benefits of VoIP for Your Business

The Benefits of VoIP for Your Business

As many of you have requested, your favorite network technology support provider is now your favorite VoIP phone system provider! VoIP (Voice over IP) Systems by ISM helps your business communicate with ease! Leave your outdated, traditional phone system for the new...

October is National CyberSecurity Month!

In 2004, the Department of Homeland Security and the National Cyber Security Alliance launched National Cyber Security Awareness Month as a broad effort to help Americans stay safe and secure online. Initially, advice was put out like keeping antivirus programs up to...

How to Protect Yourself from Phishing

How to Protect Yourself from Phishing

Protection starts with knowing what’s out there. According to Webroot research, ongoing security awareness training can help reduce breaches by nearly 70%! Here are a few tips to keep in mind to avoid getting phished: 1. Never click on links from unknown senders or if...

Common Types of Phishing

Common Types of Phishing

Do you know all the ways you can be Phished? At ISM, we hold cyber security near and dear to our hearts. Our personal mission is to keep our clients safe and productive, and that means generating awareness of new threats and new ways of combating those threats. Like...

10 Tips for Working from Home

     Work-life balance is difficult when home, office, and school occupy the same space, and long-term remote work isn’t working out like we thought it would. Every day can seem like a marathon and although technology can’t solve it all, it can help. Try these 10 tips...

HOW TO EMBRACE WORKING REMOTE

Stick to your routine: True, you’re not jumping in a car, hopping on your bike or catching a bus, but stick to your routine. This will help you stay in the mindset of business as usual for a productivity, and help keep the feeling of ‘normalcy’ as much as possible. So...

Client Spotlight

This month, we’re spotlighting a state-of-the-art eye clinic in Great Falls, Treasure State Eye Care. Led by Dr. Joseph Vincent, Dr. Justine Redlin, and Dr. Jordan Neiffer, their one-on-one approach to optometry makes Treasure State Eye Care Center staff the eye and...

Who We Are – Ethan Kessel

Our employee spotlight this month features Ethan Kessel! Ethan Kessel is our primary Help Desk Technician in our Helena location. If you’re a client, you’ve probably spoke with, or even had Ethan solve one of your computer issues. In addition to his Tier 1 service...