Unleashing the Power of AI in Your Business: A Journey of Discovery
| | |

Unleashing the Power of AI in Your Business: A Journey of Discovery

By Maurice Unglik, Sagacent’s Client Success Manager Hey everyone! I recently wrapped up an incredible 6-week online course focused on applying AI solutions to business clients across various industries, and I couldn’t be more excited to share what I’ve learned. AI, or artificial intelligence, isn’t just a buzzword, and it isn’t limited to just ChatGPT;…

Don’t Let Your Email Be Blocked: Understanding the New Requirements
| | |

Don’t Let Your Email Be Blocked: Understanding the New Requirements

Email remains a crucial tool for communication, but as technology evolves, so do the standards surrounding it. In February 2024, two major email providers, Google (including Gmail) and Yahoo, implemented new requirements for bulk senders—entities sending a high volume of emails daily. With these changes, companies aim to improve email security and user experience, plus…

Cancer CAREpoint and Sagacent—Partnering for Success
| |

Cancer CAREpoint and Sagacent—Partnering for Success

Sagacent Helps Local Nonprofit Build a Secure IT Infrastructure Cancer CAREpoint is a local nonprofit committed to assisting community members with the practical, psychological, and emotional burden that a cancer diagnosis delivers. Serving clients since 2012, they offer personalized Counseling, Assistance, Resources, and Education (CARE) services and programs across the SF Bay Area—all free of…

Levin and Pangilinan PC Teams Up with Sagacent for IT Managed Services
| | |

Levin and Pangilinan PC Teams Up with Sagacent for IT Managed Services

Levin and Pangilinan PC is an elite immigration law firm based in San Francisco, California. For close to 30 years, they have helped their clients navigate the complex immigration laws in the United States, providing a variety of services for businesses, families, and foreign nationals; as well as helping overseas professionals gain visas, lawful permanent…

Supply-chain Vulnerabilities—Mitigation for Manufacturers
| | |

Supply-chain Vulnerabilities—Mitigation for Manufacturers

In the intricate supply chains of modern manufacturing, each link in the chain is potentially vulnerable to hackers determined to exploit weak security. So a single cyberattack on any part of the supply chain can wreak havoc on manufacturers’ operations and reputations. By embracing a proactive, collaborative approach to supply chain cybersecurity, manufacturers can risks and gain a valuable competitive edge.

PASE and Sagacent Technologies—Partnering for Success
| | |

PASE and Sagacent Technologies—Partnering for Success

Peoples Associates Structural Engineers (PASE) offers a full range of structural engineering services. PASE tackles highly complex engineering challenges and innovations across a portfolio of projects that include large data centers and mixed-use housing, among others. To meet each client’s unique needs and support its team of skilled designers, structural engineers, and project managers, PASE…

The Catholic Community Foundation and Sagacent Technologies — Partnering for Success
| | |

The Catholic Community Foundation and Sagacent Technologies — Partnering for Success

Managing IT is always a challenge, and if you’re a small nonprofit like the Catholic Community Foundation, the stakes are even higher. How do you further your mission with just a handful of people supporting your core systems?

Zero-Trust Security Model for Confident and Secure Businesses
| | |

Zero-Trust Security Model for Confident and Secure Businesses

The Zero Trust security model is a way to deal with the problem of perimeterless security in an age of remote working and cloud networks. In this blog post, we discuss the meaning and importance of the Zero Trust security model for Small and Medium Businesses, from basic principles to business examples.

What To Do if You Think Your Business Was Hacked
| | |

What To Do if You Think Your Business Was Hacked

A data breach is a serious incident that can have far-reaching consequences for businesses and individuals. When a company’s data is breached, it can lead to the theft of sensitive information, such as credit card numbers, Social Security numbers, and medical records. Criminals can then use this information to commit fraud, identity theft, and other crimes.

What is co-managed IT and when is it a good fit?
| | |

What is co-managed IT and when is it a good fit?

As businesses grow and the pace of technology accelerates, IT teams can quickly become overwhelmed. How do they keep networks, users, data, and infrastructure safe from sophisticated cyber events and hacks? How do they access specialized talent for large strategic projects like technology transformations while still handling day-to-day tasks such as network maintenance, hardware and…