Click the buttons below to read blog posts on the subjects that are important to you. Or scroll down to see more general content.

PASE and Sagacent Technologies—Partnering for Success

The Catholic Community Foundation and Sagacent Technologies — Partnering for Success

Why Are There So Many Account Takeovers of Social Media Accounts?

Zero-Trust Security Model for Confident and Secure Businesses

The Phase-Out of Passwords and the Rise of Passkeys

Social Engineering Hacking—Attack Types and Examples

Why Cybersecurity Frameworks Are Crucial for Businesses

Business Email Compromises Are on the Rise. Here’s How To Not Be a Victim

What To Do if You Think Your Business Was Hacked

FTC Safeguards Rule—Compliance Audits for Financial Institutions

How the Rise of Remote Work Increased Security Risks

The Importance of Cybersecurity Frameworks for Businesses

Cybersecurity Insurance Hacks Out an $80 Billion Niche

Six IT Cost-Saving Strategies for Small and Midsize Businesses

What is Penetration Testing in Cybersecurity? | Pen Testing

Supercharging IT Delivery with Artificial Intelligence Technology

AI Unleashed – Exploring the Revolution Reshaping Industries Webinar

Endpoint Detection and Response: Network and Device Protection

What is co-managed IT and when is it a good fit?

Best IT security practices for working from home

SMB manufacturers: Are you a reliable business partner

A recipe for IT transformation in lean times

Co-managed IT: Like Ice Cream with Toppings – Better Together!

How Hashtags Can Lead to Being Hacked

What You Need to Include as Part of Your Disaster Relief Plan

Helping Your Business Grow with Managed IT Services

Why You Should Do an End-of-the-Year Process Audit

How to Plan for a Move to Cloud Computing in the New Year

Why a Cloud Computing and Remote Work Strategy Should be a Part of Your Disaster Recovery Plan

How a Disaster Recovery Plan Can Help Your Business Run Remotely

Cloud Computing: How It Can Make Your Business Flexible

How Managed IT Services Can Help Your Business Remain Flexible in a Changing Economy

How a Disaster Recovery Plan Can Benefit Your Business During a Natural Disaster

How Managed IT Services Can Keep Your Business Moving Forward

Cybersecurity Measures to Take with Cloud Computing

Cloud Computing Deployment Models

Disaster Recovery vs. Business Continuity

6 Key Differences in the Types of Cybersecurity Threats

How to Maintain Cyber Insurance Compliance

Which Threats Are More Relevant Within Hybrid or Remote Operations?

What Do You Need to Know About Collecting Personal Data from Users in the EU?

Upgrading Your Network with Managed IT Services

How to Manage Your Costs When Transitioning to Cloud Computing

Deep Fake Technology – Why It Is a Risk for Your Business

How Cloud Computing Can Provide a Secure Remote Platform

Support Your Business Growth with Managed IT Services

Paying the Ransom Doesn’t Mean Your Data is Returned: Why a Disaster Recovery Plan is Essential for Your Business

How to Minimize the Threat of IoT for Your Business

How Green Cloud Computing Can Optimize Your IT Resources

How Cyberattacks on Suppliers Could Impact Your Business

What is a Whaling Attack? How to Protect Your Business

Cloud Computing in the Healthcare Sector

Data Breach Liability – Who is Responsible?

10 Types of Business IT Support Services You Should Invest in Now

Be Proactive and Have Confidence in Your Data Integrity and Cybersecurity with a Cybersecurity IT Assessment

What is Sandboxing?

Why Cloud-Based Solutions Are Becoming the Normal Solution

Should You Insure Your Businesses Against Losses from Ransomware?

How to Avoid Falling Victim to Online Scams During the Holidays

Why You Should Bring Cybersecurity to the Forefront of Your Executive Meetings

Give Thanks!

How Can Your Business Practice Good Cyber Hygiene?

Should Cloud-Based Data Be Encrypted?

FBI Cyber Crime Briefing: Cyber Security Best Practices for Businesses

October is National Cyber Security Month

Why you need a cybersecurity incident response plan

How to Ensure the Apps Your Business Uses Are Safe

Rethinking Cybersecurity

Why a Security Awareness Program Can Protect Your Systems

Robust RFI Services Could be Key to Protecting Your Data

When You Should Consider Client-Side Security

Pandemic Plundering – How Hackers Are Cashing in on COVID-19

How Often Should You Update Your Cyber Security Policies

Best Practices to Protect Your Patients’ Health Data

Best Ways to Protect Your Information Online

Your Company Has Been Hacked! Now What?

Why You Should Have an IT Budget

Simple Ways to Boost Your Data Security

Why You Should Secure Your VoIP System

Windows Updates: Why You Shouldn’t Ignore Them

2-Factor Authentication: What You Need to Know Now!

Determining Your WiFi’s Risk of Being Attacked

MSSP Guide to Ransomware, Malware, and Cyberthreats

Data Catastrophes That Hurt Businesses & How an MSSP Can Help

Get UTD on the Ever-Changing Privacy Landscape with an MSSP

New Data Systems Privacy Laws That Are Unfolding

Maintain Cyber Compliance with a Hybrid Workforce

Cybersecurity Protocols to Help Build Your Business

What is Email Security?

Bridge Remote with Microsoft Office 365

Cyber Liability 101 – Answering Your Top Questions on Cyber Liability Insurance

What is Windows Virtual Desktop?

Ransomware: Why it Accounts for Half of Healthcare Breaches

Proactive vs. Reactive IT Management

IT Security: When Is The Right Time To Partner With An MSSP?

What Is IT Infrastructure Management? How Your MSP Can Get Your Business Organized

Why the Healthcare Sector Should Prepare for Cyberattacks

What Is the True Cost of Website Downtime and How Your Business can be Better Prepared

Hospital Ransomware: Why Healthcare Is Being Targeted and How To Protect Your Systems

How to Secure a Hybrid Workplace: Key Services Your Business Needs to Stay Protected

MSP vs. In-House IT: All the Benefits of an MSP and Why It Will Improve Your Business

Top 7 Benefits of Outsourcing IT Services

How a Managed IT Service Provider San Jose Can Help Prep Your Office Systems for Winter Weather

Cybersecurity Webinar with the DHS on November 17th!

How to Keep Your Medical Office Email HIPAA Compliant

Cloud Compliance: How Policies and Guidelines Ensure the Integrity of Your Client Data

Exclusive Briefing with your Cyber Security Advisor

10 Security Tips for Hospital Network Systems

Data Classification Policy: What It Is and Why It’s Important

Understanding Unique Medical Office IT Support Needs

Endpoint Security and the Benefits for Your Small Business

Cyber Safety Tips: Protect Your Business Against Cyber Attacks

The Most Insidious Types of Cyber Security Threats Businesses Face

A Guide to Medical Practice IT Audit Categories

How a Managed IT Service Provider San Jose Can Strengthen the Human Factor in Cyber Security Protection

The Benefits of Cloud Migration for Your Business

Sagacent Made The MSP 501 Again!

Do You Have a Back to Work Cyber Security Checklist? Why Having a Continuity Plan Is Crucial

IT Services San Jose: Protecting Your Patients Against Cyber Attacks

Staying Connected: Communication Tools Every Remote Team Needs

Managed IT San Jose: How Avoid Being Lured to a Cloned Website and Making Your Data Vulnerable

Managed IT San Jose: Top 10 Benefits of Managed IT Services

Managed IT San Jose: How the Use of a VPN Can Lower Your Risks for a Data Breach

Live Webinar: How I Would Hack You. Confessions of an Ethical Hacker

Move Your Business Quickly to the Cloud

Protect Your Employees from Email Phishing Attacks

Setup Your Employees to Work from Home Securely

Phishing Scams: How the COVID-19 Pandemic Has Brought New Scams and How to Keep Your Systems Protected

RDP and VPN: How to Implement Best Practice Use for Your Remote Workers During the COVID-19 Pandemic

COVID-19: Preventing Healthcare Cyber Attacks

COVID-19 Teleworking: What to Watch for and How to Keep Your Business Systems and Client Data Safe

What Is the Dark Web? How to Check If Your Information Is Living in the Dark

Managed IT Services – 5 New Privacy Tools for Your Business in 2020

2020 Data Breaches: How to Protect Your Patients’ Data in a Hospital or Clinic From Exposure

Our Bay Area Managed IT Services Can Help Protect Your Customer’s Data

7 Best Policies to Limit Malicious Web App Downloads at Your Company

5 Ways Misconfigurations in Health Software Can Lead to Breaches

Do You Know the Difference Between Data Security and Privacy—Are You Covering Both?

Important Changes to IT Support for Small Business & the New 2020 Data Privacy Laws for California

Who is Covered by HIPPA and Medical IT Support’s Role in Safeguarding

Are Your Patients Databases Secure? 5 Ways To Protect Your Patients Privacy When Utilizing Cloud Computing In Healthcare

IT Support for Small Business: 5 Ways It Can Help Avoid Network Design Flaws to Prevent Cyber Security Breaches

How Safe Is a Public Wifi Connection and Should Yours Be Open to Customers

Does Your Clinic Have a Bring Your Own Device Policy? 5 Reasons They Should

5 Steps Healthcare Providers Can Take to Protect Their Medical Practice and Reputation

IT Support for Small Business: 5 Reasons Passphrases are Safer Than Passwords

5 Reasons Your Healthcare Software Disaster Recovery Plan Is Instrumental in Overcoming a Data Breach

5 Reasons Why You Should Implement Two Factor Authentication

Why Business Size Does Not Deter Cybercrime (and How to Prepare for a Breach)

Windows 7 End of Life HIPAA Compliance Checklist: What to Do to Maintain Compliance When Windows 7 Ends

5 Easy Ways to Reduce Small Business Network Security Concerns without Breaking Your Budget

7 ways the Windows 7 End of Life will Impact Your Machines

Managed IT Services: Small Business Network Setup

Why Small Businesses Need IT Support and for What

Why IT Tech Support is Important for Your Small Business

How Secure and Up-to-Date Is Your IT Network?

Free Up Time to Grow Your Business by Utilizing a Managed IT Service

IT Audit Checklist: Mastering Effective Identity and Access Management Audit

5 Ways You Can Stay Ahead of the Curve on Your IT Management

7 Ways An Annual IT Audit Can Save Your Business Money

3 Reasons to Seek Professional Assistance with an IT Audit

IT Audit Checklist: What Every IT Department Needs

5 Ways to Increase Your Team’s Productivity with a Mondopad

3 Places to Look for Gaps on a Technology Audit

Backup Vs. Recovery: 5 Differences Between Data Backups and Disaster Recovery

Doing Your Homework: How to Find the Best Managed Services in San Jose

Securing Your Assets: Five Data Loss Prevention Steps to Take

3 Ways to Save Money with Managed IT Services

Protect Your Data: A Guide to The Three Most Common Types of Backups

Top 3 Security Camera Systems for Your Business

Managed Services: What Is It and Why Do You Need It

Server Clustering: The Quick Guide

Network Outsourcing: Why Your Business Should Consider It

IT Flexibility: Understanding Mobile Device Management

Stay Secure: Why Your Business Needs a Digital Surveillance System

Be Prepared: 5 Common Causes of Data Loss for Businesses

Why IT Auditing Is Important In Keeping Your Systems in Check

How Managed IT Services Help to Improve Your Internal Processes

Your Accidental Mole: 5 Ways Your Employees Could Create a Data Leak

The Most Dangerous Websites on the Internet: 4 Sites You Should Avoid like the Plague

What to Look for With AI Technology in 2019

Best Data Security Tools for Small to Medium Sized Businesses

How Often Should You Conduct an Internal Compliance Audit?

Protect Your Computer: Here is Why You Need to Back up Data for Your Business

5 IT Challenges 2018 Threw at Us and How We Responded

2018’s Top Five Misconceptions About Cybersecurity and Cyber Attacks

How Often Should You Conduct an IT Internal Audit?

The Five Best Office 365 Accounting Integrations in 2018

The Five Best Office 365 Accounting Integrations in 2018

The Importance of Business Continuity for Engineering Companies

5 Major Reasons for the Regular Audit of Insurance Companies

Health Care Challenges Medical Offices Face Regarding Regulatory Compliance

Why Legal Professionals Are at Risk Without Data Backup

Best Practices to Prevent Health Care Cybersecurity Threats

The 5 Main IT Issues Facing Companies Today

What Does GDPR Mean for Your Business?

The Biggest Usability Issues with Blockchain

Are Your Employees Responsible for Your Cyberattacks?

Preventing Hacked Passwords: How to Create a Hack-Proof Password

5 Networking Problems and How to Fix Them

What is Cryptojacking? Everything You Need to Know

Cybersecurity Risks Require Cyber Resilience

Fileless Attacks: What Are They and How Can You Prevent Them?

Downtime Issues: How to Manage and Prevent Unplanned Downtime

Why Do I Need Penetration Testing?

Hard Drive Recovery: How to Get Your Data Back

What You Need to Know About Cybersecurity Insurance

5 Ways to Prevent Identity Theft For Businesses

The Rise of 5G Technology: What to Expect in 2019

Why Microsoft Wants to Get Rid of Passwords for Good

What You Need to Know About the Rise of Malvertising

5 Tips to Keep Your WordPress Site Secure

5 Critical Areas to Address in Your Network Audit

5 Major Cybersecurity Threats You Need to Know About

3 Key Reasons Why Hosted VoIP Benefits Your Bottom Line

Network Backup Tips for Your Small Business

5 Most Common HIPAA Violations (and How You Can Avoid Them)

Top IoT Trends of 2018

5 Industries That Benefit From Managed IT Services

When’s the Last Time You Changed Your Passwords?

Can Blockchain Improve Cybersecurity for Your Business?

Is Now the Time for Autonomic Computing in the Cloud?

What You Need to Know About Cloud Computing

Why You Should Train Your Employees to Prevent a Security Breach

Digital Signatures are More Efficient and Secure

Tip of the Week: Surfing the Web, Securely

Recent Studies Show Cyber Attacks on the Rise

Top Reasons to Outsource Your IT Services

4 Tech Mistakes That Require Professional IT Support and Services

Cybersecurity Continues to Increase as an Issue for Many Companies

Are You Protected Against The Most Common Types of Cyber Attacks?

Why You Need BDR Solutions

Why Use a Managed Service Provider?

5 Cloud Computing Trends to Watch for in 2018

Onsite or Offsite Data Backup Strategy: What’s Best for Your Business?

What are the Server Clustering Benefits ?

Questions to Ask When Seeking Computer Repair Services

What Type of Computer Support and Service Does My Small Business Need?

3 Qualities of an Elite Infrastructure Support Service

5 Biggest Silicon Valley Information Technology Trends

5 Ways VoIP Phone Service Can Benefit Your Business

5 Biggest IoT Security Challenges (and What You Can Do)

Ransomware Data Recovery in the Age of Hackers

Does Your Business Have a Disaster Recovery Policy?

The Benefits of an IT Assessment for Your Business

How to Get the Most From Your Personal Cloud Storage

How AI is Changing the World of IT Support

5 Ways to Spot Computer Tech Support Scams

How Managed IT Services Make Your Life Easier

Ed Correia Named in SMB Top 150

Sagacent Technologies Named in the MSPmentor 501 List of the World’s Top 501 Managed Service Providers

Sagacent Technologies Honored in the ‘MSPmentor 100’ List of the World’s Top 100 Managed Service Providers with 10 or Fewer Employees

Ed Correia Speaking at ChannelPro SMB Forum 2013

Sagacent Attends Quarterly HTG Peer Group Meeting
