February 2022 – Newsletter, Cyber Insurance

As cyberattacks are an increasingly large problem, the need for cyber insurance as a means of protection is more important than ever before. Cyber insurance, also known as cyber-liability insurance, is a policy to help protect organizations from the fallout of cyberattacks and hacking threats. The insurance can help minimize business disruption and potentially cover some…

January 2022

macOS Monterey Building on the same powerful foundation as macOS Big Sur, and offering distinct experiences designed just for the capabilities of Mac, new features are now available with macOS Monterey. There have been several key features and enhancements made across the board from FaceTime and Messages, to Safari, Focus, Live Text, and Maps, among…

January 2022 – Newsletter, macOS Monterey

Building on the same powerful foundation as macOS Big Sur, and offering distinct experiences designed just for the capabilities of Mac, new features are now available with macOS Monterey. There have been several key features and enhancements made across the board from FaceTime and Messages, to Safari, Focus, Live Text, and Maps, among others. There…

Idera Inc.: Acquisition News

Idera Inc. recently announced the acquisition of BitTitan, Inc. and Perspectium, Corp. BitTitan will operate as part of Idera’s Data Tools business unit with the goal of building products differentiated by ease of use, speed, scale, and quality. The combined features will drive high value for Idera customers. Idera aims for minimal visible disruptions as…

November 2021

Microsoft Family Safety The Microsoft Family Safety mobile app wants to empower you and your family to create healthy habits and protect each other. The app is designed to help develop healthy digital habits while also protecting your loved ones with digital and physical safety features. Screen time limits can be set and applied to…

November 2021 – Newsletter, CMMC

The Cybersecurity Maturity Model Certification, commonly referred to as CMMC or the CMMC model, is a set of mandatory cybersecurity requirements that contractors must implement and have that implementation validated. The theft of intellectual property and sensitive information continues to threaten economic and national security. The Department of Defense has created the CMMC protocol as…