Do you patch all critical vulnerabilities within 'X' days? If you've dealt with an audit, cyber insurance, or third-party vendor due diligence, you've probably seen some variant...
Typing in a simple username and password is no longer enough to protect your data in the business technology world, which is why multi-factor authentication is such an important...
What's your go-to password? We all have one. Is yours secure? You can test how secure one of your top-of-mind passwords really is by checking it here:...
In recent years, billions of people have been affected by various data breaches and cyberattacks. Not only have these victims lost money or valuable data, but they also lost their...
We'd like to throw a quick statistic your way. According to Verizon's Data Breach Investigations Report, over 74% of all breaches include a human element in some way. Why is this...
It's true – your devices, accounts, and data are all incredibly valuable to cyber criminals, no matter your industry or role. According to Verizon’s 2024 Data Breach Report, 68%...
The AT&T phone record breach – which took place in 2022 and was disclosed July 2024 – affects everyone. Even if you're not an AT&T customer, records of calls placed and text...
Microsoft 365 Copilot is an AI-powered assistant that is built into the Microsoft 365 suite of applications including Word, Excel, PowerPoint, Outlook, and Teams to provide...
In April, Microsoft announced that they have unbundled Teams from the Office suite for all net new Enterprise subscriptions effective September 30, 2024. Customers with existing...
Information released from the Change Healthcare ransomware attack in February 2024 reveals the absence of Multi-Factor Authentication on a remote-access tool that attackers used...
It's a harsh reality for most small and mid-sized businesses, but it's the truth. You simply don’t have the resources to stop well-funded, highly-targeted attacks. But that's not...
Have you had an issue with email deliverability or your domain being flagged as spam? The industry standard for spam complaints is 0.1%. This means if you send an email campaign...
In a recent development, both Yahoo and Google have chosen to make DMARC a requirement for email delivery. This move is a significant step toward enhancing email security and...
Your team spends time and money on your IT resources, so it's only fair to make sure they are being utilized to their full potential. It's important that IT experts ask the right...
The new year is quickly approaching. That's right, it’s already time to start strategically planning to hit next year’s IT goals. Our rule of advice is that your team should sit...
Discover which IT service model is right for your medium-sized business. What are Co-Managed IT Services? Co-managed IT services can be a game-changer for medium-sized businesses...
"When was the last time you restarted your computer?" Does that question sound familiar? Whenever a user is facing a tech issue, typically one of the first troubleshooting steps...
The world of technology is always changing. Recently, IT has become a multifaceted Human Resource issue as companies look to hire good IT people, find someone with the knowledge...
There are only a few times throughout the year when it is encouraged to "unplug" from your work, when you should spend time with family, eat too much food, and turn your attention...
AI, with its immense potential, is reshaping the realm of cybersecurity. The integration of AI into the already overwhelming list of today’s cyber threats can seem daunting. It’s...
As another year flies past, is your technology accounted for? In order to keep a well-maintained IT environment, you must make your technology a part of your annual strategic...
To view the recording of our Tuesday Tech Talk, click HERE. Over the last 12-15 months, staffing conversations have taken a turn that not many people expected, especially staffing...
Audit season is right around the corner. Do you know if your organization is in full-compliance from a technology standpoint? With last year’s unprecedented events leading to a...
To view the recording of our Tuesday Tech Talk, click HERE. Cybersecurity incidents continue to make the news. Here is the Five Nines’ take on typical breaches and how to avoid...
No matter the industry, cybersecurity will be critical to your organization’s long-term success. In our first Tuesday Tech Talk of the year, Jarrod Daake, our Director of...
Strategic IT Planning is a collaborative process taken with clients to understand their business needs and goals, that ultimately allows the IT budget to appropriately align with...
Website breaches can cost millions of dollars and thousands of hours to remediate. Joe Brown, Five Nines Director of Marketing Operations, knows firsthand. In his career, he has...
We partnered with HBE CPAs & Consultants to present Security Tips to Keep You Safe at Home & Work, and here are the top 5 tips we covered: #1 – Practice Good Password Hygiene To...
You come to work with all systems operational: patients are being checked in. Nurses are filling out charts. Doctors are prescribing medicine. Everything in your hospital is...
We’ve talked a lot about the importance of changing your password and making sure you choose passwords that aren’t easily guessed. But while you should always beef up your...
It’s likely your company depends on several pieces of technology to consistently deliver a seamless product or service to your customers. When you consider that, protecting your...
Cloud services have modernized the way company's work and allow for collaboration in any place, with any device. At Five Nines, we’re big fans of Office 365 applications, but...
As technology continues to change, the number of ways your company can be targeted in a malware attack grows. At Five Nines, we put a major emphasis on educating our clients about...
It's likely you have insurance plans for all of the unforeseen circumstances in life: apartment fires, cell phone accidents and even getting sick. You may think of these plans as...
As business owners, we typically prefer not to think about what would happen if we suddenly lost all of our company’s data and crucial information through a breach or accident....
It’s all too easy to forget how integral and pervasive software-as-a-service (SaaS) has become to modern business operations, given the efficiencies and flexibility benefits it...
While you hear about the occasional breach of Protected Health Information (PHI) from large organizations, smaller medical offices often believe they are safe from a breach due to...
Change is hard. Ask any business owner and they’ll tell you that the slightest change can cause ripple effects throughout an organization if not properly administered. Changing...
As a leader in your company, you’ve done the research and know that moving toward a managed IT services provider is what is best for the success of your business. The concern?...
After the public and finance sectors, the manufacturing industry is the third most targeted by cyber-attacks, as the threat from malicious hackers, cybercriminals and corporate...
When it comes to working with your team, collaborating with another company, or simply working on a project from multiple locations, everyone wants to network and feel connected...
Cybercrime is a real threat to all businesses, SMB's included. Statistics are only showing an increase in cyberattack methods, and successful attacks result in a significant loss...
Unified Communications is an important business component meant to optimize processes and increase user productivity. It is something that relies on successful technology in order...
Solve. Secure. Advance. You have seen these 3 words beneath our logo since our rebranding back in 2015. This phrase is incorporated in everything we do: it drives the way we...
In all aspects of business, there is typically some form of documentation. You could be tracking certain numbers for goal completion, documenting budgets, or analyzing metrics for...
Have you ever run into technological terms where you don't fully understand their meaning? Have you felt this way when hearing your technology is approaching "end-of-life" or that...
You might be thinking to yourself, cyber insurance… is it really necessary? Think about it this way - cybercrime damages will cost the world $6 trillion annually by 2021. A lot of...
How many times have you seen cybersecurity breaches in the news in the last year? If you can recall even one time, we think that is one too many. Why? Because that one news story...
Your network is such an important part of your business, which is why correctly managing your network is so important. Overlooking network management could cause a severe halt in...
When reporting a tech issue, the better the communication, the more effective the problem-solving. We want to provide you with what IT professionals look for when addressing a new...
.BANK is not just another way to change up your domain name, it's a proactive and protective measure put in place to give you peace of mind that your customers are protected....
Have you ever heard anyone go up to an IT engineer and say "Hey, just checking in to let you know that everything is running smoothly!"? Probably not. In the IT industry, there...
An IT environment without a clear direction can easily get lost in the constant twists and turns of tech traffic that is constantly evolving and adapting. When it comes to...
Your organization's users interact with different IT software platforms every single day, so it's important to ensure they are not playing a role in a potential security breach...
Business growth does not happen overnight, nor does it happen without addressing what is working well and what isn't working well within an organization. The same goes for the...
Once spam hits your email inbox, you become a target. When it comes to technology, humans tend to be the weakest link in most IT security situations. Attackers will constantly try...
In today's world, technology is on-the-go... and there are no trends to show that this on-the-go tech culture will be slowing down. According to a poll conducted by Gallup, in...
We've seen the statistics, we've heard the horror stories, and we understand. The reality behind how often customer experiences go wrong or problems go unsolved is alarming, and...
Do you feel as though your IT environment is a sinking ship that you are trying to keep afloat? Keeping your IT environment efficient is the best way to help your organization...
Wi-Fi. It's a symbol that everyone recognizes, a term that most people are familiar with, yet many business' Wi-Fi networks are left unprotected and exposed. Securing your Wi-Fi...
As long as old computers are still running with limited problems, they don't need to be replaced... right? It may seem easy to place these updates on the lower end of your...
Five Nines is partnered with a 22-bed critical access hospital in rural Nebraska that supports up to 125 employees working between a hospital, clinic, and remote clinic. The...
Businesses rely on phone calls and virtual meetings for collaboration both internally and externally on a daily basis, and in order to achieve significant levels of up-time this...
In the tech industry today, even the most reliable tools can be used against you. Five Nines has recently discovered phishing attempts that are in the form of an Office 365...
We had a great time at the Nebraska Bankers Association Bank Technology Conference last week. We got the chance to connect with financial organizations across the state of...
Preparation is an important part of any business, but when it comes to business technology preparation can make or break how your technical environment operates in the event of an...
Running into a technical problem can be stressful, overwhelming, and a huge disruption to your workday. Don't be like this guy (thank you to our co-owner James, who provided this...
When it comes to workplace technology, the possibility of downtime is very real and has lasting impacts on organizations who experience it. Downtime is idle time within a business...
Your mobile device holds your entire life: emails, messages, photos, social media accounts, etc. Because your phone is always in your hands, on your desk, or in your pocket, it's...
Small to medium-sized businesses are consistently targets of cyber-attacks due to their size and underestimated security measures. According to the 2017 State of Cybersecurity in...
Network connectivity has the potential to make or break your IT work environment. If your network connectivity is down, it can cause a severe halt in productivity. Here are three...
Do you have a grip on your business, or does your business have a grip on you? Miss the Nebraska Tech Summit? Based on the business strategy book Traction written by Gino Wickman,...
To put it simply, risk can cost you… and it can cost you a lot. Unfortunately, risk will always be a factor when it comes to business technology. How you choose to eliminate...
Out of sight, out of mind, right? Wrong. Your data center may be a behind-the-scenes tool, but it is one of the most important technical aspects of your organization. Here are a...
What's keeping you from the cloud? That is the overall question. It is up to you and your IT team to determine whether or not you should implement a cloud solution. You might be...
If you are spending time, money, and extra resources on IT efforts for your business you must recognize that technology is always changing, and the job is never truly done. It's a...
It's a simple idea, with a complex follow-through: workplace communication. If employees feel as though their communication isn't prioritized, it could decrease productivity. This...
The life of technology can vary, and it can be difficult to keep track of everything, which is why the idea of Life Cycle Management is necessary to the success of an IT...
Surfing the web plays such a strong role in the daily lives of users, that it's almost uncomfortable to imagine life before it. As technology has advanced, so have its users,...
There are so many components put into place to protect your organization on the technical side, it's difficult to differentiate between each one. So, when we talk about a...
The most common way most business users share information with one another is through their work email addresses. Aside from sharing important information, business emails assist...
We've discussed the real story behind Managed IT Services, and the importance of a strong IT infrastructure for businesses. It's important to set up your IT environment in the...
Your computer keeps freezing. You can't make a phone call, and you have a meeting in an hour. You are locked out of your Outlook account. Have you ever run into technological...
One of the major components of our client's success is the effectiveness of their connectivity. Just as it sounds, connectivity is the state of being connected, a back-of-mind...
The process of solving a problem can often be strenuous, stressful, but it is one of the major components of the Information Technology industry. Here are a few steps we feel are...
In the IT industry, we IT folks often assume that users understand all the language and processes. Which is why when the topic of Managed IT Services is discussed, we assume you...
While IT continues to gain seats at the boardroom table, so does the complexity of the IT plan needed to keep the lights on in the organization. As the demand for IT professionals...
Microsoft believes hackers have been targeting Skype accounts since early August. When Microsoft integrated Skype logins with general Microsoft account logins, your old Skype...
As banking has evolved over the past few years there has been a growing trend towards consolidation of community banks. As a result, there is a huge challenge around finding the...
Great communication starts with the right tools. Unified Communication as a Service (UcaaS) is not a new concept nor is it a niche market, but a mainstream one already worth $4...
Have a conference room or meeting space that looks like this? Need a solution to eliminate all of the cords, wires, and adapters? Recently, Microsoft released Microsoft Miracast,...
It is no secret that the world of technology is constantly changing, notably Managed IT Services. What Five Niners have learned in technical training programs as early as last...
It is no secret that your business could be under attack by cybercriminals at any moment of any day. It is the basic fact of business in the internet age. Providing small business...
If you have looked to outsource your IT needs in recent years the words, "Service Desk" or "Primary Engineer" have probably come up. What do they really mean and what is the...
You may remember hearing the buzz about Nelnet acquiring Allo in 2015. Prior to the acquisition Allo was (and still is) providing fiber optic network options to Western Nebraska....
"Help_Decrypt_Your_Files," the year of ransomware has officially arrived. These 4 words can turn a business upside down with one click of the mouse. Your calendar, your kid's...
Subscribe to our newsletter to get fresh insights delivered to your inbox.